Over a million developers have joined DZone.

CloudPassage Halo Now in Solution-Specific Packages

DZone's Guide to

CloudPassage Halo Now in Solution-Specific Packages

Halo Protect, Halo Segment, Halo Detect offer cost-effective entry to workload security.

· Cloud Zone ·
Free Resource

Learn how to migrate and modernize stateless applications and run them in a Kubernetes cluster.

CloudPassage today announced new packaged offerings for CloudPassage Halo to more cost-effectively address enterprises' need for workload security. Award-winning CloudPassage Halo is now comprised of three packages--Halo Protect, Halo Segment and Halo Detect--which can be purchased separately or in any combination to provide workload protection, microsegmentation, compromise detection, compliance, DevSecOps and AWS EC2 security. At one-third the full platform pricing, the new packages provide enterprises with a more cost-effective entry point to workload security and the flexibility to add fully integrated functionality as the need arises.

"While most of our customers eventually use the full range of security controls in CloudPassage Halo, many are initially looking for a more tailored solution to a specific security problem," said Jack Marsal, Product Marketing Director, CloudPassage. "These solution-focused packages allow enterprises to address their most acute security problem in the most cost-effective manner while giving them flexibility to add a broader range of security controls as their security needs evolve. Customers can evolve their security systems and posture at the pace which is right for them."

The new CloudPassage Halo packages are designed to meet specific security challenges:

Halo Protect reduces the software attack surface of workloads by ensuring proper security configuration, discovering software vulnerabilities, and controlling administrative access.

  • Configuration Security Monitoring (CSM) automatically monitors operating system and application configurations, processes, networks services, and privileges and compares them to the latest policies and standard industry benchmarks.
  • Software Vulnerability Assessment (SVA) automatically scans servers and cloud workloads to check for software vulnerabilities and to maintain continuous exposure awareness in the cloud and across all environments.
  • Server access management lets IT security managers monitor, audit and evaluate account access and privileges of all servers in any operating environment though a single online management console.

Halo Segment reduces the network attack surface through traffic discovery, host firewall orchestration, and multi-factor network authentication.

  • Traffic discovery and visualization lets IT security managers visualize the IP connection patterns and listening ports of workloads and servers, both between Halo-protected systems as well as connections to and from remote systems. This makes it easy to create dynamic firewall policies that prevent unwanted lateral movement of threats.
  • Workload firewall management lets IT security managers easily deploy and manage dynamic host firewall policies across all environments. Policies are based on the server tags, not the IP addresses, so changes to host firewall tables are made automatically as new servers are added, retired, or as IP addresses change.
  • Multi-factor network authentication lets IT security managers keep server ports and IP addresses hidden and secure while allowing temporary on-demand access for authorized users.

Halo Detect alerts you if any of your workloads have been compromised by monitoring whether important files have changed and by monitoring important server log files.

  • File Integrity Monitoring (FIM) protects cloud server integrity through constant monitoring for unauthorized or malicious changes to important system binaries or files.
  • Log-based Intrusion Detection (LIDS) continuously monitors key server log files for suspicious activity that could indicate misuse, misconfiguration or compromise.

Additional details specific to CloudPassage Halo solutions can be found at https://www.cloudpassage.com/solutions/.

Join us in exploring application and infrastructure changes required for running scalable, observable, and portable apps on Kubernetes.

Configuration Security Monitoring ,Software Vulnerability Assessment ,File Integrity Monitoring ,Log-based Intrusion Detection ,devsecops

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}