CloudPassage Halo

Powered by SC Magazine
 

Cloud systems usually are little more than virtual data centers on the internet.

If one controls the virtual environment - as in a private cloud - one probably has access to the vCenter if using VMware, for example. Still, administering security from the vCenter is a challenge for a big environment. If one is in a public cloud, it can be an even bigger challenge. That's where Halo enters the picture.

Halo is a virtual security command-and-control center - sort of like a virtual security operations center (SOC) - that lets one manage such security functions as firewall automation, file integrity monitoring, configuration security, vulnerability scanning and security event alerts. Everything can be automated and all security functions on virtual servers are monitored continuously.

Multifactor authentication is accomplished using GhostPorts, an add-on to Halo that authenticates through an SMS message to a mobile device or through the use of UbiKey, a one-time authentication tool. GhostPorts lets any authorized user authenticate from anywhere while blocking unauthorized users. 

Halo is an attractively priced security-as-a-service offering. The company has been in existence since 2010 and secures more than 5,000 servers currently. The Halo Daemon is completely relocatable within the virtual environment since it is part of the virtual machine itself. That means that as VMware, using vMotion, the tool moves virtual machines around, while the Daemon goes along for the ride, ensuring seamless control of security within the cloud.

This is well worth looking at. We liked its functionality and its automation, as well as the security of the service itself.

Copyright © SC Magazine, US edition


CloudPassage Halo
 
:
Overall Rating
Product Info
Supplier:
 
Tags
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote