CloudPassage Provides Security to Amazon Cloud Customers

CloudPassage Provides Security to Amazon Cloud Customers

Cloud server security provider CloudPassage is working with Amazon Web Services (AWS) to provide security to customers within Amazon EC2. CloudPassage has secured a membership in the Amazon Web Services (AWS) Solution Providers Program and through this relationship Amazon EC2 cloud customers will have access to CloudPassage Halo. Lightweight, portable, and elastic, CloudPassage Halo is the only server security platform, purpose-built for the cloud, which delivers multiple layers of defense for cloud servers.

The AWS Solution Providers Program enables Systems Integrators (SIs), Interactive Agencies, Independent Software Vendors (ISVs), and Channel Partners to broaden their suite of offerings and expand their markets and customer base. Delivering a multitude of security capabilities at the server level, CloudPassage Halo offers Amazon EC2 customers an additional layer of security that is designed to be cloud-capable and elastic through its delivery model.

Commenting on the rationale of this move, CloudPassage notes the importance of server-level security protection in the cloud where front-line perimeter defenses are limited.  Strong and highly automated host-based controls are essential as customers deploying cloud infrastructure in many environments are largely on their own to protect themselves.

Security and compliance remain major challenges that stop companies from experiencing the benefits that the tremendous scalability and agility of cloud hosting provides,” said Carson Sweet, co-founder and CEO of CloudPassage.

Securing the server itself in an automated, portable, and elastic manner represents an extremely effective approach to practical survivability in public and hybrid clouds.  We are excited to work with AWS to provide security to customers within Amazon EC2.”

CloudPassage built Halo from the ground up to deliver security at the virtual machine level. This unique server security platform centralizes and automates security management at high scale, and includes a rich REST API that unlocks extensive integration capabilities.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…