CloudPassage Provides Security to Amazon Cloud Customers

CloudPassage Provides Security to Amazon Cloud Customers

Cloud server security provider CloudPassage is working with Amazon Web Services (AWS) to provide security to customers within Amazon EC2. CloudPassage has secured a membership in the Amazon Web Services (AWS) Solution Providers Program and through this relationship Amazon EC2 cloud customers will have access to CloudPassage Halo. Lightweight, portable, and elastic, CloudPassage Halo is the only server security platform, purpose-built for the cloud, which delivers multiple layers of defense for cloud servers.

The AWS Solution Providers Program enables Systems Integrators (SIs), Interactive Agencies, Independent Software Vendors (ISVs), and Channel Partners to broaden their suite of offerings and expand their markets and customer base. Delivering a multitude of security capabilities at the server level, CloudPassage Halo offers Amazon EC2 customers an additional layer of security that is designed to be cloud-capable and elastic through its delivery model.

Commenting on the rationale of this move, CloudPassage notes the importance of server-level security protection in the cloud where front-line perimeter defenses are limited.  Strong and highly automated host-based controls are essential as customers deploying cloud infrastructure in many environments are largely on their own to protect themselves.

Security and compliance remain major challenges that stop companies from experiencing the benefits that the tremendous scalability and agility of cloud hosting provides,” said Carson Sweet, co-founder and CEO of CloudPassage.

Securing the server itself in an automated, portable, and elastic manner represents an extremely effective approach to practical survivability in public and hybrid clouds.  We are excited to work with AWS to provide security to customers within Amazon EC2.”

CloudPassage built Halo from the ground up to deliver security at the virtual machine level. This unique server security platform centralizes and automates security management at high scale, and includes a rich REST API that unlocks extensive integration capabilities.

By Anuradha Shukla

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…