Microsoft to offer Booz Allen Cloud security Portfolio on Azure

269

Microsoft has made it official that it is going to add Booz Allen Hamilton’s cloud security portfolio on its Azure Government Marketplace. This is to provide fool-proof cloud workload protection and security services for public customers.


Booz Allen’s Virtual Cloud Defense suite includes the best breed of commercial off the shelf, open source security products which will help organizations create customized applications, and helps in migrating existing applications along with the privilege to integrate commercial and government off-the-shelf products.

As this suite gives the advantage of implementing cloud security for both public as well as private clouds, Microsoft is trying to offer this wholesome security feature to its Azure Government customers.

Microsoft Azure Government offers a secure platform for government agencies to build applications and services that comply with the Trusted Internet Connection (TIC) initiative. TIC is a common name for Comprehensive National Cyber Security Initiative (CNCI).

Booz Allen’s Virtual Cloud Defense builds upon Microsoft’s Azure’s investments to boost its cloud security and compliance. It also helps in meeting Federal Government and DoD security and assurance requirements.

This helps Microsoft Azure Government customers gain improved performance with near infinite scale and agility to respond to changing demands.

Coming to the key features, Virtual Cloud Defense offers Encryption of data at rest, network traffic inspection and protection; network tiering, deployment automation, log aggregation and analytics.

Adding to the core security services, Booz Allen’s Virtual Cloud Defense Architecture can also offer services to meet the organization’s cost and risk profile. This helps in protecting a bunch of applications in an organization at a time.

Furthermore, Virtual Cloud Defense integration into Azure helps in defining network and application architectures compliant with HIPPA, NIST, and DoD cloud computing requirements.