Harness the Power of IaaS Without Compromising Security

This post was originally published here by gregg rodriguez. This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations, and the daily threat of security […]

Benefits of Serverless Computing

This post was originally published here by gregg rodriguez. Many organizations are in a transition, operating somewhere between traditional and modern application environments, and asking some of the same questions you likely have about how serverless computing environments work. Most companies are not actually 100% serverless, or even 100% cloud-based yet. Instead many have opted […]

New: Weekly Halo Cloud Secure Demos

This post was originally published here by gregg rodriguez. The New Year is a time to celebrate new beginnings. Starting over with a clean slate of resolutions, goals, launches, etc. That’s the good news. Now here’s the bad: If you thought 2018 was a tough year for data breaches, 2019 will be even tougher! But the […]

Best Practices for Securing Cloud-Hosted DNS Services like Amazon Route 53

This post was originally published here by gregg rodriguez. Amazon Route 53 is a highly available and scalable cloud-based Domain Name System (DNS) web service offered within AWS. Like any DNS, Route 53 handles domain registration and routes users’ Internet requests to your application, whether it’s hosted on AWS or somewhere else. Route 53 is designed […]

Mitigating the First Major Kubernetes Vulnerability

This post was originally published here by  siri oaklander. Recent news on the discovery of the first Kubernetes vulnerability, the popular cloud container orchestrations system, highlights two things critical to security, the need to: Audit and harden systems on the periphery and inside an infrastructure, and    Continually review these systems for vulnerable packages and configurations during […]

Tips for a Successful AWS re:Invent 2018

This post was originally published here by gregg rodriguez. AWS re:invent is less than a month away, but if you’re like most IT and security professionals you have your hands full. This year we’re sharing some tips for AWS re:Invent that will help you take advantage of great online resources so you can plan ahead […]

Best Practices for Securing Amazon EC2

This post was originally published here by gregg rodriguez. As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible for securing the data center infrastructure […]

Creating a Culture of Cybersecurity

This post was originally published here by gregg rodriguez. Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you share on social media. By 2020 the […]

Protecting Your Cloud-Based Relational Databases

This post was originally published here by Edward Smith. As more enterprises move more sensitive data to the cloud, how you secure  and protect your public cloud services and resources is critical. While Amazon does a stellar job of securing the underlying server hardware and software as their part of the Shared Security Model, securing what you put […]

F1000 Biotech Firm, Bio-Rad, Selects CloudPassage

This post was originally published here by marisa bogdanoff. Bio-Rad Laboratories, a $2.2B Life Sciences and Clinical Diagnostics leader whose history spans more than six decades will secure critical cloud assets with Halo Cloud Secure! Given the nature of Bio-Rad’s business, securing cloud assets in Microsoft Azure is a responsibility they take very seriously. The Israel-based R&D […]

CloudPassage Halo is an on-demand, automated security platform that works in any infrastructure, at any scale. Halo is delivered as a service, so it deploys in minutes and scales dynamically — with no servers to provision and configure. With Halo, our customers deploy layered security at every workload – servers, virtual machines, cloud instances and containers.
Share this page