CloudPassage provides users with cloud security posture management, vulnerability assessment, file integrity monitoring, configuration management, host log monitoring, host admin privilege management and application control.
CloudPassage Halo can be applied to any workload form factor with any deployment model. The initial deployment can be completed in hours, with expansion in days. The auto-scaling grid keeps pace with cloud, DevOps and CICD speeds. Its automation makes it scale with security from tens to tens-of-thousands of workloads transparently to reduce manual effort. The built-in model offers zero friction once SaaS is established with dozens of points where security can be instrumented.
The Halo Security Automation Platform includes: Halo Cloud Secure, Halo Server Secure and Halo Container Secure. The Halo Deployment model and methodologies offer public IaaS services, servers/VMs/cloud instances, docker hosts, image registries and CICD pipeline automation, ecosystem integrations and workflow automation.
Halo provides automation high speed and scale that helps to decrease exposure time by enabling fast and effective remediation through automation. Users are also able to adapt this security solution to fit their unique environment avoiding wasting cycles by tuning out unnecessary alerts.
An overview shows everything that exists across environments for high-level visibility of assets, compliance and existing issues. The AWS S3 bucket drill-down gives users remediation solutions step by step.
Multiple controls for security on servers show a high-level view by state, including how many issues are where. Setting a broad overall policy for a certain type of server will flow down to business units. This is a useful tool for large infrastructures because it allows for some automation without infringing upon flexibility.
A lot of information can be provided to users especially as they are doing automation that goes beyond the simple security results they get. You can pull all the software packages from the API and all the processes that are running to do some statistics on them.
You can run scans manually or automatically. Configuration Security Monitoring will be displayed in a list of issues with color-coded severity.
Tested by Matthew Hreben