Founded in 2011, CloudPassage® was the first company to obtain a U.S. patent for universal cloud infrastructure security and has been a leading innovator in cloud security automation and compliance monitoring for high-performance application development and deployment environments. CloudPassage Halo® is an award-winning workload security automation platform that provides universal visibility and continuous protection for servers in any combination of data centers, private/public clouds and containers. The Halo platform is delivered as a service, so it deploys in minutes and scales effortlessly. Fully integrated with popular infrastructure automation and orchestration tools such as Puppet and Chef, as well as leading CI/CD tools such as Jenkins, Halo secures the enterprise where it’s most vulnerable—application development and workload deployment. Today, CloudPassage Halo secures the critical infrastructure of many of the leading global finance, insurance, media, ecommerce, high-tech service providers, transportation and hospitality companies.
Results 1 - 5 of 5

SANS Institute: A DevSecOps Transformation

Many executives believe the shift to agile business will disrupt their industries, driving the move to Continuous Integration and Deployment. This infographic gives you seven InfoSec imperatives to help your transformation.

The DevSecOps Approach to Securing Your Code and Your Cloud

Having infosec, app dev, and IT ops immersed in all development activities makes it easier to integrate controls into the pipeline without causing delays. This paper walks you through those policies and guideline processes.

Cloud Security Survey: 2017 Results

A yearly survey is conducted with the 350,000+ members of the LinkedIn InfoSec Community on the state of cloud security. This year's results explores many topics, from adoption barriers and benefits to paths to stronger security.

A New Approach for Securing DevOps Environments in the Cloud

Today, high-performing teams deploy IT infrastructures on demand and can make changes in less than an hour. This rapid pace leaves security teams behind, and the massive gap puts companies at risk.

Seven Decision Points When Considering Containers

This paper has identified 7 key decision points that should be considered when choosing to deploy to containers. These 7 decision points can act as guideposts that will help point you in the right direction for using containers.