Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

CloudPassage aims to ease cloud server security management

January 26 2011

For many enterprises, three of the biggest headwinds against public cloud adoption are compliance, security and associated transparency. And organizations, especially those operating in regulated industries, need to have the control over the security configurations of their cloud-based servers.

The challenge is that traditional enterprise security tools don't always play well in public clouds, if at all. For example, security teams can't run traditional vulnerability management software, to make certain their systems are up to date with the latest patches. Additionally, the ease that virtual servers can be spun, copied, and moved elsewhere makes for a configuration management nightmare.

"When you move to cloud-based systems, your control over network resources is reduced," says Pete Lindstrom, research director at Spire Security. That makes it harder for enterprises to control their security posture, Lindstrom says, because they dont have say over many of their network assets. Still, organizations have to patch dated software versions, maintain tight configurations in the cloud just as they do with traditional on-premise software.

"However, unlike on-premises workloads, security policy enforcement in the cloud must be enforceable regardless of location and scalable elastically to potentially thousands of hosts, Neil MacDonald, an analyst at the research firm Gartner, said in a statement.

Security firm CloudPassage, in stealth mode until today, hopes to build itself a market through helping enterprises reign in their firewall and system configuration of cloud servers. The company claims its Halo SVM (Server Vulnerability Management) and Halo Firewall are the first server security and compliance services built specifically for elastic clouds.

"The goal is to help organizations enforce good server security and configuration management in the cloud," says Carson Sweet, company co-founder and CEO.

The Halo platform consists of a Halo Daemon that is installed on cloud servers and the Halo Grid. The Halo Daemon, a two-megabyte image, essentially gathers security and configuration information about the server and transmits that data to the Halo Grid. The Halo Grid processes the server information sent for policy enforcement on security and configuration levels and well as host-based firewalls.

Sweet contends the Halo Firewall solves a number of challenges associated with hots-based firewall management. First, he says, users can manage the policies of their cloud servers from a single console, which helps to cut down on policy configuration errors. Second, whenever cloud servers are added or moved, the system will automatically update individual firewall configurations.

Lindstrom says that since organizations lose control over the network layer of their public clouds, security needs to be as tightly integrated into host servers as possible. "All control over the network is deprecated, therefore the security you provide has got to be done at the host layer," he says.

George V. Hulme writes about security, technology, and business from his home in Minneapolis, Minnesota, which he says has too many clouds this time of year. You can also find him on Twitter as @georgevhulme.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html