Halo Cloud Secure: Now available to everyone

Today we announce the general availability of Halo Cloud Secure, which offers comprehensive and continuous visibility across your public cloud infrastructure environments. According to The 2018 Cloud Security Report, 43% of cloud security professionals cite a lack of visibility into…

Read More

Gaining security visibility of your public cloud assets

As the use of public cloud services increases, security teams struggle to maintain visibility of their cloud assets. In fact, in one recent survey, 43% of cloud security pros said that lack of visibility into infrastructure security is their biggest…

Read More

Halo Cloud Secure: A unified product

Vitaliy Geraymovych, Talli Somekh, and I founded CloudPassage in 2010. In those early days, cloud infrastructure was broadly dismissed as little more than a hosting environment for games, blogs, and experiments. The bulk of IaaS offers revolved around cloud servers…

Read More

Now available to all Halo users: Cortex v1.1

We’ve just released Cortex v1.1 (https://github.com/cloudpassage/cortex), and while some changes may seem subtle, they greatly improve the functionality and efficiency of Cortex, giving you an even more seamless experience. Some of the changes you’ll see include: File-based configuration for scheduled…

Read More

Auditing Linux environments using LIDS and ‘auditd’

If you use LIDS at all, your life is about to get easier: Recently we released nine new templates for the CloudPassage Halo log-based intrusion detection system, (LIDS) which consists of different rules/policies for ‘auditd’. The CloudPassage Halo log-based intrusion…

Read More

Come see us at Gartner Security and Risk Management Summit!

We love that Gartner Security and Risk Management Summit. Year after year the summit continues to provide thought-provoking talks, enlightening conversations, and and important networking activities. This year we’re a sponsor, and we hope to see you there! Read on…

Read More

Webinar: integrating security into your CI pipeline

Our latest webinar Integrating security into our CI pipeline, examines how containers and image vulnerability assessment can be integrated into your DevSecOps tools and processes. After all, one of the biggest challenges of adopting containerization is fast and effective vulnerability…

Read More