RSA award roundup

It’s been a banner week for us here at CloudPassage! In this season of Grammys, Globes, Oscars, Spammies, and so many more, we’ve garnered four technical excellence awards for Halo. While this may not impress Patriots fans, we’re extremely gratified…

Read More

CloudPassage Halo: What’s new in the latest update?

A few weeks ago, we released the latest update to our award-winning Halo platform. The update includes several enhancements including a new filtering feature in the portal user interface, visual and functional improvements to the Traffic Discovery feature, improved server…

Read More

CloudPassage Halo now offered in solution-specific packages

Yesterday we announced new packaged offerings of CloudPassage Halo that more cost-effectively represent how enterprises use Halo for their server and cloud workload security. These packages can be purchased separately or in any combination in order to provide your organization…

Read More

How microsegmentation helps with compliance

Guest post by Matthew Pascucci, Frontline Sentinel In our last article on microsegmentation, we spoke about the security use-case. The security use-case is the linchpin to all other use cases for microsegmentation. It is the founding case that will spawn…

Read More

Drivers for organizations to adopt and embrace agile security

Cyber threats against enterprises continue to rise, as more people are connected to the Internet, the criminal underworld continues to grow and mature, and state-sponsored attacks are on the rise. Regulations of cyber security continue to grow. And IT organizations…

Read More

Survey results: 2016 Cloud Security Spotlight report

On Tuesday we announced results of the 2016 Cloud Security Spotlight report, which gathered intel from more than 300,000 members of the Information Security Community on LinkedIn. Participants in the survey were professionals from a broad range of organizations and questions…

Read More

How Halo can help with the ImageMagick vulnerability

Last week, a serious vulnerability, CVE-2016-3714, was announced in ImageMagick, software commonly used on websites to manipulate images. The vulnerability was discovered on *NIX-based operating systems. The vulnerability, nicknamed ImageTragick, could potentially allow Remote Code Execution (RCE) if the server…

Read More