CloudPassage Unveils Halo SVM and Halo Firewall for Elastic Cloud Environments

CloudPassage Inc. introduced the Halo Server Vulnerability Management (SVM) and Halo Firewall products, which are purpose-built for elastic cloud environments.  These products deliver fast, easy and accurate server exposure assessment, configuration compliance monitoring and network access control – automating the three most-fundamental practices for securing servers in public and hybrid clouds.

According to Neil MacDonald, vice president of CloudPassage and Gartner Fellow, the number-one concern preventing enterprises from adopting public cloud computing is security. "As organizations shift workloads to cloud-based providers, it is imperative that security isn't weakened," he said. "Like on-premises workloads, organizations need to minimize attack surfaces, patch vulnerable software and ensure security configurations are maintained as workloads move to the cloud. However, unlike on-premises workloads, security policy enforcement in the cloud must be enforceable regardless of location and scalable elastically to potentially thousands of hosts."

Halo SVM addresses server vulnerability management needs with the scalability, speed and elasticity needed for cloud server environments. Built on the innovative Halo architecture, the Halo SVM product delivers accurate server exposure assessment with little affect on customers' server resources. Halo SVM functions quickly and efficiently – thousands of server configuration points are assessed in seconds – enabling customers to maintain continuous exposure and compliance intelligence, even in rapidly growing cloud server farms.

"Security and privacy will continue to be a critical priority for us as we dramatically increase the number of users and venues that Foursquare serves," said Foursquare senior operations engineer David Birdsong.  "We need server security that includes nonstop vulnerability management and firewalling – and we need it to automatically keep up with our cloud environment.  We have been impressed with the accuracy and performance of CloudPassage, and it has taken very little time to deploy and manage."

The Halo Firewall product controls server attack surfaces by centralizing and automating host-based firewall management, the preferred alternative to traditional enterprise perimeter firewalls. The product provides customers with unified cloudwide firewall policy management from a graphical Web front-end, eliminating the untenable operational overhead and likely errors associated with manual host-based firewall management. The Halo Firewall product automatically updates individual host-based firewall configurations whenever cloud servers are added or removed – including server cloning or cloudbursting operations – with zero intervention by system administrators.  The product also transparently addresses the issues of dynamic public-cloud IP addressing, cited by IaaS providers as a complication in cloud server firewall management.(2) Halo Firewall enables customers to ensure strong, flexible network access control with the ease of management that parallels traditional enterprise firewalls.

Server security fundamentals are critical in cloud environments, especially public cloud servers that must operate without the benefits of traditional enterprise perimeter protection. Recent studies by Verizon Business and the U.S. Secret Service indicate that 95 percent of compromises leading to information and identity theft could have been prevented by basic security configuration, software patching and network access control, basic steps recommended by IaaS providers.

The Halo architecture provides high levels of server security automation for multiple security functions while transparently handling the problems associated with securing highly fluid, agile and scalable cloud server hosting environments. Secure, ultra light-weight Halo Daemons are backed by the elastic compute power of the Halo Grid, eliminating resource utilization on protected servers and delivering scalability and elasticity that can keep up with cloud-hosted server farms.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.