CloudPassage Announces Project Azul
August 02, 2017

CloudPassage announced plans for a broad set of automated compliance and security controls for containers, codename Project Azul, in order to ensure a monitored and secured containerized operating environment for enterprises.

CloudPassage Halo provides a cloud workload protection platform, automating the security of virtual machines (VMs) and hosts across private cloud, public cloud, and data center environments for the Fortune 1000. As part of Project Azul, CloudPassage will provide the same efficient, automated security for VMs, hosts, and containers, allowing enterprises security and visibility from a single platform and agent.

“CloudPassage Halo was purpose-built for highly automated application development and deployment environments,” said Jack Marsal, Director of Product Marketing, CloudPassage. “Today, Halo is employed by leading digital enterprises deploying virtual machines across clouds and servers at speed and scale. With the rapid adoption of containers, the need for a single security and compliance platform that can protect both hosts and containers has become a critical ask from our customers.”

Unlike other container security products, CloudPassage Project Azul will secure all elements of the container environment: container images, running containers, and the container engine/ host.

Project Azul is currently in beta testing and will be widely available in winter 2017.

In addition, the automated cloud security provider is also announcing a new release of CloudPassage Halo, the company’s automated cloud workload security platform. The update includes the addition of support for Windows Server 2016, multi-factor authentication (MFA), and enhancements to existing reporting features.

As a result of these updates, Halo users can now:

- Leverage industry leading software vulnerability detection on Windows Server 2016

- Assess compliance with the CIS Benchmark for Windows Server 2016

- Obtain inventories of software, processes and user accounts on Windows Server 2016

- Detect unintended filesystem and registry changes as well as unauthorized user behavior on Windows Server 2016

- Enroll a one time password authentication factor using any mobile authentication app that supports time-based one time passwords (TOTP), including Duo Security, Google Authenticator, Authy, and others

- View the overall state of CVE assessment, top CVEs to address, top vulnerable servers, and more

- Schedule reports to run at a specific time and on a recurring basis

- Demonstrate to auditors that they have a disciplined security program

The Latest

October 19, 2017

In light of the recent Equifax breach, Gene Kim and speakers from the upcoming DevOps Enterprise Summit San Francisco (DOES17) dissected the situation and discussed the technical leadership lessons learned while offering their own expert advice for handling crisis situations. The following are more highlights from the discussion ...

October 18, 2017

In light of the recent Equifax breach, Gene Kim and speakers from the upcoming DevOps Enterprise Summit San Francisco (DOES17) dissected the situation and discussed the technical leadership lessons learned while offering their own expert advice for handling crisis situations ...

October 16, 2017

A survey of more than 750 development team leaders in the US and UK, revealed that 68 percent plan to build more apps during the next 12 months. At the same time as reporting increased volumes of development, 91 percent of developers surveyed agree that user expectations for innovation and quality have increased, but app deliveries continue to fail ...

October 12, 2017

Today, organizations must digitally evolve or they risk becoming irrelevant. One area that’s been growing in adoption is a shift to developing and deploying modern applications in the cloud, which requires software and IT architects to rethink how to architect and manage these apps ...

October 10, 2017

Designing and deploying complete software-defined data centers (SDDCs) can be complicated because each implementation requires a broad range of infrastructure to support heavy demands for compute, networking, storage, applications and security ...

October 05, 2017

According to LogiGear's State of Software Testing Survey, almost one-third of the respondents are experiencing classic test automation issues. One problem commonly cited among respondents was that management didn’t fully understand what it takes to have a successful automation program ...

October 04, 2017

Load balancing at the DNS (Domain Name System) level has been around for a few decades now, but it didn't become crucial until recently as technology is moving to the cloud. DNS is the perfect solution for managing cloud systems ...

October 02, 2017

QualiTest recently compiled a data report analyzing software testers globally. The report details the Quality Assurance and Software Testing job market, one of the fastest growing job markets and a bellwether of tech employment due to QA's involved in nearly every conceivable industry ...

September 28, 2017

API use is exploding among developers, as APIs are an essential part of software development for the web, IoT, mobile and AI applications. APIs allow a developer to create programs or apps that can successfully request services or data from other applications or operating system. This connectivity, though powerful, is complex, and that complexity grows with new apps, new hardware such as the new iPhone and Echo, and the creation of new APIs ...

September 26, 2017

Companies are placing a greater value on high performing IT professionals as IT demands continue to escalate, according to Puppet's DevOps Salary Report ...

Share this