Redgate’s new SQL Monitor now ensures that DevOps teams can monitor and track deployments at all times.
CloudPassage announced plans for a broad set of automated compliance and security controls for containers, codename Project Azul, in order to ensure a monitored and secured containerized operating environment for enterprises.
CloudPassage Halo provides a cloud workload protection platform, automating the security of virtual machines (VMs) and hosts across private cloud, public cloud, and data center environments for the Fortune 1000. As part of Project Azul, CloudPassage will provide the same efficient, automated security for VMs, hosts, and containers, allowing enterprises security and visibility from a single platform and agent.
“CloudPassage Halo was purpose-built for highly automated application development and deployment environments,” said Jack Marsal, Director of Product Marketing, CloudPassage. “Today, Halo is employed by leading digital enterprises deploying virtual machines across clouds and servers at speed and scale. With the rapid adoption of containers, the need for a single security and compliance platform that can protect both hosts and containers has become a critical ask from our customers.”
Unlike other container security products, CloudPassage Project Azul will secure all elements of the container environment: container images, running containers, and the container engine/ host.
Project Azul is currently in beta testing and will be widely available in winter 2017.
In addition, the automated cloud security provider is also announcing a new release of CloudPassage Halo, the company’s automated cloud workload security platform. The update includes the addition of support for Windows Server 2016, multi-factor authentication (MFA), and enhancements to existing reporting features.
As a result of these updates, Halo users can now:
- Leverage industry leading software vulnerability detection on Windows Server 2016
- Assess compliance with the CIS Benchmark for Windows Server 2016
- Obtain inventories of software, processes and user accounts on Windows Server 2016
- Detect unintended filesystem and registry changes as well as unauthorized user behavior on Windows Server 2016
- Enroll a one time password authentication factor using any mobile authentication app that supports time-based one time passwords (TOTP), including Duo Security, Google Authenticator, Authy, and others
- View the overall state of CVE assessment, top CVEs to address, top vulnerable servers, and more
- Schedule reports to run at a specific time and on a recurring basis
- Demonstrate to auditors that they have a disciplined security program