CloudPassage Announces Plans for Broad Set of Automated Compliance and Security Controls for Containers

CloudPassage has announced its plans for a broad set of automated compliance and security controls for containers, codename Project Azul, in order to ensure a monitored and secured containerized operating environment for enterprises.

Container adoption at the enterprise level has skyrocketed in recent years due to the ability of containers to provide faster application development and deployment. In the 2017 edition of the Portworx Annual Container Adoption survey, 32 percent of responding companies spent $500,000 or more per year on license and usage fees for container technologies, up from a reported five percent in 2016.

CloudPassage Project Azul would secure all elements of the container environment: container images, running containers, and the container engine/host. Project Azul is currently in beta testing and will be widely available in winter 2017.

Cloud Workload Security

cloudpassage cloud securityIn addition, the automated cloud security provider is also announcing a new release of CloudPassage Halo, the company’s automated cloud workload security platform – automating the security of virtual machines (VMs) and hosts across private cloud, public cloud, and data center environments for the Fortune 1000.

“CloudPassage Halo was purpose-built for highly automated application development and deployment environments,” said Jack Marsal, director of product marketing, CloudPassage. “Today, Halo is employed by leading digital enterprises deploying virtual machines across clouds and servers at speed and scale. With the rapid adoption of containers, the need for a single security and compliance platform that can protect both hosts and containers has become a critical ask from our customers.”

The CloudPassage Halo update includes the addition of support for Windows Server 2016, multi-factor authentication (MFA), and enhancements to existing reporting features.

As a result of these updates, CloudPassage Halo users would now be able to:

  • Leverage software vulnerability detection on Windows Server 2016
  • Assess compliance with the CIS Benchmark for Windows Server 2016
  • Obtain inventories of software, processes and user accounts on Windows Server 2016
  • Detect unintended filesystem and registry changes as well as unauthorized user behavior on Windows Server 2016
  • Enroll a one time password authentication factor using any mobile authentication app that supports time-based one time passwords (TOTP), including Duo Security, Google Authenticator, Authy, and others
  • View the overall state of CVE assessment, top CVEs to address, top vulnerable servers, and more; Schedule reports to run at a specific time and on a recurring basis; Demonstrate to auditors that they have a disciplined security program