Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
If one controls the virtual environment - as in a private cloud - one probably has access to the vCenter if using VMware, for example. Still, administering security from the vCenter is a challenge for a big environment. If one is in a public cloud, it can be an even bigger challenge. That's where Halo enters the picture.
Halo is a virtual security command-and-control center - sort of like a virtual security operations center (SOC) - that lets one manage such security functions as firewall automation, file integrity monitoring, configuration security, vulnerability scanning and security event alerts. Everything can be automated and all security functions on virtual servers are monitored continuously.
Multifactor authentication is accomplished using GhostPorts, an add-on to Halo that authenticates through an SMS message to a mobile device or through the use of UbiKey, a one-time authentication tool. GhostPorts lets any authorized user authenticate from anywhere while blocking unauthorized users.
Halo is an attractively priced security-as-a-service offering. The company has been in existence since 2010 and secures more than 5,000 servers currently. The Halo Daemon is completely relocatable within the virtual environment since it is part of the virtual machine itself. That means that as VMware, using vMotion, the tool moves virtual machines around, while the Daemon goes along for the ride, ensuring seamless control of security within the cloud.
This is well worth looking at. We liked its functionality and its automation, as well as the security of the service itself.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.