SHARE
Facebook X Pinterest WhatsApp

Halo Firewall Provides Network Security in the Cloud

thumbnail Halo Firewall Provides Network Security in the Cloud

CloudPassage has announced the release of the Halo Firewall which controls server attack surfaces by centralizing and automating host-based firewall management, the preferred alternative to traditional enterprise perimeter firewalls. Providing customers with unified cloud-wide firewall policy management from a graphical web front-end, Halo Firewall eliminates the untenable operational overhead and likely errors associated with manual […]

Jan 27, 2011
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

CloudPassage has announced the release of the Halo Firewall which controls server attack surfaces by centralizing and automating host-based firewall management, the preferred alternative to traditional enterprise perimeter firewalls. Providing customers with unified cloud-wide firewall policy management from a graphical web front-end, Halo Firewall eliminates the untenable operational overhead and likely errors associated with manual host-based firewall management. This new product, reports PR Newswire, automatically updates individual host-based firewall configurations whenever cloud servers are added or removed – including server cloning or cloudbursting operations – with zero intervention by system administrators.


“According to Neil MacDonald, VP and Gartner Fellow, the number one concern preventing enterprises from adopting public cloud computing is security. ‘As organizations shift workloads to cloud-based providers, it is imperative that security isn’t weakened,’ he said. ‘Like on-premises workloads, organizations need to minimize attack surfaces, patch vulnerable software and ensure security configurations are maintained as workloads move to the cloud. However, unlike on-premises workloads, security policy enforcement in the cloud must be enforceable regardless of location and scalable elastically to potentially thousands of hosts.'”

Read the Full Story at PR Newswire

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.