TECH DIGITAL RESOURCE LIBRARY

CloudPassage

CloudPassage is the leading provider of public and private cloud server security and creator of Halo, the industry's first security and compliance platform purpose-built for elastic cloud environments. Halo operates across public, private and hybrid clouds. Industry-leading companies like Foursquare, Avatar New York, and Martini Media trust Halo to seamlessly manage their server security configuration, host-based firewalls, intrusion detection and server account auditing from one system. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital and other leading investors.

For more information, please visit http://www.CloudPassage.com.

Our Website: http://www.cloudpassage.com


Latest Content From CloudPassage

Infographic: Agile Security at DevOps Speed

by CloudPassageDec 21, 2016

With increasingly rapid software release cycles using agile methodologies, it's essential that security keeps up. Help your team be as agile as the development team with on-demand and automated security processes. This infographic charts how to get that agile security into the DevOps cycle.


Whitepaper: Case Study - Xero chooses CloudPassage Halo for workload security at DevOps speed

by CloudPassageDec 19, 2016

Xero develops cloud-based accounting software for small and medium-sized businesses in more than 180 countries. They chose CloudPassage Halo to protect their workloads running in AWS EC2 and to help them meet compliance requirements, and because the product was highly automated, integrated with their rapid DevOps production pipeline, and provided a broad range of important security controls.


Whitepaper: Security Breaks DevOps - Here's How to Fix It

by CloudPassageNov 07, 2016

Reliance on virtualized infrastructure and Infrastructure-as-a-Service (IaaS) has exploded, making manual provisioning and management simply not feasible anymore; it takes too long and locks up too many resources. Modern DevOps methods and tools have emerged, thus responding to the business faster. Now, IT and security teams need to adopt platforms and processes that match the speed and agility of their DevOps brethren. Learn how to speed up DevSecOps with these key ingredients.


Whitepaper: Agile Security at the Speed of Modern Business

by CloudPassageNov 07, 2016

Agile security can empower CISOs and their teams to move at the speed of modern business and become enablers of innovation and growth. It puts security and compliance teams in a position to embrace elastic infrastructures and align security objectives of the business.


Whitepaper: Don't Let Security Put the Brakes on DevOps

by CloudPassageNov 07, 2016

The rise of agile software development and DevOps methods have brought speed and quality benefits, but they have inadvertently put a huge strain on security organizations. Applying security based on static parameters and making manual rule adjustments just before production leaves little time for provisioning the policies. Read this Solution Brief to learn how CloudPassage Halo helps teams move at DevOps speed.


Whitepaper: SANS Institute: A DevSecOps Playbook

by CloudPassageNov 07, 2016

This playbook summarizes how DevOps and information security can co-exist through the application of a new approach referred to as DevSecOps.


Research Report: Cloud Security Concerns and the Perceived Effectiveness of Traditional Security

by CloudPassageAug 25, 2015

The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.


Webcast: How Enterprises Are Attacking the Cloud Security Challenge

by CloudPassageJul 21, 2015

No matter what their size or industry, most enterprises today are employing multiple cloud services and applications. But with their data running across many “clouds” that employ varying approaches to security, how can the enterprise ensure that its data is safe?

Join Dark Reading and CloudPassage for an insightful look at best practices and technologies for securing data in a multi-provider cloud environment. In a webcast featuring cloud security experts Michael Cobb and Sami Laine, Dark Reading and CloudPassage will offer a deep dive into issues such as how to:

  • Monitor key cloud security indicators
  • Enforce security policy across multiple cloud services
  • Build an incident response plan that enables internal security teams to work hand-in-hand with cloud service providers
  • Build dashboards that enable the enterprise to monitor security across multiple cloud providers


Research Report: Forrester Market Overview: Cloud Workload Security Management Solutions

by CloudPassageJun 17, 2015

Forrester Research just published the first independent, comprehensive market report related to the cloud infrastructure space. This is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure.

In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria:

- Scalability
- Portability
- On-demand delivery
- Broad, centralized controls in one solution

Download the full report to learn how to best approach cloud workload security.


Research Report: 2015 Cloud Security Survey Report

by CloudPassageApr 08, 2015

Cloud adoption is increasing quickly as organizations are looking to reduce IT cost, increase agility and better support business functions. However, security of data and systems in the cloud remains a key issue and critical barrier to faster adoption of cloud services.

This report is the result of comprehensive research in cooperation with the 250,000+ member Information Security Community on LinkedIn.

Read the report to explore:
- The specific drivers and risk factors of cloud infrastructure
- How organizations are using the cloud
- Whether the promise of the cloud is living up to the hype
- How organizations are responding to the security threats in these environments