Enterprises are demanding that their security solutions work together seamlessly to provide the most comprehensive protection and compliance possible. Information Analysis Incorporated (IAI), as an authorized Reseller of CloudPassage, provides entities with the Halo on-demand, automated server and cloud workload security solution. CloudPassage Halo provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds.

CloudPassage Halo is an on-demand, automated security platform that works in any infrastructure, at any scale. Halo is delivered as a software-as-a service, so it deploys in minutes and scales dynamically — with no servers to provision and configure. With Halo, customers deploy layered security at every workload – servers, virtual machines, cloud instances and containers. And as a service, Halo is licensed based on usage, offering great flexibility.

Customers can access the Halo platform through a modern web-based portal to set up and manage the security policies by logical grouping of workloads and can leverage best-practice policy templates provided by CloudPassage.

What Problems Does Halo Solve?

  • Visibility. Within seconds security teams gain visibility into every server to discover vulnerabilities, security configuration errors and indications of compromise.
  • Speed. Halo bakes security right into continuous development processes like DevOps.
  • Micro Segmentation. Halo reduces the attack surface by protecting against lateral movement of threats through traffic discovery and micro segmentation.
  • Compliance. Halo automates compliance functions, saving time and money by proving the security posture of all assets in scope of regulations within seconds.

Halo Delivers Critical Controls Anywhere, On Demand

Risk & Compliance Awareness
Immediate, consistent, continuous knowledge of assets, where they reside and what they are doing.

Compromise Management
Detect and respond to malicious or accidental compromise of resources.

Data Protection
Assurance that data is used appropriately by authorized entities while in motion and at rest.

Strong Access Control
Strong and layered controls for authorized access and denial of resources to unauthorized entities.

Vulnerability Management
Continuous detection of issues that create exploitable points of weakness.

Operational Automation
Day-to-day management of technologies and processes around security and compliance.