Halo Login

Cloud Security and Automation Platform

Halo manages security and compliance in any public, private, or hybrid cloud environment.

How Halo Works

Security and compliance teams need to enable their businesses to leverage cloud computing with confidence.

Thanks to its unique and patented architecture, Halo is the only solution on the market that can provide consistent security and compliance controls across clouds and data centers alike. There are four key pillars of the Halo platform architecture:

  • The Halo Agent sits on the cloud and collects data from each cloud instance, virtual machine, or bare-metal server.
  • This data is reported back to the security analytics engine in under 60 seconds, for nearly real-time monitoring. This data is stored and analyzed, and allows users to report on important security metrics.
  • Control and Telemetry Modules manage specific security functions, including Firewall, two-factor authentication, file integrity monitoring, and vulnerability management.
  • The Halo Portal acts as a central management and monitoring platform for security teams, allowing them to orchestrate Halo's security capabilities across all servers.

As a cloud-agnostic platform, Halo ties its security and compliance capabilities directly into any cloud platform or cloud service provider. Quick deployment, self-service provisioning, legacy adaptability, and automation allows your security team to focus on security strategy, and less on fire drills.

Learn More

Features

As the industry's only security and compliance platform purpose-built for the cloud, Halo offers a full complement of security capabilities with minimal infrastructure overhead. Halo's Software-as-a-Service model means low impact to systems and minimal friction. No new hardware or network changes are required. And deployment time is fast–which means you're up and running in just a few hours.

As a cloud-agnostic platform, Halo ties its security and compliance capabilities directly into any cloud platform or cloud service provider. Quick deployment, self-service provisioning, legacy adaptability, and automation allows your security team to focus on security strategy, and less on fire drills.

Halo centrally automates dozens of controls that are critical to security and compliance, eliminating the effort and complexity of managing many specialized legacy solutions. Control and telemetry modules live on top of Halo's highly scalable security analytics engine and address key security needs, including:



firewall automation

Dynamic Firewall Automation

Deploy and manage dynamic firewall policies across public, private, and hybrid cloud environments. Build firewall policies from a simple web-based interface, and assign them to groups of servers. Policies update automatically within seconds of server additions, deletions and IP address changes.


Multi-Factor Authentication

Halo GhostPorts enables secure remote network access using two-factor authentication via SMS to a mobile phone, or using a YubiKey® with no additional software or infrastructure. Keep your server ports hidden and secure from the rest of the world while allowing temporary access on demand for authorized users only.


multi-factor authentication


configuration security monitoring

Configuration Security Monitoring

Automatically monitor operating system and application configurations, processes, network services, privileges, and more. Evaluate new and reactivated servers against the latest configuration policies in seconds with almost no CPU utilization.


Software Vulnerability Assessment

Halo scans for vulnerabilities in your packaged software rapidly and automatically, across all of your cloud environments–precisely where traditional software scanning products are unable to operate effectively. With Halo, thousands of server configuration points can be assessed in minutes, helping you to maintain continuous exposure awareness in the cloud.


software vulnerability assessment


file integrity monitoring

File Integrity Monitoring

Protect the integrity of your cloud servers by constantly monitoring for unauthorized or malicious changes to important system binaries and configuration files. File Integrity Monitoring first saves a baseline record of the "clean" state of your cloud server systems. It then periodically re-scans each server instance and compares the results to that baseline. Any differences detected are logged and reported to the appropriate administrators.


Account Management

Evaluate who has accounts on which cloud servers, what privileges they operate under, and how accounts are being used. Halo provides a single online management console where you can monitor your servers in public, private and hybrid cloud environments. The convenient user interface makes it easy for you to identify accounts that should have been removed.


account management


event logging and alerting

Event Logging and Alerting

Halo's security logging and alerts capabilities detect a broad range of events and system states, alerting you when they occur. The platform allows users to define which events generate logs or alerts, whether they are critical, and who will receive them.


REST API Access

Halo's REST API provides full automation of your cloud deployments and lets you integrate your security platform with your other systems. Once installed, Halo can automatically monitor security compliance rules across thousands of systems.


REST API coud security

Learn More

Integration Capabilities

As a purpose-built security automation platform for the cloud, Halo integrates with any cloud platform or cloud service provider, and features a REST API that allows integration with automation tools and security systems.

As new cloud servers are created, Halo seamlessly integrates, without extra provisioning from a security or operations team. All policies are updated and applied completely automatically within the platform.

With one central point of visibility, Halo allows true on-demand use of infrastructure-as-a-service and the benefits of fully automated operations, whether deployed in public, private, or hybrid cloud environments.

Learn More