What Sets the Halo Cloud Security Platform Apart?

Halo is the only unified cloud security platform that is purpose-built for providing cloud computing security for cloud environments. Battle-tested by small, medium, and large enterprises, today the platform helps information security operators secure over 15,000 public cloud stacks.

Experience the CloudPassage Halo Advantage

For cloud security and compliance

The Halo cloud security platform has eight key design attributes that make Halo the superior choice for complete, effective, and efficient cloud infrastructure security.

Unified

For a nearly infinite number of operational security use cases

The Halo cloud security platform offers hundreds of features across IaaS, server, and container environments, putting a comprehensive and powerful set of security and compliance operations capabilities at your fingertips.

One security platform for all assets

Fast

To be up and running quickly​

A fully self-contained, turnkey SaaS solution that deploys very quickly. High-speed telemetry and analytics enable you to operate with the speed required to keep up with cloud and DevOps environments.

cloud security platform Timing graphic

Scalable

For transparent and effortless growth of your cloud footprint

The Halo cloud security platform is designed for the cloud—making temporary scale-up operations automatic and long-term growth simple. Halo deploys, licenses, configures, inventories, interrogates, assesses, and initiates monitoring of new servers, IaaS accounts, and containers without user intervention.

cloud security platform scalability

Cost-effective for Maximum Budget Value

For predictable budget forecasting and improved economics over time

CloudPassage Halo offers the most competitive price point among solutions in its class. Halo is a purpose-built SaaS cloud security platform and its pricing model reflects that. Halo is not a platform offering low prices because it’s sub-par or a legacy datacenter product masquerading as a cloud-first security product.

CONSUMPTION-BASED
PRICING

With Halo’s subscription model, you only pay for what you need and use

LICENSE ALLOCATION FLEXIBILITY

Re-deploy licenses where and how you need without limitation

AUTOMATIC
DISCOUNTS​

Reserved and on-demand services auto-discounted as usage increases​

OPERATIONALLY
EFFICIENT DESIGN

We’ve exploited every opportunity for efficiency and low delivery costs

Simple Licensing
Model

No predicting data or scan volume, network traffic, or rules used

Automated

To achieve a true DevSecOps operating model

Halo’s automation ensures speed and consistency, frees up precious staff time from menial tasks, and unlocks the technical capabilities needed to achieve a true DevSecOps operating model.

Halo automates the:

one-icon

Deployment and operation of itself​

two-icon

Full-lifecycle workflows for vulnerability, threat, and compliance management

Integrated​

For security that is built-in, not bolted on​

The Halo platform integrates directly into cloud environments, ensuring that security is present from the moment new infrastructure is deployed. Unlike some solutions, Halo requires no extra components to operate or extra work to install, license, and configure after it is deployed.

NATIVE
MECHANISMs

IaaS API connectors leverage native cross-account roles for instant visibility into new sub-accounts and assets.

Blue-Green and
Bakery Deployments

Halo microagents can be pre-configured and built into server and Docker host images. ​

Traditional
Deployments

Halo microagents can be deployed using included deployment scripts to automate the process.

Container
Environments

Halo microagents can be deployed at the Docker host level or as a sidecar container instantiated on the host.

Kubernetes
Environments

A Helm chart is used to deploy and configure Halo sidecar microagents across clusters.

Continuous
Delivery

A Jenkins-native plugin and CI/CD SDK provide advanced integration with any CI/CD orchestration tool.

Portable

For seamless security across any mix of cloud environments at any time​

portable-icon

Works seamlessly across any mix of public, private, hybrid or multi-cloud environments.

portable-icon

No additional collectors, scanners, aggregators, or other components to deploy for operation—unlike products that introduce complexity and limitations.

portable-icon

When assets migrate between environments, Halo’s security capabilities migrate without relicensing or reconfiguration.

Halo simply works. All you have to do is:

one-icon

Deploy API connectors and microagents

two-icon

Ensure outbound HTTPS connectivity to the Halo cloud

Comprehensive

To automate an almost unlimited set of security tasks​

Halo is a comprehensive cloud security platform, providing far more than point solutions or architecturally limited platforms. Experienced security operators will quickly recognize Halo’s flexibility in automating an almost unlimited set of security operational tasks.

cloud-secure-circle-icon

CLOUD SECURITY POSTURE MANAGEMENT (CSPM)

Cloud Secure service

server-secure-circle-icon

CLOUD WORKLOAD PROTECTION (CWPP)​

Server Secure service

container-secure-circle-icon

CONTAINER
SECURITY​

Container Secure service

devops-circle-icon

DEVOPS
AUTOMATION

Halo Rest API and SDK

Experience the CloudPassage Halo Advantage

laptop

To Learn More About Cloud Security

Containerization and Container Orchestration

Read why we believe we scored 5 out of 5 in The Forrester Wave™: Cloud Workload Security Q4 2019

API-level Connectivity and Control for IaaS and PaaS

Learn all you can accomplish with the comprehensive Halo REST API and the associated value