SERVER WORKLOAD THREAT PREVENTION AND COMPLIANCE
Halo Server Secure enables you to automate threat prevention and compliance for server-based workloads anywhere, at any scale
Protecting cloud server workload assets is critical
Moving servers from datacenter environment to the public cloud is one of the key use cases for IaaS. Even with containerized and serverless workloads on the rise, servers will remain central to many application stacks for years to come. Protecting server-based workload assets remains a critical requirement.
Security teams have quickly learned that protecting servers in public cloud environments is different. Servers can auto-scale, are updated far more frequently, and their numbers multiply as compute requirements are optimized.
Designed to protect cloud-hosted servers
System owners have no more tolerance for traditional agents that are bloated and hard to manage – especially when multiple point solutions turn into multiple agents. On top of these issues, the IaaS control plane must be protected to ensure that both the servers and their environments remain safe.
Halo Server Secure was designed from the ground up to automatically address the new requirements for protecting cloud-hosted servers. You get automatic discovery and inventory of cloud servers and deep, continuous analysis of server configurations, package vulnerabilities, administrative access privileges, runtime activities, threat & compromise indicators, and more. Server Secure’s patented microagent architecture is the most mature in the market, battle-tested and improved in some of the largest cloud workload deployments in the world. We’ve improved our microagent deployment and management capabilities over the years to eliminate friction with your ops teams and make ongoing management simple.
Build-in security from the start
With Server Secure your teams can integrate cloud workload protection capabilities directly into server infrastructure making security built-in from the start, not as an afterthought. Server Secure will enable your team to automate the full lifecycle of cloud server protection including asset & issue discovery, remediation workflow, verifying resolution, and tracking it all.
Server Secure is built on the Halo platform, so it delivers the same level of integration, automation, scale and speed as our other workload protection solutions. The common Halo platform also means true integration across capabilities, so you don’t have to integrate multiple products – or wait for other vendors to integrate their own point solutions.
How it Works
Patented microagent architecture for deep visibility and control with almost undetectable server overhead, complete portability, and easy management.
Cloud-based deployments make server visibility and control more critical than ever, but traditional endpoint security just doesn’t cut it. We literally invented the cloud server microagent architecture, often copied but never matched. Halo Server Secure leverages that architecture to give you scale, speed, managability, and control that can’t be paralleled. A compact, efficient, and heavily secured sensor, Server Secure agents have a mere 2 MB memory footprint and leverage the Halo security analytics cloud to do the heavy lifting. Server Secure’s patented messaging protocol eliminates the need for network configuration changes and has very low network impact.
Halo Server Secure is also highly functional. A few of Server Secure’s features include continuous server inventory, configuration monitoring, vulnerable and unpatched package detection, automated log inspection, configuration drift detection, file integrity monitoring, network traffic discovery, and orchestration of host-based firewall policies. Servers will remain a key infrastructure component for years to come, making automated, scalable, cloud-aware server workload protection a critical requirement.
Server-based workloads remain essential infrastructure, but IaaS changes how servers are delivered.
Servers aren’t going away any time soon. But like most application infrastructure, enterprises are dialing in to how public IaaS services can make server delivery and management better. Regardless of the reason, getting server protection and compliance right is still critical. Here are some common use cases driving server migration and how Halo Server Secure fits in.
Halo Cloud Secure gives you instant access to broad, battle-tested capabilities developed through years of real world, customer-driven enhancements.
- Server Discovery & Inventory – continuous discovery and inventory of servers including running processes, network configurations, installed packages, local access credentials, network traffic patterns, and more.
- Exposure Prevention – assess and continuously monitor servers for configuration hardening, missing patches, vulnerable packages, configuration drift, system integrity, privileged activities, and suspicious network and system activity.
- Compliance Monitoring – continuous compliance assurance for server configurations, authorized software, access management, change control, asset inventory, and compliance-related system activity.
- Threat Detection – automated event collection & alerting, host-based intrusion detection, detect indicators of threat/compromise, monitor for unauthorized use of privileged access, detect undesired/suspicious network activity.
- Microsegmentation – central orchestration of host-based firewalls, network traffic pattern discovery, network service integrity monitoring, auditing of locally managed host firewall policies.
- RedHat Enterprise Linux
- Amazon Linux
- Oracle Linux
- Windows Server 2008 R2
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2016
- Windows Server 2019