Welcome!

Related Topics: Containers Expo Blog, SYS-CON MEDIA

Containers Expo Blog: Press Release

CHS Eliminates Blind Spots, Protects Virtual Infrastructure with Altor Networks

Altor VF Defense-in-Depth Virtual Firewall to Set Policy, Protect Core Applications and Lock Down VM Traffic

Redwood City, Calif-July 20, 2009-Altor Networks, provider of best-in-class virtualization and cloud security solutions, today announced that Comprehensive Health Services (CHS) is using the Altor VF virtual firewall in a mission-critical production environment to ensure compliance in their virtualized environment. Compliance with stringent data privacy laws governing healthcare, government and financial institutions are mandatory and specific to how information such as social security numbers and health information must be protected.

"Safeguards that shield sensitive data and critical applications on the physical LANs do exist within the virtual environment but are cumbersome and not always topologically feasible to implement," said Ryan Trost, Director of Security and Privacy Officer at CHS. "HIPAA's recent expansion of ARRA and HITECH restrictions explicitly defines data breach requirements and violations costs and has executives ultra-sensitive to compliance issues and ensuring secure confidential medical information remains protected."

CHS has developed an extensive, sophisticated IT structure with 130 servers to manage database intensive applications which support outsourced worksite health programs, national medical exams and medical readiness teams. Virtualization is being implemented to reduce costs and develop a more scalable, resilient, and manageable computing environment.

"Virtualization made sense for business continuity and from a cost benefit analysis, but security was lacking in the virtual environment," said Mr. Trost. "Protecting virtual environments can be difficult given technologies like VMotion and prime attack targets like the hypervisor.  We needed something that was purpose built."

As an expert in IT security and author of "Practical Intrusion Analysis", Mr. Trost points out that "co-mingling IT systems with different data classification levels [sensitive and non-sensitive] needs to be architected extremely carefully to avoid misuse of resources."

An increasingly large share of network traffic is occurring between virtual machines (VMs) within a virtualization server on the virtual network, yet VM and network administrators have minimal ability to see or control inter-VM communication. By default, every VM on the host can communicate directly with every other VM through a simple virtual switch, without any inter-VM traffic monitoring or policy-based inspection and filtering. Inter-VM traffic on a host does not touch the physical network; it is invisible to traditional networking monitoring tools and unprotected by physical network security devices. As a result, VMs are highly vulnerable to attack.

"Although VMWare (NASDAQ: VMW) has several built-in security measures to protect itself, it is preferred to have a secondary monitoring technology in place to ensure that all VMs are fully protected. The Altor solution provided a defense-in-depth methodology to govern ingress and egress traffic to our core applications and lock down the VM traffic, akin to the strategy that security analysts audit system administrators" said Mr. Trost.

CHS has real time visibility and rule-based control of packet flow into and out of each VM, without the bottleneck of traffic loops through the physical network. In particular, they can now secure the live migrations that are critical to their virtualized systems.

By installing a virtual firewall agent on each VMware ESX server, CHS' security team can now develop and manage enforceable firewall policies at the global, group, and individual VM level. CHS uses the Altor Reporting Module to get information delivered to them about the virtual machine communication behaviors at regular intervals.

"We did extensive research on virtual firewalls and found Altor VF provided the best solution to secure our virtualized environment," said Mr. Trost. "We have visibility and granular control over the virtual network traffic, dramatically improving the security of our virtual servers."

CHS can now pinpoint virtual security compromises and easily create role-based security policies. For the first time, security policies can be continuously enforced on individual virtual machines, simplifying deployment and on-going security management of the virtual infrastructure while reducing the dangers of security breaches.

"Hierarchical policies scale better, which is very important given our growing use of virtualization," said Mr. Trost. "I like that the firewall assigns a default policy as soon as a VM is provisioned."

Altor VF provides the visibility, the administrative efficiency, and the security that CHS needs today. With the Altor VF, CHS administrators can troubleshoot and resolve application availability issues faster. A tabbed dashboard displays the source, destination, port, and protocol of all VM communications at a glance. Graphical displays of traffic over time make it easy for CHS to spot anomalies and the use of any unapproved protocols.

About Altor Networks
Altor Networks is pioneering best-in-class virtualization security solutions to secure production-oriented virtualized data centers and internal clouds. The company's initial product line includes the industry's first-ever purpose-built virtual firewall with integrated intrusion detection, a software security appliance that runs in a virtualized environment. Data center administrators can pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. Founded by security and networking experts from Check Point Software, Cisco, NetApp and Oracle, Altor Networks is funded by Accel Partners and Foundation Capital and is headquartered in Redwood City, California. For more information, visit www.altornetworks.com.

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

Latest Stories
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.