Welcome!

Related Topics: Containers Expo Blog, SYS-CON MEDIA

Containers Expo Blog: Press Release

CHS Eliminates Blind Spots, Protects Virtual Infrastructure with Altor Networks

Altor VF Defense-in-Depth Virtual Firewall to Set Policy, Protect Core Applications and Lock Down VM Traffic

Redwood City, Calif-July 20, 2009-Altor Networks, provider of best-in-class virtualization and cloud security solutions, today announced that Comprehensive Health Services (CHS) is using the Altor VF virtual firewall in a mission-critical production environment to ensure compliance in their virtualized environment. Compliance with stringent data privacy laws governing healthcare, government and financial institutions are mandatory and specific to how information such as social security numbers and health information must be protected.

"Safeguards that shield sensitive data and critical applications on the physical LANs do exist within the virtual environment but are cumbersome and not always topologically feasible to implement," said Ryan Trost, Director of Security and Privacy Officer at CHS. "HIPAA's recent expansion of ARRA and HITECH restrictions explicitly defines data breach requirements and violations costs and has executives ultra-sensitive to compliance issues and ensuring secure confidential medical information remains protected."

CHS has developed an extensive, sophisticated IT structure with 130 servers to manage database intensive applications which support outsourced worksite health programs, national medical exams and medical readiness teams. Virtualization is being implemented to reduce costs and develop a more scalable, resilient, and manageable computing environment.

"Virtualization made sense for business continuity and from a cost benefit analysis, but security was lacking in the virtual environment," said Mr. Trost. "Protecting virtual environments can be difficult given technologies like VMotion and prime attack targets like the hypervisor.  We needed something that was purpose built."

As an expert in IT security and author of "Practical Intrusion Analysis", Mr. Trost points out that "co-mingling IT systems with different data classification levels [sensitive and non-sensitive] needs to be architected extremely carefully to avoid misuse of resources."

An increasingly large share of network traffic is occurring between virtual machines (VMs) within a virtualization server on the virtual network, yet VM and network administrators have minimal ability to see or control inter-VM communication. By default, every VM on the host can communicate directly with every other VM through a simple virtual switch, without any inter-VM traffic monitoring or policy-based inspection and filtering. Inter-VM traffic on a host does not touch the physical network; it is invisible to traditional networking monitoring tools and unprotected by physical network security devices. As a result, VMs are highly vulnerable to attack.

"Although VMWare (NASDAQ: VMW) has several built-in security measures to protect itself, it is preferred to have a secondary monitoring technology in place to ensure that all VMs are fully protected. The Altor solution provided a defense-in-depth methodology to govern ingress and egress traffic to our core applications and lock down the VM traffic, akin to the strategy that security analysts audit system administrators" said Mr. Trost.

CHS has real time visibility and rule-based control of packet flow into and out of each VM, without the bottleneck of traffic loops through the physical network. In particular, they can now secure the live migrations that are critical to their virtualized systems.

By installing a virtual firewall agent on each VMware ESX server, CHS' security team can now develop and manage enforceable firewall policies at the global, group, and individual VM level. CHS uses the Altor Reporting Module to get information delivered to them about the virtual machine communication behaviors at regular intervals.

"We did extensive research on virtual firewalls and found Altor VF provided the best solution to secure our virtualized environment," said Mr. Trost. "We have visibility and granular control over the virtual network traffic, dramatically improving the security of our virtual servers."

CHS can now pinpoint virtual security compromises and easily create role-based security policies. For the first time, security policies can be continuously enforced on individual virtual machines, simplifying deployment and on-going security management of the virtual infrastructure while reducing the dangers of security breaches.

"Hierarchical policies scale better, which is very important given our growing use of virtualization," said Mr. Trost. "I like that the firewall assigns a default policy as soon as a VM is provisioned."

Altor VF provides the visibility, the administrative efficiency, and the security that CHS needs today. With the Altor VF, CHS administrators can troubleshoot and resolve application availability issues faster. A tabbed dashboard displays the source, destination, port, and protocol of all VM communications at a glance. Graphical displays of traffic over time make it easy for CHS to spot anomalies and the use of any unapproved protocols.

About Altor Networks
Altor Networks is pioneering best-in-class virtualization security solutions to secure production-oriented virtualized data centers and internal clouds. The company's initial product line includes the industry's first-ever purpose-built virtual firewall with integrated intrusion detection, a software security appliance that runs in a virtualized environment. Data center administrators can pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. Founded by security and networking experts from Check Point Software, Cisco, NetApp and Oracle, Altor Networks is funded by Accel Partners and Foundation Capital and is headquartered in Redwood City, California. For more information, visit www.altornetworks.com.

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infra...