SYS-CON MEDIA Authors: Pat Romanski, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Yeshim Deniz

Related Topics: Containers Expo Blog, SYS-CON MEDIA

Containers Expo Blog: Press Release

CHS Eliminates Blind Spots, Protects Virtual Infrastructure with Altor Networks

Altor VF Defense-in-Depth Virtual Firewall to Set Policy, Protect Core Applications and Lock Down VM Traffic

Redwood City, Calif-July 20, 2009-Altor Networks, provider of best-in-class virtualization and cloud security solutions, today announced that Comprehensive Health Services (CHS) is using the Altor VF virtual firewall in a mission-critical production environment to ensure compliance in their virtualized environment. Compliance with stringent data privacy laws governing healthcare, government and financial institutions are mandatory and specific to how information such as social security numbers and health information must be protected.

"Safeguards that shield sensitive data and critical applications on the physical LANs do exist within the virtual environment but are cumbersome and not always topologically feasible to implement," said Ryan Trost, Director of Security and Privacy Officer at CHS. "HIPAA's recent expansion of ARRA and HITECH restrictions explicitly defines data breach requirements and violations costs and has executives ultra-sensitive to compliance issues and ensuring secure confidential medical information remains protected."

CHS has developed an extensive, sophisticated IT structure with 130 servers to manage database intensive applications which support outsourced worksite health programs, national medical exams and medical readiness teams. Virtualization is being implemented to reduce costs and develop a more scalable, resilient, and manageable computing environment.

"Virtualization made sense for business continuity and from a cost benefit analysis, but security was lacking in the virtual environment," said Mr. Trost. "Protecting virtual environments can be difficult given technologies like VMotion and prime attack targets like the hypervisor.  We needed something that was purpose built."

As an expert in IT security and author of "Practical Intrusion Analysis", Mr. Trost points out that "co-mingling IT systems with different data classification levels [sensitive and non-sensitive] needs to be architected extremely carefully to avoid misuse of resources."

An increasingly large share of network traffic is occurring between virtual machines (VMs) within a virtualization server on the virtual network, yet VM and network administrators have minimal ability to see or control inter-VM communication. By default, every VM on the host can communicate directly with every other VM through a simple virtual switch, without any inter-VM traffic monitoring or policy-based inspection and filtering. Inter-VM traffic on a host does not touch the physical network; it is invisible to traditional networking monitoring tools and unprotected by physical network security devices. As a result, VMs are highly vulnerable to attack.

"Although VMWare (NASDAQ: VMW) has several built-in security measures to protect itself, it is preferred to have a secondary monitoring technology in place to ensure that all VMs are fully protected. The Altor solution provided a defense-in-depth methodology to govern ingress and egress traffic to our core applications and lock down the VM traffic, akin to the strategy that security analysts audit system administrators" said Mr. Trost.

CHS has real time visibility and rule-based control of packet flow into and out of each VM, without the bottleneck of traffic loops through the physical network. In particular, they can now secure the live migrations that are critical to their virtualized systems.

By installing a virtual firewall agent on each VMware ESX server, CHS' security team can now develop and manage enforceable firewall policies at the global, group, and individual VM level. CHS uses the Altor Reporting Module to get information delivered to them about the virtual machine communication behaviors at regular intervals.

"We did extensive research on virtual firewalls and found Altor VF provided the best solution to secure our virtualized environment," said Mr. Trost. "We have visibility and granular control over the virtual network traffic, dramatically improving the security of our virtual servers."

CHS can now pinpoint virtual security compromises and easily create role-based security policies. For the first time, security policies can be continuously enforced on individual virtual machines, simplifying deployment and on-going security management of the virtual infrastructure while reducing the dangers of security breaches.

"Hierarchical policies scale better, which is very important given our growing use of virtualization," said Mr. Trost. "I like that the firewall assigns a default policy as soon as a VM is provisioned."

Altor VF provides the visibility, the administrative efficiency, and the security that CHS needs today. With the Altor VF, CHS administrators can troubleshoot and resolve application availability issues faster. A tabbed dashboard displays the source, destination, port, and protocol of all VM communications at a glance. Graphical displays of traffic over time make it easy for CHS to spot anomalies and the use of any unapproved protocols.

About Altor Networks
Altor Networks is pioneering best-in-class virtualization security solutions to secure production-oriented virtualized data centers and internal clouds. The company's initial product line includes the industry's first-ever purpose-built virtual firewall with integrated intrusion detection, a software security appliance that runs in a virtualized environment. Data center administrators can pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. Founded by security and networking experts from Check Point Software, Cisco, NetApp and Oracle, Altor Networks is funded by Accel Partners and Foundation Capital and is headquartered in Redwood City, California. For more information, visit www.altornetworks.com.

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

Latest Stories
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
Platform-as-a-Service (PaaS) is a technology designed to make DevOps easier and allow developers to focus on application development. The PaaS takes care of provisioning, scaling, HA, and other cloud management aspects. Apache Stratos is a PaaS codebase developed in Apache and designed to create a highly productive developer environment while also supporting powerful deployment options. Integration with the Docker platform, CoreOS Linux distribution, and Kubernetes container management system ...
Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. It even comes with Prometheus to store the metrics for you and pre-built Grafana dashboards to show exactly what is important for your services - success rate, latency, and throughput. In this session, we'll explain what Linkerd provides for you, demo the installation of Linkerd on Kubernetes and debug a real world problem. We will also dig into what functionality you can build on ...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
DevOps is a world surrounded by information, starting from a single commit and ending in roll out to production. In this talk, I'll introduce you to the world of Taboola DevOps data collection, to better understand what goes on under the hood. The system we've developed in-house helps us collect and analyse the entire DevOps process from the very first commit all the way to production. It provides us a full clear view with a drill-down toolset that helps keep us away from the dark side. ...
Take advantage of autoscaling, and high availability for Kubernetes with no worry about infrastructure. Be the Rockstar and avoid all the hurdles of deploying Kubernetes. So Why not take Heat and automate the setup of your Kubernetes cluster? Why not give project owners a Heat Stack to deploy Kubernetes whenever they want to? Hoping to share how anyone can use Heat to deploy Kubernetes on OpenStack and customize to their liking. This is a tried and true method that I've used on my OpenSta...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
We at Capgemini have developed a cloud-native PaaS Solution called "Apollo". Apollo is built on top of following open source components. - Apache Mesos for cluster management, scheduling & resource isolation - Marathon or Kubernetes for Container orchestration - Docker for application container runtime, - Consul for service discovery via DNS - Weave for networking of Docker Containers - Traefik for application container load balancing
With digital video content creation going viral and assuming the bulk of Internet traffic, how can the deluge of video content be analyzed effectively to derive insights and ROI? After all, video is not only huge in size, but it is complex given various visual, audio and temporal elements. Video summarization (a mechanism for generating a short video summary via key frame analysis or video skimming) has become a popular research topic industry-wide and across academia. Video thumbnail generation...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio a...
Containerized software is riding a wave of growth, according to latest RightScale survey. At Sematext we see this growth trend via our Docker monitoring adoption and via Sematext Docker Agent popularity on Docker Hub, where it crossed 1M+ pulls line. This rapid rise of containers now makes Docker the top DevOps tool among those included in RightScale survey. Overall Docker adoption surged to 35 percent, while Kubernetes adoption doubled, going from 7% in 2016 to 14% percent.