SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

Related Topics: Containers Expo Blog, SYS-CON MEDIA

Containers Expo Blog: Press Release

CHS Eliminates Blind Spots, Protects Virtual Infrastructure with Altor Networks

Altor VF Defense-in-Depth Virtual Firewall to Set Policy, Protect Core Applications and Lock Down VM Traffic

Redwood City, Calif-July 20, 2009-Altor Networks, provider of best-in-class virtualization and cloud security solutions, today announced that Comprehensive Health Services (CHS) is using the Altor VF virtual firewall in a mission-critical production environment to ensure compliance in their virtualized environment. Compliance with stringent data privacy laws governing healthcare, government and financial institutions are mandatory and specific to how information such as social security numbers and health information must be protected.

"Safeguards that shield sensitive data and critical applications on the physical LANs do exist within the virtual environment but are cumbersome and not always topologically feasible to implement," said Ryan Trost, Director of Security and Privacy Officer at CHS. "HIPAA's recent expansion of ARRA and HITECH restrictions explicitly defines data breach requirements and violations costs and has executives ultra-sensitive to compliance issues and ensuring secure confidential medical information remains protected."

CHS has developed an extensive, sophisticated IT structure with 130 servers to manage database intensive applications which support outsourced worksite health programs, national medical exams and medical readiness teams. Virtualization is being implemented to reduce costs and develop a more scalable, resilient, and manageable computing environment.

"Virtualization made sense for business continuity and from a cost benefit analysis, but security was lacking in the virtual environment," said Mr. Trost. "Protecting virtual environments can be difficult given technologies like VMotion and prime attack targets like the hypervisor.  We needed something that was purpose built."

As an expert in IT security and author of "Practical Intrusion Analysis", Mr. Trost points out that "co-mingling IT systems with different data classification levels [sensitive and non-sensitive] needs to be architected extremely carefully to avoid misuse of resources."

An increasingly large share of network traffic is occurring between virtual machines (VMs) within a virtualization server on the virtual network, yet VM and network administrators have minimal ability to see or control inter-VM communication. By default, every VM on the host can communicate directly with every other VM through a simple virtual switch, without any inter-VM traffic monitoring or policy-based inspection and filtering. Inter-VM traffic on a host does not touch the physical network; it is invisible to traditional networking monitoring tools and unprotected by physical network security devices. As a result, VMs are highly vulnerable to attack.

"Although VMWare (NASDAQ: VMW) has several built-in security measures to protect itself, it is preferred to have a secondary monitoring technology in place to ensure that all VMs are fully protected. The Altor solution provided a defense-in-depth methodology to govern ingress and egress traffic to our core applications and lock down the VM traffic, akin to the strategy that security analysts audit system administrators" said Mr. Trost.

CHS has real time visibility and rule-based control of packet flow into and out of each VM, without the bottleneck of traffic loops through the physical network. In particular, they can now secure the live migrations that are critical to their virtualized systems.

By installing a virtual firewall agent on each VMware ESX server, CHS' security team can now develop and manage enforceable firewall policies at the global, group, and individual VM level. CHS uses the Altor Reporting Module to get information delivered to them about the virtual machine communication behaviors at regular intervals.

"We did extensive research on virtual firewalls and found Altor VF provided the best solution to secure our virtualized environment," said Mr. Trost. "We have visibility and granular control over the virtual network traffic, dramatically improving the security of our virtual servers."

CHS can now pinpoint virtual security compromises and easily create role-based security policies. For the first time, security policies can be continuously enforced on individual virtual machines, simplifying deployment and on-going security management of the virtual infrastructure while reducing the dangers of security breaches.

"Hierarchical policies scale better, which is very important given our growing use of virtualization," said Mr. Trost. "I like that the firewall assigns a default policy as soon as a VM is provisioned."

Altor VF provides the visibility, the administrative efficiency, and the security that CHS needs today. With the Altor VF, CHS administrators can troubleshoot and resolve application availability issues faster. A tabbed dashboard displays the source, destination, port, and protocol of all VM communications at a glance. Graphical displays of traffic over time make it easy for CHS to spot anomalies and the use of any unapproved protocols.

About Altor Networks
Altor Networks is pioneering best-in-class virtualization security solutions to secure production-oriented virtualized data centers and internal clouds. The company's initial product line includes the industry's first-ever purpose-built virtual firewall with integrated intrusion detection, a software security appliance that runs in a virtualized environment. Data center administrators can pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. Founded by security and networking experts from Check Point Software, Cisco, NetApp and Oracle, Altor Networks is funded by Accel Partners and Foundation Capital and is headquartered in Redwood City, California. For more information, visit www.altornetworks.com.

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.