What’s New in #5nine Cloud Security v6 For Hyper-V? @5nine_Software #HyperV

Hello Folks,

I am glad to share with you that 5Nine Software just released the latest Cloud Security Version 6 for Hyper-V.

Introduction

5nine Cloud Security is the first and only agentless security and compliance solution built specifically for the Microsoft Cloud Platform and Hyper-V virtual machines running Windows and Linux. The solution provides multi-layered protection with an integrated virtual firewall, agentless antivirus and malware protection, along with an Intrusion Detection System (IDS) all in one package!

In today’s blog post, I will share with you the latest features and enhancements that have been added into 5nine Cloud Security v6 for Hyper-V.

1- NEW ANALYSIS AND ALERTING FOR NETWORK TRAFFIC ANOMALIES

5nine_cloud_security_whats_new_6_01

5nine Cloud Security will create a baseline of normal network traffic patterns for your virtualized environment, then when it identifies an anomaly it will alert the administrator that a threat could be present.

You can detect a variety of threats from suspicious network behavior and other advanced threats.
5nine constantly logs and monitors statistics about your historical traffic, packets, and their sizes, and if the values exceed the configurable alert sensitivity setting it will immediately notify you about the possibility of an attack.

With 5nine Cloud Security you can now meet the security and compliance requirements for your business by being able to analyze and report on your historical data as a network forensics tool.

2- PROTECT AGAINST NEW TYPES OF SECURITY & SPOOFING ATTACKS

5nine_cloud_security_whats_new_6_02

5nine Cloud Security has enhanced its own security once again by checking that its own security reporting data is not being spoofed. This will ensure that information coming into the system has not been tampered with in any form on its way using error checking code.

This can also be used to control communication between different VMs. It helps to verify that there has been no information altered, such as transforming data or disabling various extensions, during the transmission process. It can be managed individually for each VM using settings to avoid system overload.

Tо strengthen 5nine Cloud Security’s anti-spoofing detection, the system can now perform packet size and payload length checks for all packets coming into the system. This can prevent possible scenarios like a buffer overflow attack, which can let one VM write to the memory of another VM.

3- ENHANCED FIREWALL PROTECTION WITH IP ADDRESS MATCHING

5nine_cloud_security_whats_new_6_03

Increase your protection with the new IP address matching option to identify a specific server in the filtering rules. 5nine Cloud Security can now check whether inbound or outbound network traffic comes from a specific local IP addresses.

This option could be used to ensure that certain network protocols only go over specific virtual network adapters, or to force all SQL Server traffic to go to a particular virtual machine with a static IP Address.

4- AUTOMATE & SCHEDULE FIREWALL RULES

5nine_cloud_security_whats_new_6_04

Increase control over your system and it’s settings by specifying firewall rule timeframes. Many organizations like financial institutions might provide remote (RDP) access to VMs during trading hours, but in the evening they might want to deactivate these connections.

To avoid having to manually perform these daily security best practices, you can use rules and scheduling tools to define, filter, and tune VM access. This enterprise class feature is implemented within the driver, hiding it from attempts to disable or spoof the scheduler, and it also offers local time zone support for hosts distributed across multiple datacenters.

5- IMPROVED DATACENTER INTEGRATION THROUGH FLEXIBLE FRAME SIZE SUPPORT

5nine_cloud_security_whats_new_6_05

Manage and specify any custom frame type for traffic rules. Frame type and size depends on the specific hardware manufacturer and can end up blocking service packets from communicating with network hardware.

These have to be properly defined and preconfigured within the system, proving integration and advanced networking capabilities for enterprises.

6- MONITOR THE AVAILABILITY OF 5NINE CLOUD SECURITY COMPONENTS

5nine_cloud_security_whats_new_6_06

Feel assured that specific 5nine Cloud Security services are available and healthy with the new host state monitoring capabilities.

The system watches for the health state of the components, including the Host Service, Antivirus Service, Change Block Tracking Service and 5nine’s Hyper-V virtual switch filtering extension.

Now IT admins can see the current state of the components from the console and can review the history of changes in state for a specific host without the need to manually check each service. Even the 5nine Cloud Security filtering log has been enhanced by adding new sorting options, such as VLAN.

5nine Cloud Security v6 is available immediately. For more information, or to download a free 30-day trial version, please visit: http://www.5nine.com/5nine-security-for-hyper-v-product.aspx

Until next time.

Cheers,
@Charbel

About Charbel Nemnom 292 Articles
Charbel Nemnom is a Microsoft Cloud Consultant and Technical Evangelist, totally fan of the latest's IT platform solutions, accomplished hands-on technical professional with over 15 years of broad IT Infrastructure experience serving on and guiding technical teams to optimize performance of mission-critical enterprise systems. Excellent communicator adept at identifying business needs and bridging the gap between functional groups and technology to foster targeted and innovative IT project development. Well respected by peers through demonstrating passion for technology and performance improvement. Extensive practical knowledge of complex systems builds, network design and virtualization.

Be the first to comment

Leave a Reply