5nine Cloud Security for Hyper-V
March 03, 2014
$499 per two CPU per year.
For the Hyper-V cloud provider with a multi-tenant environment, Cloud Security enables good granularity for the security administrators of the various tenants. Each tenant can manage its own virtual machines, but the extent of that management is controlled by the enterprise administrator. This layered, role-based security is very "Microsoft-ish," and administrators in MS shops will feel right at home.The product provides a virtual stateful inspection firewall, an anti-virus system and an intrusion detection system. This functionality is tied together in a compact management console with the familiar MS look and feel. The anti-virus engine - Vipre - also has an extension that 5Nine calls Active Protection. That basically is a real time AV service placed on the virtual machine itself. It provides real-time protection while the other AV engine provides scanning. The scanning is incremental so the AV explosion is kept to the minimum.
The IDS is based on Snort and new rules take only a couple of clicks to create. The firewall is a filtering extension to the virtual switch and operates in kernel mode. Because this product is tightly coupled to Hyper-V, there is a lot of functionality that results. For example, there is a plugin for MS VMCenter that allows the security administrator to manage from that.
At a glance
Product 5nine Cloud Security for Hyper-V
Company 5nine Software
Price $499 per two CPU per year.
What it does Provides security in a virtual environment for Hyper-V systems.
What we liked Security tightly coupled to Microsoft Hyper-V.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed
- Puush urges users to change passwords after cyber attack