5NINE Software: Cloud Security For Hyper-V Analysis

1649 Words4 Pages

Security is a life-threatening part in an organization or company and with a high virtualization rate, it becomes even more critical and difficult to manage. It is, indeed, really difficult to protect one’s virtual machines and network, and the difficulty keeps rising for a cloud service provider. There are enormous quantity for a cloud computing’s security software out there, such as Panda Cloud protection, Symantec Cloud Security and so on.

In this report I have chosen 5Nine Cloud Security for Hyper- V.

5NINE’s Cloud Security for Hyper-V are the first agentless security product built for Microsoft Cloud OS and Hyper – V. This software is specifically designed and created to protect shops that have or use clouds based on Hyper-v.

Hyper-V Cloud is an initiative by Microsoft to provide a virtualization and virtualization management software for customers, and also make it easier for business to virtualize existing server hardware assets and move them either to a private or public cloud. 5Nine software is currently the only developers for Hyper-V cloud security.

5Nine software consists of 3 main components which are Management service, Management Console, and Host management service. Management service acts as the management server, Management Console is for 5Nine Cloud Security centralized management while the Host Management Service is basically the software and agent running on the Hyper-V host itself.

Besides, it allows users to secure multi-tenant Hyper-V environment and provide VM isolation. It also protects Hyper-V with fast and agentless antivirus. Other than that, it also enforces PCI-DSS, HIPAA and Sarbanes – Oxley compliance. Furthermore, it is now available worldwide.

This software can help users to secure their ...

... middle of paper ...

...licious attacks. It can protect the confidentiality, integrity and availability of the customer’s data.

7 Reference

Internet

[1] 5NINE Software Inc.

Retrieved from:

http://www.5nine.com/Docs/5nineCloudSecurity_Guide.pdf

[2] David Davis (2013)

www.5nine.com/Docs/5nine_Free_Hyper-V_Security_White_Paper.pdf

[3] 5NINE Software Inc.

Retrieved from:

http://5nines.com/images/uploads/5N_Security%20Cloud%20Hosting%20Data%20c enter.pdf

http://www.5nine.com/5nine-security-for-hyper-v-product.aspx

http://www.5nine.com/Docs/5nineCloudSecurity_Datasheet.pdf

[4] Thomas Maurer (2014)

http://www.thomasmaurer.ch/2014/01/5nine-cloud-security-for-hyper-v-4-0/#prettyPhoto

[5] Cloud Times

http://cloudtimes.org/2012/11/22/cloud-security-alliance-guidelines-mobile-computing/

Inetco

http://www.inetco.com/_img/newsletter/110930/AGENTLESS_DIAGRAM.jpg

More about 5NINE Software: Cloud Security For Hyper-V Analysis

Open Document