5nine Cloud Security v6 Adds Another Level of Protection with New Analytics and Alerting Capabilities

Orlando, FL (July 14, 2015) – 5nine Software, the leading global Hyper-V virtualization security and management provider, today announced the availability of 5nine Cloud Security v6, the first and only agentless security and compliance solution built specifically for the Microsoft Cloud Platform and Hyper-V virtual machines (VMs) running Windows and Linux. With the new 5nine Cloud Security v6, a user can be protected from a variety of new vulnerabilities from suspicious network behavior and other advanced threats. 5nine Cloud Security v6 creates a baseline of normal network traffic patterns for the user’s virtualized environment and when it identifies an anomaly, it alerts the administrator that a threat could be present. The new 5nine Cloud Security v6 helps meet the security and compliance requirements for any business by being able to analyze and report on the historical data as a network forensics tool.

“Recent security breaches and appearance of new more sophisticated malware specifically targeting virtualized environments clearly shows a growing need in advanced security solutions,“ said Symon Perriman, VP of Business Development, 5nine Software. “With this latest release of our flagship solution, 5nine introduces new standards of analytics and protection of the Hyper-V environment.”

5nine Cloud Security v6 also enhanced its own security once again by adding integrity checks to ensure that the data is not being spoofed. This will ensure that information coming into the system has not been tampered with in any form on its way using error-checking code. To strengthen 5nine Cloud Security’s anti-spoofing detection, the system can now perform packet size and payload length checks for all packets coming into the system. This can prevent possible scenarios like a buffer overflow attack, which can let one VM write to the memory of another VM.

Other features of 5nine Cloud Security v6 include:

  • Enhanced firewall protection with IP address matching;
  • Automated and scheduled firewall rules;
  • Improved datacenter integration through flexible frame size support;
  • Monitoring the availability of 5nine cloud security components.

For details on these new features, please visit http://www.5nine.com/5nine-security-for-hyper-v-product.aspx#features

5nine Cloud Security v6 is available immediately. It is licensed starting at $199 per 2 host CPUs. For more information, or to download a free 30-day trial version, please visit: http://www.5nine.com/5nine-security-for-hyper-v-product.aspx

About 5nine Software

5nine Software is the leading global Hyper-V virtualization security and management provider. It offers the first and only agentless security and management solutions for Microsoft Hyper-V. 5nine Software provides innovative, powerful and easy-to-use software designed to reduce costs, increase productivity and mitigate security risks. Today, 5nine Software helps more than 65,000 satisfied users around the globe to reach the full potential of their virtual infrastructure.

Founded in 2009, 5nine Software is headquartered in Chicago, with offices worldwide. Find out more by visiting http://www.5nine.com

George Chetcuti

Share
Published by
George Chetcuti

Recent Posts

5 ways to automate Kubernetes cluster management

While there are a several tools and platforms to automate Kubernetes cluster management, it’s important…

1 day ago

DevSecOps best practices to ensure quick and secure development

Organizations looking to unite application developers, security teams, and IT operations must implement DevSecOps best…

2 days ago

Microsoft 365 administration: More on configuring Microsoft Teams

Our Microsoft 365 administration series continues with more on configuring Microsoft Teams. In this article,…

2 days ago

Review: Powerful and secure faxing solution GFI FaxMaker

GFI FaxMaker is a powerful and complete solution that should meet the requirements of every…

2 days ago

Port in a storm: Creating port ACLs for Hyper-V for better security

There’s no rule that says that you have to make use of port ACLs, but…

3 days ago

Network appliances: A third way when servers and cloud just won’t cut it

If the cloud doesn't seem right and buying a server costs too much, maybe network…

3 days ago