What's new in 5nine Cloud Security for Hyper-V 8.1.920.0

Nov 15, 2016
  • Support of Windows Server 2016 and Windows Server Core 2016

New in 5nine Cloud Security for Hyper-V 8.0 (Nov 15, 2016)

  • Enhanced Logging for Easier Compliance and Reporting – By using the only security solution optimized for Hyper-V, you can maximize your performance by locally analyzing and securing your network traffic without routing packets through external appliances. 5nine Cloud Security v8 has been updated with dozens of logging enhancements to accommodate high load network traffic environments that create enormous amounts of data, meeting the high standards of many of the world’s leading compliance and regulatory organizations. Security administrators now have more information about the root cause of an issue to quickly help them identify which service or application is under attack to more quickly isolate the threat. Logging has been simplified through the additional filtering, data retention settings, and the ability to save logs to external locations where you can filter or analyze them with third party tools.
  • Improved Antivirus Engine Synchronization, Monitoring and Notifications – 5nine provides the only solution specifically designed to maximize your performance while securing Hyper-V with antivirus and antimalware capabilities. You get the choice of signatures provided by industry leaders Bitdefender, Kaspersky Lab or ThreatTrack. With 5nine Cloud Security v8 you get more robust AV job monitoring, faster and more reliable signature synchronization, and streamlined notifications, along with extended logging for Active Protection. Each AV alert now contains more information about the type and source of the error, helping the security administrator resolve the issue faster.
  • Simplified Intrusion Detection Analytics and Alerts to Isolate Threats Faster - 5nine Cloud Security provides multi-layered security with an integrated virtual firewall, agentless antivirus and malware protection, along with an intrusion detection system (IDS) all in one package. 5nine is designed to specifically address every Hyper-V security vulnerability using patent-pending technologies, and the latest release has made it even easier to detect intrusion threats using Cisco Snort for Business. The console has been enhanced with analytics and logging features to help you more easily identify the source, IP, protocol, and direction of the attack. Additional IDS information is now included in automated email alerts, allowing you to use this detailed information from Cisco Snort to research how to best isolate and remediate the threat before it becomes widespread.
  • Enterprise Scalability Enhancements - 5nine Cloud Security is built to support the largest Hyper-V customers with a highly-available and scalable design, including enterprises with multiple datacenters. 5nine allows you to set up security management servers in multiple locations, and it will synchronize security rules, settings and other data to ensure you have consistent policies throughout your environment. 5nine can connect into System Center Virtual Machine Manager (SCVMM), Azure Pack (WAP), and other management systems that support VDI, hosting and service providers of all sizes. Using 5nine you can centrally manage security for all of your users, services and virtual machines from a single console.
  • Streamlined Management of Upgrades and PowerShell Administration - 5nine Cloud Security integrates directly into your Hyper-V environment and simplifies administration of day-to-day security management tasks, while also providing auditing capabilities for easy compliance. Numerous administrative enhancements have been made to the console, and it is now much easier to upgrade to the latest version. Additionally you can now run 5nine’s PowerShell cmdlets using specified credentials, providing you with more granular control over security policies and changes for a limited amount of time. This offers administrators the ability to have increased control when they need to prevent a security threat from spreading, yet ensures that their access is controlled during normal operations.
  • New Capabilities with Azure Pack for Security as a Service (SECaaS) - 5nine Cloud Security Azure Pack (WAP) Extension is the only Security as a Service (SECaaS) solution designed to protect your datacenter, your customers, and their clouds as a free add-on to 5nine Cloud Security. It enables tenants to easily manage their own Windows and Linux security policies through the Azure Pack self-service portal. Not only will you enforce protection for your Hyper-V infrastructure and users, you can generate new revenue by offering Security as a Service. The latest enhancements provide more data for administrators to help them centrally manage security for their cloud, and tenants now have more control over their security policies. Additional protection has been added to ensure that tenants cannot see the underlying cloud fabric, to ensure that a malicious user cannot attack their own service provider.

New in 5nine Cloud Security for Hyper-V 7.1 (Nov 15, 2016)

  • Host Firewall Administration – Extended the capabilities of your virtual firewall beyond just protecting the VMs to also secure the Hyper-V host. New version leverages the universal virtual firewall and controls all traffic for every virtual machine as well as every physical network adapter. It offers you a single firewall solution to protect your entire virtualized infrastructure; including the host, virtual networks, virtual disks, and the virtual machines running Windows, Windows Server, or even Linux!
  • Intrusion Detection for Physical Networks – Guarantee higher levels of business continuity and reliability with features that will let you quickly identify when your physical hosts are being attacked. The new 5nine Cloud Security v7.1 filters the traffic and monitors for intrusion detection for the virtual networks and network adapters that are connected to the virtual switch. The new 5nine Cloud Security v7.1 monitors for intrusions for both the virtual and physical networks by analyzing traffic on virtual switch as well as on physical network adapters of every Hyper-V host. Intrusion detection analyzes network traffic for suspicious patterns across the virtual infrastructure by matching them to different threat definitions.
  • Deep Packet Inspection (DPI) Support - Achieve more granular control over VM traffic by supporting Deep Packet Inspection (DPI) on HTTP and DNS packets. Based on DPI rules, system administrator can granularly control access to external resources by blocking or allowing them individually, even after the network packet was allowed using standard IP rules.
  • Antivirus Policies - Specify antivirus security configurations, for selected VMs, to create custom policies for groups of virtual machines. Custom AV configuration for selected VMs includes enabling active protection state and mode, exclusions, scanned extensions, blocked and allowed threats. 5nine Cloud Security v7.1 supports different configurations for multitenant and diversified environments.
  • 5nine Cloud Security PowerShell - To manually configure security policies is a time-consuming and ineffective process for big datacenters with a diversified virtual infrastructure. Automating such processes by scripting with PowerShell is needed to allow organizations to scale and reduce misconfigurations. With the new 5nine Cloud Security v7.1, 5nine continues to enhance and update its PowerShell cmdlets, including adding the ability to easily configure different types of protection for a VM. Now you can optimize performance and security on large-scale systems, while reducing operational costs across your team.

New in 5nine Cloud Security for Hyper-V 7 (Nov 15, 2016)

  • Advanced Intrusion Detection through Integration with Snort for Business – 5nine Cloud Security v7 offers a more advanced subscription for intrusion detection (IDS) with Snort for Business. Snort provides a community continually reviews, tests, and offers improvements to the Snort source code to detect all possible types of network attacks. With the upgraded Business addition, you can now have centralized updating that you control, and immediate access to the latest signatures, instead of having to wait for up to a month.
  • Automatic & Immediate Protection with Default VM Security – Guarantee higher levels of business continuity and reliability with features that will let you automatically and immediately protect every virtual machine. With the new Default VM Security settings, you can instantly place a VM into a security group as soon as it is created, ensuring it has globally consistent firewall, intrusion detection, and network traffic scanning settings. Free up your valuable operational resources, increase performance, and reduce the risk of misconfigured security policies.
  • Enhanced Security Event Logging, Filtering and Reporting – 5nine Cloud Security continue to advance its logging capabilities, now allowing certain conditions to create automated responses to network security events so you can customize the event’s alerting threshold and retention policy. With new searching capabilities you can quickly find the event or alert you are looking for.
  • Centralized Notifications, Alerts and State Information - Prevent yourself from being overwhelmed with too much noise causing you to miss the important alarms. Through a centralized console you can see the security information across all your hosts and virtual machines. Now the entire 5nine Cloud Security solution can be monitored, including the different services and agents, to ensure that it is continually operational.
  • Antivirus and Intrusion Detection Scanning and Update Management - Gain even more precise control over the performance of your system by designating a maximum number of simultaneous AV scans. Update antivirus and intrusion detection signatures for your entire Hyper-V infrastructure through local proxy servers to keep hosts disconnected from the public Internet to minimize their vulnerability to being attacked. 5nine also boasts its unique host-based security management where definitions only have to be distributed to the Hyper-V host, without having to update the VMs themselves.
  • Network Traffic Anomaly Management - Acquire a security solution which adapts to you. 5nine Cloud Security continually logs and monitors statistics about your network traffic, packets, and their sizes. Then, using proprietary heuristics, it creates a baseline of your normal operating traffic throughout the day. It then continually monitors your environment, and if values exceed the alert sensitivity setting it will immediately notify you about the possibility of an attack.
  • Migrate Security Rules between Systems - Copy your security policies between different datacenters or labs even if you have multiple isolated datacenters or branch offices that have no direct connection. Migrate your 5nine Cloud Security settings to other environments to quickly grow your virtual e

New in 5nine Cloud Security for Hyper-V 6 (Nov 15, 2016)

  • New Analytics and Alerting for Network Traffic Anomalies – Detect a variety of threats from suspicious network behavior and other advanced threats. 5nine Cloud Security will create a baseline of normal network traffic patterns for your virtualized environment, then when it identifies an anomaly it will alert the administrator that a threat could be present.
  • Protect Against New Types of Security & Spoofing Attacks – Ensure that information coming into the system has not been tampered with in any form on its way using error-checking code and control communication between VMs. 5nine Cloud Security has enhanced its own security once again by checking that its own security reporting data is not being spoofed.
  • Enhanced Firewall Protection with IP Address Matching - Increase your protection with the new IP address matching option to identify a specific server in the filtering rules.
  • Automate & Schedule Firewall Rules - Increase control over your system and it’s settings by specifying firewall rule timeframes. Use rules and scheduling tools to define, filter, and tune VM access.
  • Improved Datacenter Integration through Flexible Frame Size Support - Manage and specify any custom frame type for traffic rules. Avoid blocking service packets from communicating with network hardware by making those properly defined and preconfigured within the system.
  • Monitor the Availability of 5nine Cloud Security Components - Feel assured that specific 5nine Cloud Security services are available and healthy with the new host state monitoring capabilities. Now admins can see the current state of the components from the console and can review the history of changes in state for a specific host without the need to manually check each service.

New in 5nine Cloud Security for Hyper-V 5.2 (May 8, 2015)

  • Agentless Antivirus and Antimalware Scanner and Job Scheduler NEW – Schedule individual or recurring antivirus jobs with the new job-based AV schedule. Make administration even easier by receiving regular email reports summarizing these scanning results. Improve security and protection of your business by eliminating 24/7 human maintenance.
  • Enhanced Auditing Capabilities NEW – Audit internal events made by Cloud Security and stay confident that changes that happen in your dynamic virtual infrastructure are logged. If something fails, you can immediately find out the moment, place and root cause of the issue.
  • Network Traffic Statistics NEW - Increase the security level of your business and data by better understanding the performance of your Hyper-V infrastructure to quickly identify anomalies. By identifying a traffic anomaly and isolating the threat at an early stage, you can save your datacenter. Track historical data and export the information to Excel, Word or PDF formats.

New in 5nine Cloud Security for Hyper-V 5.1 (Mar 9, 2015)

  • Real-Time Agentless Antivirus & Malware Detection NEW – Protect your virtual machines with new, real-time antivirus scans on a Virtual Switch Level. By matching the traffic patterns to signatures provided by industry-leaders Kaspersky or ThreatTrack Vipre, as soon as a virtual machine receives a virus or malware file via the HTTP protocol, system administrators will get an instant email alert so they can perform the necessary remediation actions.
  • Enhanced Traffic Filtering, Logging & Notifications NEW – Utilize support for IP NoSPI, ICMP extended parameters, VLAN tagging, L2 protocols rules, SPI packet logging, IDS and agentless web anti-malware notifications
  • Security as a Service with the new Azure Pack Extension NEW – Support Azure Pack with the brand new security solution that enables tenants to manage virtual firewall configurations and intrusion detection (IDS) to protect their virtual machines. Allows hosting providers to guarantee higher levels of business continuity and reliability by offering Security as a Service. 5nine Cloud Security WAP Extension is now only available as a Preview.
  • Integrated System Center VMM Management NEW – Meet new network and switch compliance plug-in for Virtual Machine Manager. It integrates fully with the Virtual Machine Manager Management Console to provide real-time, agentless protection of the virtualized servers, networks, storage and business critical applications for over 15,000 5nine Software customers.

New in 5nine Cloud Security for Hyper-V 5.0 (Nov 19, 2014)

  • New:
  • VM’s Connections Table
  • Detailed centralized view of VMs' Antivirus status
  • Firewall Rules Templates
  • Multiple Security Groups Membership
  • Full SCVMM Logical Switch compliance
  • Extended support for broadcast traffic rules
  • Security settings change log for audit/compliance
  • Notifications mechanism for security events

New in 5nine Cloud Security for Hyper-V 4.2 (Sep 8, 2014)

  • Disaster recovery sites support (real-time replication of security settings, virtual firewall rules, antivirus schedules and parameters to disaster recovery sites)

New in 5nine Cloud Security for Hyper-V 4.1 (May 1, 2014)

  • Support of multi-tenancy in workgroup/mixed environments

New in 5nine Cloud Security for Hyper-V 4.0 (Mar 30, 2014)

  • Enhanced multi-tenancy
  • VM Security Groups
  • NVGRE support
  • New LWF R2 Hyper-V switch extension
  • New antivirus active protection
  • Antivirus configuration enhancements such as path and file exclusions
  • Configurable quarantine
  • Granular User / Role – level access control