Cloud Security for Azure

5nine Cloud Security for Azure

The only security suite specifically designed and optimized
for Microsoft Azure

The only security suite specifically designed and optimized for Azure

5nine Cloud Security protects Azure virtual machines, networks and disks. Organizations can take advantage of a simple GUI console, which includes a virtual firewall, agentless antivirus with optimized scanning, deep packet inspection, intrusion detection (IDS), and network analytics with granular user and tenant access control. Today, businesses of any size can meet their industry’s compliance and regulatory needs without deploying multiple Microsoft Azure cloud security solutions.

  Product Overview 

Technical Differentiators

Cloud Security Features

Azure Subscription Management

Azure Subscription Management

 

 

Protect Azure VMs without having to enable network logging through the Azure Portal. With 5nine Cloud Security you do not have to continually configure resource providers, register new providers, create Azure Resource Groups, configure logging, enable diagnostics or configure log settings.

  • Easily populate Microsoft Azure credentials directly into the 5nine Cloud Security console
  • Select the resource groups to monitor and 5nine Cloud Security takes care of the rest
  • The system automatically retains settings for each administrator
  • An intuitive interface eliminates the pain of continually accessing the Azure Portal
Virtual Firewall

Virtual Firewall

 

 

The 5nine Cloud Security virtual firewall allows organizations to control all inbound, outbound, and VM-to-VM traffic by intercepting and inspecting network packets in the virtual appliance before they reach their virtual machines and virtual networks.

  • Configure firewall rules to allow or block inbound or outbound traffic
  • Apply rules to specific VMs, IP addresses, MAC addresses, or VLAN IDs
  • Monitor broadcast, unicast, or multicast transfers across a variety of protocols, including ICMP, IGMP, TCP, UDP, GRE, or ICMPv6
  • Protocols can be defined manually
  • The system supports both IPv4 and IPv6
Deep Packet Inspection (DPI)

DPI

 

 

The 5nine Cloud Security virtual firewall offers DPI on HTTP and DNS packets.

  • The system allows the data portion of the network packet to be inspected for specific strings or URLs even if the traffic passed through the firewall
  • Block specific sites which could disrupt network traffic or distract end users, like social media or file-sharing websites
Agentless Antivirus

Agentless Antivirus

 

 

5nine Cloud Security has built-in AV so that organizations do not need to acquire and deploy third-party antivirus solutions separately. Active Protection™ looks for threats on the VMs as they are written to the disk. When a vulnerability is discovered, 5nine Cloud Security immediately notifies you before it has a chance to spread throughout the network.

  • The platform includes licenses and AV signatures from Bitdefender.
  • 5nine Cloud Security protects VMs at the networking layer through a virtual router, and does not require an antivirus agent to be installed
  • There is no dependency on the end-user to install a security solution or run antivirus
  • The system prevents malicious tenants from uninstalling security components running in the VM
  • Meet compliance objectives that mandate admins cannot have VM access to install agents
  • Protect all guest operating systems supported by Azure, including Windows and Linux
  • Prevent antivirus storms that slow down VMs and cause noticeable performance impact
Intrusion Detection System (IDS)

Intrusion Detection System (IDS)

 

 

Cisco Snort IDS rules are integrated into 5nine Cloud Security to identify different types of network attacks, including DoS/DDoS, direct access attacks, cross-site scripting, brute force, buffer overflows, CGI attacks, stealth port scans, and much more.

  • If an issue is discovered the admin is alerted, and a detailed description of the threat is provided with recommended remediation actions.
  • Cisco Snort licenses and support is provided by 5nine to ensure you only have one point of contact for your security needs.
  • IDS updates can be scheduled and downloaded through a proxy server, which protects the security management server from being connected to the public internet
Automatic Protection

Automatic Protection

 

 

Assign VMs to groups and apply security settings to them automatically.

  • The system ensures security policies are updated and applied in dynamic environments where VMs are rapidly deployed and destroyed
  • 5nine Cloud Security applies security to virtual machines as soon as they are created and placed into a security group
  • Newly created VMs can also have the virtual firewall, antivirus or intrusion detection system (IDS) automatically enabled
  • Group multiple VMs and push settings to that collection to streamline bulk security or compliance changes
Quality of Service (QoS)

Automatic Protection

 

 

Manage network bandwidth configurations for each VM

  • The system automatically enforces a policy that prevents any VM from consuming too many network resources
  • 5nine Cloud Security mitigates the risk of impacting the performance of other VMs, services or users
  • Configure a maximum amount of bandwidth for both inbound and outbound traffic
Network Statistics & Analytics

Network Statistics & Analytics

 

 

Get complete visibility into your virtual network’s usage.

  • View all inbound and outbound network traffic statistics and connections
  • Traffic is presented in both table and graph formats
  • Filter information by direction, protocol, state, port, IP address and more
Network Logging

Network Logging

 

 

Log all the network traffic within your Azure Resource Groups.

  • Each inbound and outbound packet which passes through the virtual router is logged with a timestamp, action, protocol, type, VLAN, source and destination information
  • The system retains information for a configurable number of records or days
  • Filter data or perform advanced analytics for testing, optimization or incident triage
  • 5nine logs are extensible and written in the Syslog format (optionally with RFC5424 headers), to be forwarded to other SIEM systems for analysis, such as Splunk or Microsoft OMS
Events Logging

Events Logging

 

 

Any change made to the security management system, services or virtual infrastructure component is logged. Administrator actions are also logged to ensure compliance.

  • The platform provides visibility into health and change status for compliance purposes
  • Each audited event includes details like categories, objects, operations, targets, servers, and the results of the operation
  • The system logs all user actions, tracks changes and is immutable to prevent tampering.
Granular User and Tenant Management

 

 

Role-based access control for each admin and tenant provides isolation across virtual resources.

  • Access 5nine Cloud Security as an administrator or with read-only access using Windows security credentials or a custom account
  • Apply tenant-level permissions to grant administrators access to specific security features
  • By separating users and their resources, 5nine reduces the risk of threats passed between them
Alerts and Email Notifications

Alerts and Email Notifications

 

 

5nine Cloud Security provides a variety of email alerting options so that admins receive notifications as soon as an issue is detected.

  • Easily customize the frequency of communications
  • Select from different threat categories
  • Configure email alerts using an SMTP mail server
Highly-Available Security Management Infrastructure

Granular User and Tenant Management

 

 

5nine Cloud Security for Azure is managed from a centralized GUI console running from a Windows computer, removing the need for admins to log into the Azure Portal to manage their security.

  • The system supports an architecture where the management servers are redundant and can be run on physical servers or in clustered VMs
  • The SQL database can be clustered and replicated to a backup location
  • The management portal can be made redundant by having multiple consoles
  • Different management servers can be mapped to individual Azure Resource Groups to distribute the processing overhead

See why 5nine Cloud Security is the leading Microsoft Cloud security solution in this short demo