Cloud Security for Azure

5nine Cloud Security for Azure

The only security suite specifically designed and optimized for Microsoft Azure

The only security suite specially designed and optimized for Azure

5nine Cloud Security protects Azure virtual machines, networks and disks. Organizations can take advantage of a simple GUI console, which includes a virtual firewall, agentless antivirus with optimized scanning, deep packet inspection, intrusion detection (IDS), and network analytics with granular user and tenant access control. Today, businesses of any size can meet their industry’s compliance and regulatory needs without deploying multiple point solutions.

Technical Differentiators

null

Unified Security Suite

A single solution for virtual firewall,
agentless antivirus with optimized scanning, deep packet inspection, intrusion detection (IDS), and network analytics.

null

Easy Network Logging

Automatically configure resource providers and Azure resource groups on every security network without having to access the Azure Portal.

null

Simple and Intuitive Interface

Built-in firewall rule templates, quick configurability, intuitive management and same GUI console as on-premises version simplifies management.

null

Prevents Antivirus Storms

Patented technology only analyzes files that have been created, accessed or changed since the last scan resulting in 70X faster scans, less disruption and almost no performance impact.

null

Automatic, Immediate Protection

Ensures agile VM deployment and security by automatically and immediately protecting newly created VMs in an Azure Resource Group.

null

Agentless Introspection

The virtual appliance runs outside of the VMs it is protecting and does not require additional software or agents and supports all guest operating systems, including Windows and Linux.

null

Granular Tenant Isolation

Users are assigned specific networking resources which only they can access which improves Quality of Service (QoS) and prevents infected VMs from attacking others.

null

No Hardware Required

Virtualized security components which can be created on-demand and changed at scale eliminate the need for hardware components like routers and firewalls.

null

Supports Any Guest OS

The virtual appliance runs outside of the VMs it is protecting and does not require additional software or agents and supports all guest operating systems, including Windows and Linux.

Cloud Security Features

Azure Subscription Management

Protect Azure VMs without having to enable network logging through the Azure Portal. With 5nine Cloud Security you do not have to continually configure resource providers, register new providers, create Azure Resource Groups, configure logging, enable diagnostics or configure log settings.

  • Easily populate Microsoft Azure credentials directly into the 5nine Cloud Security console
  • Select the resource groups to monitor and 5nine Cloud Security takes care of the rest
  • The system automatically retains settings for each administrator
  • An intuitive interface eliminates the pain of continually accessing the Azure Portal

Virtual Firewall

The 5nine Cloud Security virtual firewall allows organizations to control all inbound, outbound, and VM-to-VM traffic by intercepting and inspecting network packets in the virtual appliance before they reach their virtual machines and virtual networks.

  • Configure firewall rules to allow or block inbound or outbound traffic
  • Apply rules to specific VMs, IP addresses, MAC addresses, or VLAN IDs
  • Monitor broadcast, unicast, or multicast transfers across a variety of protocols, including ICMP, IGMP, TCP, UDP, GRE, or ICMPv6
  • Protocols can be defined manually
  • The system supports both IPv4 and IPv6

Deep Packet Inspection (DPI)

The 5nine Cloud Security virtual firewall offers DPI on HTTP and DNS packets.

  • The system allows the data portion of the network packet to be inspected for specific strings or URLs even if the traffic passed through the firewall
  • Block specific sites which could disrupt network traffic or distract end users, like social media or file-sharing websites

Agentless Antivirus

5nine Cloud Security has built-in AV so that organizations do not need to acquire and deploy third-party antivirus solutions separately. Active Protection™ looks for threats on the VMs as they are written to the disk. When a vulnerability is discovered, 5nine Cloud Security immediately notifies you before it has a chance to spread throughout the network.

  • The platform includes the licenses and AV signatures from either Bitdefender, Kaspersky Labs or ThreatTrack
  • 5nine Cloud Security protects VMs at the networking layer through a virtual router, and does not require an antivirus agent to be installed
  • There is no dependency on the end-user to install a security solution or run antivirus
  • The system prevents malicious tenants from uninstalling security components running in the VM
  • Meet compliance objectives that mandate admins cannot have VM access to install agents
  • Protect all guest operating systems supported by Azure, including Windows and Linux
  • Prevent antivirus storms that slow down VMs and cause noticeable performance impact

Intrusion Detection System (IDS)

Cisco Snort IDS rules are integrated into 5nine Cloud Security to identify different types of network attacks, including DoS/DDoS, direct access attacks, cross-site scripting, brute force, buffer overflows, CGI attacks, stealth port scans, and much more.

  • If an issue is discovered the admin is alerted, and a detailed description of the threat is provided with recommended remediation actions.
  • Cisco Snort licenses and support is provided by 5nine to ensure you only have one point of contact for your security needs.
  • IDS updates can be scheduled and downloaded through a proxy server, which protects the security management server from being connected to the public internet

Automatic Protection

Assign VMs to groups and apply security settings to them automatically.

  • The system ensures security policies are updated and applied in dynamic environments where VMs are rapidly deployed and destroyed
  • 5nine Cloud Security applies security to virtual machines as soon as they are created and placed into a security group
  • Newly created VMs can also have the virtual firewall, antivirus or intrusion detection system (IDS) automatically enabled
  • Group multiple VMs and push settings to that collection to streamline bulk security or compliance changes

Quality of Service (QoS)

Manage network bandwidth configurations for each VM

  • The system automatically enforces a policy that prevents any VM from consuming too many network resources
  • 5nine Cloud Security mitigates the risk of impacting the performance of other VMs, services or users
  • Configure a maximum amount of bandwidth for both inbound and outbound traffic

Network Statistics & Analytics

Get complete visibility into your virtual network’s usage.

  • View all inbound and outbound network traffic statistics and connections
  • Traffic is presented in both table and graph formats
  • Filter information by direction, protocol, state, port, IP address and more

Network Logging

Log all the network traffic within your Azure Resource Groups.

  • Each inbound and outbound packet which passes through the virtual router is logged with a timestamp, action, protocol, type, VLAN, source and destination information
  • The system retains information for a configurable number of records or days
  • Filter data or perform advanced analytics for testing, optimization or incident triage
  • 5nine logs are extensible and written in the Syslog format (optionally with RFC5424 headers), to be forwarded to other SIEM systems for analysis, such as Splunk or Microsoft OMS

Events Logging

Any change made to the security management system, services or virtual infrastructure component is logged. Administrator actions are also logged to ensure compliance.

  • The platform provides visibility into health and change status for compliance purposes
  • Each audited event includes details like categories, objects, operations, targets, servers, and the results of the operation
  • The system logs all user actions, tracks changes and is immutable to prevent tampering.

Granular User and Tenant Management

Role-based access control for each admin and tenant provides isolation across virtual resources.

  • Access 5nine Cloud Security as an administrator or with read-only access using Windows security credentials or a custom account
  • Apply tenant-level permissions to grant administrators access to specific security features
  • By separating users and their resources, 5nine reduces the risk of threats passed between them

Alerts and Email Notifications

5nine Cloud Security provides a variety of email alerting options so that admins receive notifications as soon as an issue is detected.

  • Easily customize the frequency of communications
  • Select from different threat categories
  • Configure email alerts using an SMTP mail server

Highly-Available Security Management Infrastructure

5nine Cloud Security for Azure is managed from a centralized GUI console running from a Windows computer, removing the need for admins to log into the Azure Portal to manage their security.

  • The system supports an architecture where the management servers are redundant and can be run on physical servers or in clustered VMs
  • The SQL database can be clustered and replicated to a backup location
  • The management portal can be made redundant by having multiple consoles
  • Different management servers can be mapped to individual Azure Resource Groups to distribute the processing overhead

See why 5nine Cloud Security is the leading
Microsoft Cloud security solution in this short demo

Unified Azure and Hyper-V Management is Here! 5nine Cloud Manager Now in Public PreviewLearn More
+