Virtualization Security

Virtualization Security



Virtual Server & Data Centre Protection



> Integrated & extended threat protection for VMware, Citrix Xen, Microsoft Hyper-V, Red Hat KVM, Oracle VM and more

> Inspect and protect inter-server traffic

> Turn each virtual server instance into a security sensor

> Fast, easy deployment for global IT security policy enforcement

> Security protection for your systems in Amazon AWS and other public cloud deployments

> Enforces security wherever virtual machines (VMs) are deployed


> Accelerate and simplify your Payment Card Industry Data Security Standard (PCI DSS) and other key audit and compliance

> Reduce cost and complexity over using physical security solutions in virtual infrastructures

> Security for AWS environments in the public cloud




Securing Virtual Environments
Helping customers to be more cost-effective, compliant and secure by delivering integrated and optimised security for virtual data centers.

Graph below shows tops reasons why organisations, CIOs, IT Managers have not adopted virtualisation more widely - mostly attributed to lack of confidence of security.

Deploying perimeter only security is not enough...you need security controls within your virtual machines and datacentre.



Security Solutions for Virtual Servers & Software-Defined Data Centre
  • Defends file systems, processes and memory on Windows and Linux with minimal impact on the virtual machines due to lightweight anti-malware footprint. 
  • Protection on all the known hypervisors - VMware vShield VMware ESXi, Citrix Xen, Microsoft Hyper-V, Red Hat KVM, Oracle VM and more. 
  • Extends the security level with process and memory scanning. 
  • Security for Virtual and Cloud Environments offers best security for public and private cloud solutions, virtual servers and virtual desktops (VDI).


  • Firewall 
  • IDS (Intrusion Detection) 
  • IPS (Intrusion Prevention)
  • Access Control
  • Policy enforcement
  • Audit

  • Application identification. 
  • Layer 7 application aware traffic steering. 
  • QoS / bandwidth management. 
  • Virtual network / VLAN segmentation and traffic assignment. 
  • Anti-Virus, Anti-Maware, URL Filtering for Web and Email traffic.




Solution Features & Benefits


Forensic Analysis  
You can not rely on zero-day vulnerability patch releases, because certain organisations (for example, gov spy agencies) will want to utilise that vulnerability for as long as possible to exploit / spy.
  • Real-time detection
  • Visibility into every application, asset, packet and connection in the datacentre.


Deep Packet Inspection  
Turn each server into a network sensor enabling you to inspect traffic and answer “how do I found out what is good or bad traffic in my network / datacentre”. 



Security Policy Enforcement




Virtual Server Segmentation

Better enforcement of security policies by isolating and controlling communications between applications, workgroups and tenants. 
 


Virtual Server Firewall
 

Inspect virtual ('east/ west') switch traffic
 
Access control 
Enable communications over ports and protocols necessary for correct server operation and to block all other ports and protocols, reducing the risk of unauthorised access to the server(s).

Traffic Filtering
Firewall rules on: IP addresses, Mac addresses, ports, and more. Different policies can be configured for each network interface. 

Anti-Malware & Bot Control 
Bot is a malicious, stealthy software that invades your virtual network and allows criminals to remotely control your virtual servers.

DNS Security
Log, record and manage data and access requests – useful to understand who is accessing your assets.




Virtual Server Optimisation


Less load on your computing resources  
Designed for even high density environments, virtual server scanning and analysis is off-loaded from protected virtual machines to a dedicated security virtual appliance resulting in optimised scan performance, reduced resource utilisation, and increased management visibility - offering a more efficient way to protect your virtualised environments (place less load on your processors, memory, storage and I/O, that you want to utilise for your core business applications). 



Hypervisor Platform Support
  • Support for leading hypervisors including VMware vSphere, Microsoft Hyper-V, and Xen.
  • Supporting both hypervisor, L2, L3, and SDN deployments
  • User authentication with LDAP RADIUS and LDAP
  • Microsoft Active Directory authentication
  • OpenStack Support


Compliance & Audit

  • Address and run automated reports specifically designs for answering compliance questions within virtual environments.
  • PCI DSS, HITECH / HIPAA and EU Data Privacy Directive.


Encryption
Encrypt entire virtual machine instances and attached storage volumes (All data is encrypted, even in archives including snapshots and backups).
    • Virtual Endpoint Optimisation through virtual server security service - off loads real-time analysis from protected machines. Optimises scan performance, reduces resource utilisation, and increased management visibility.
    • Virtual Server Firewall: Filter traffic utilising firewall rules on: IP addresses, Mac addresses, ports, and more. Different policies can be configured for each network interface.
    • Integration and management of VMware NSX. 
    • 24x7 GIAC-certified Security Analyst expertise to assist with incident remediation.  
     




    Also See


    > Microsoft Hyper-V Security




    Contact us today to discuss your requirements in more detail.



    P: +44(0)7714 209927

    S: +44(0)1273 329753

    info@securenetconsulting.co.uk