This website uses cookies to ensure you have the best experience. Learn more

5 Nine Software: Cloud Security For Hyper V Analysis

1516 words - 6 pages

Security is a life-threatening part in an organization or company and with a high virtualization rate, it becomes even more critical and difficult to manage. It is, indeed, really difficult to protect one’s virtual machines and network, and the difficulty keeps rising for a cloud service provider. There are enormous quantity for a cloud computing’s security software out there, such as Panda Cloud protection, Symantec Cloud Security and so on.
In this report I have chosen 5Nine Cloud Security for Hyper- V.
5NINE’s Cloud Security for Hyper-V are the first agentless security product built for Microsoft Cloud OS and Hyper – V. This software is specifically designed and created to protect shops that have or use clouds based on Hyper-v.
Hyper-V Cloud is an initiative by Microsoft to provide a virtualization and virtualization management software for customers, and also make it easier for business to virtualize existing server hardware assets and move them either to a private or public cloud. 5Nine software is currently the only developers for Hyper-V cloud security.
5Nine software consists of 3 main components which are Management service, Management Console, and Host management service. Management service acts as the management server, Management Console is for 5Nine Cloud Security centralized management while the Host Management Service is basically the software and agent running on the Hyper-V host itself.
Besides, it allows users to secure multi-tenant Hyper-V environment and provide VM isolation. It also protects Hyper-V with fast and agentless antivirus. Other than that, it also enforces PCI-DSS, HIPAA and Sarbanes – Oxley compliance. Furthermore, it is now available worldwide.
This software can help users to secure their data integrity, confidentiality and availability from being altered, leaked, and from being damaged by unauthorized person or hacker.

2 Technical Description

This section list the requirements for this software

2.1 System Requirements[1]

Supported Operating Systems:

• Windows Server
o Windows Server 2012 R2
o Windows Server 2012 R2 Core
o Windows Server 2012
o Windows Server 2012 Core
• Microsoft Hyper-V Server
o Microsoft Hyper-V Server 2012 R2
o Microsoft Hyper-V Server 2012
• Windows 8.x with Hyper-V Role Enabled

• Microsoft SQL Server
• Microsoft SQL Express
• .NET Framework 4.5 or higher
• Microsoft PowerShell

For the host, Microsoft Windows Server 2012 or Microsoft Windows Server 2012 R2 or Microsoft Windows 8 Professional with enabled Hyper-V role are required to run the software, while for the guest, any Virtual Machine can be used.

3 Security Features
This section will generally discuss the features of the product, what it does and what it can do.
3.1 Key Features
This product helps to enforce PCI-DSS, HIPAA, and Sarbanes – Oxley Compliance standards.
It can do a virtual machines separation or segmentation. Moreover, it can...

Find Another Essay On 5NINE Software: Cloud Security For Hyper-V Analysis


4013 words - 16 pages COURIER EXCHANGE -DESCRIPTION ANDCRITICAL ANALYSIS OF AWEB-BASED ORGANIZATION AS INTERFACE FOR AVIRTUAL COMMUNITYIN HYPER-COMPETITIVE LANDSCAPES.byThomas KostrzewaCoursework essay fore-business option"M21 - Web-Based Social Forms" submitted in partial fulfillment of the requirements for the degree ofMSc in E-business and InnovationSupervisorPh. D. Richard GiordanoBirkbeck - University of London2005OpeningE-VOLUTION IN AN E-COLOGY?In order to

F/CFAT : An Approach for Combined Safety and Security Analysis

1486 words - 6 pages , when FTA is applied for the safety analysis of software system a new challenge is faced. This is because for those systems it is more desirable to carry out safety analysis with fault tress before the system design stage [2]. Such an analysis provides very useful information and concrete safety requirements for subsequent system design and implementation [4]. However such an approach raises the question about the correctness of the generated

Enhancements of the software for Time Performance Analysis of Recursive Algorithms

1075 words - 5 pages algorithm is done by calculating the amount of computing resources such as memory space, and running time needed to execute the algorithm. The complexity of an algorithm can be determined based on the resources used by the particular algorithm. The amount of computing resources utilized depends on the dimension of input data also called as input's size. Current Software for Recursive Algorithm Time Efficiency Analysis Educational Software

Randomness Recommendations for Security Security systems today are built on increasingly strong cryptographic algorithms that foil pattern analysis attempts

985 words - 4 pages such unpredictable numbers is an open wound in the designof cryptographic software. For the software developer who wants tobuild a key or password generation procedure that runs on a widerange of hardware, the only safe strategy so far has been to forcethe local installation to supply a suitable routine to generaterandom numbers. To say the least, this is an awkward, error-proneand unpalatable solution.It is important to keep in mind that the

Political Analysis of the Novel 'V for Vendetta'

1112 words - 4 pages Kyle Esposito226-51-2402Transfer StudentFall 2010'V for Vendetta'A Political AnalysisIn this paper I would like to focus on the masses and Evey in 'V for Vendetta' since they seem to me a close correlation to what is occurring today. In this essay, I will be going over the political consciousness of these entities, their growth over the course of the novel, what ideas and conclusions drive them to make the decisions that they do, and what

V for Vendetta critical analysis - St. Mary's High School - Critical Essay

805 words - 4 pages V for Choice Freedom is something we always sought, an essential to live our lives to the fullest. Still, there are others who will take that away for order. The film V for Vendetta is about a person named V pursuing freedom in face of conformity. The film suggests that it is a matter of choice to choose between freedom and being conformed. A scale can be an example, when choosing more freedom there is less conformity but when choosing more

Supreme Court Case Analysis for Reed v. Reed - US Government - Essay

1387 words - 6 pages ​ ​Fourteenth​ ​Amendment​ ​applied​ ​to​ ​women’s​ ​rights,​ ​even​ ​after​ ​the unanimous​ ​decision​ ​made​ ​in​ ​​Reed​ ​v.​ ​Reed​ ​​in​ ​favor​ ​of​ ​those​ ​rights.​ ​The​ ​irrational​ ​decisions determined​ ​by​ ​the​ ​law​ ​was​ ​one​ ​of​ ​the​ ​main​ ​motivators​ ​for​ ​Sally​ ​Reed.​ ​Sixteen​ ​of​ ​her​ ​lawyers backed​ ​out​ ​telling​ ​her​ ​that​ ​she​ ​would​ ​not​ ​win​ ​the​ ​case​ ​which​ ​further​ ​pushed​ ​her​ ​to​ ​fight​ ​for​ ​her

Cloud Computing

1666 words - 7 pages purchase the equipment. When this is the case, an organization will choose to migrate their network infrastructure to a cloud computing environment. Cloud computing allows for a company to implement a large scale network without having to incur expenses for modifying the building infrastructure. Cloud computing can offer three services; infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). A firm’s needs in

microsoft hyper-v

1504 words - 7 pages part of windows server-2008; basically it is the feature of windows server 2008.organization does not have to buy additional tools for virtualization features like backup and quick migration. Hyper-v’s open architecture enables internal development teams and third-party software developers to build enhancements to the technology and tools. 2.1.1 Flexible Virtualization Capabilities:- Hyper-V is part of the Microsoft datacenter-to-desktop

Cloud Computing: Email and Storage Services

3759 words - 15 pages application, it can be offloaded and ran by the infrastructure of the service provider and provided through the cloud for the organization to access. According to Rouse (2010), benefits of the SaaS model include: • easier administration • automatic updates and patch management • compatibility: All users will have the same version of software. • easier collaboration, for the same reason • global accessibility. Hybrid Cloud A hybrid cloud provides

A review to cloud computing modeling,simulations and testing techniques

1707 words - 7 pages simulators based on software and simulators based on both software and hardware. These simulators are used in validation of those models Section 2 (modeling) and section 3 (simulation) technology is a suitable tool for evaluating cloud performance and concerned security issues but for evaluating QOS , cloud based web applications are tested by stimulated real world web traffic. Cloud testing termed as testing as a service, which is reviewed in

Similar Essays

Analysis Of Cloud Computing Security

1549 words - 7 pages . Performance: The performance of the cloud computing security is quick and it uses all the resources available to it for the security related issues. 6. User Friendly: The cloud computing is user friendly to some extend related to the security concern issue. The cloud users can access their data stored in cloud in different client machines. 7. Portability: The cloud computing can be used in any platform without deployment of software can be run

Fingerprint Recognition Software Use For Banking Security

2276 words - 9 pages Recognition Software Use for Banking Security Today, consumer fraud and identity theft are major concerns for many organizations. Due to the amount of personal information and resources held by banking institutions, security is one of the most important issues that they face. Many studies have been completed and tested in order to find the best way for these organizations to authenticate the identity of their customers. Biometrics provides technology

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

The Identification And Analysis Of Information System In The Business Enterprise At Each Management Level, The Suitability Of Information System For The Chosen Firm, The Security Of The Information...

3968 words - 16 pages REPORT INTRODUCTION: In this modern time, it is impossible to run a business without any information system. Whether the business is small or large, information system is very much needed for the survival of the business. This report will deal with the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the