Security is a life-threatening part in an organization or company and with a high virtualization rate, it becomes even more critical and difficult to manage. It is, indeed, really difficult to protect one’s virtual machines and network, and the difficulty keeps rising for a cloud service provider. There are enormous quantity for a cloud computing’s security software out there, such as Panda Cloud protection, Symantec Cloud Security and so on.
In this report I have chosen 5Nine Cloud Security for Hyper- V.
5NINE’s Cloud Security for Hyper-V are the first agentless security product built for Microsoft Cloud OS and Hyper – V. This software is specifically designed and created to protect shops that have or use clouds based on Hyper-v.
Hyper-V Cloud is an initiative by Microsoft to provide a virtualization and virtualization management software for customers, and also make it easier for business to virtualize existing server hardware assets and move them either to a private or public cloud. 5Nine software is currently the only developers for Hyper-V cloud security.
5Nine software consists of 3 main components which are Management service, Management Console, and Host management service. Management service acts as the management server, Management Console is for 5Nine Cloud Security centralized management while the Host Management Service is basically the software and agent running on the Hyper-V host itself.
Besides, it allows users to secure multi-tenant Hyper-V environment and provide VM isolation. It also protects Hyper-V with fast and agentless antivirus. Other than that, it also enforces PCI-DSS, HIPAA and Sarbanes – Oxley compliance. Furthermore, it is now available worldwide.
This software can help users to secure their ...
... middle of paper ...
...licious attacks. It can protect the confidentiality, integrity and availability of the customer’s data.
7 Reference
Internet
[1] 5NINE Software Inc.
Retrieved from:
http://www.5nine.com/Docs/5nineCloudSecurity_Guide.pdf
[2] David Davis (2013)
www.5nine.com/Docs/5nine_Free_Hyper-V_Security_White_Paper.pdf
[3] 5NINE Software Inc.
Retrieved from:
http://5nines.com/images/uploads/5N_Security%20Cloud%20Hosting%20Data%20c enter.pdf
http://www.5nine.com/5nine-security-for-hyper-v-product.aspx
http://www.5nine.com/Docs/5nineCloudSecurity_Datasheet.pdf
[4] Thomas Maurer (2014)
http://www.thomasmaurer.ch/2014/01/5nine-cloud-security-for-hyper-v-4-0/#prettyPhoto
[5] Cloud Times
http://cloudtimes.org/2012/11/22/cloud-security-alliance-guidelines-mobile-computing/
Inetco
http://www.inetco.com/_img/newsletter/110930/AGENTLESS_DIAGRAM.jpg
Server Virtualization: Server virtualization utilizes regular physical equipment to have virtual machines. A physical host machine could have any number of virtual machines running on it with the goal that one arrangement of equipment is utilized to run diverse machines. Virtual machines can be introduced with their own particular working framework and their own distinctive arrangement of utilizations; the working frameworks or applications don't should be the same over the virtual machines.
Virtual machines operate based on the computer architecture and functions of a real or hypothetical computer, and their implementations may involve specialized hardware, software, or a combination of both.
Firewall features are provided at the base of network virtualization platforms to bring about segmentation. It allows automated provisioning and context sharing across virtual platforms which lead to increased visibility and security across applications on virtual or physical workloads. This would have been impossible in the past as it would compromise either security or performance. Improved security through virtualization helps you gain mileage over challenges that would otherwise ruin your reputation among clients (Kotsovinos,
It is a network security measure used in computer networks to ensure that the secure network physically protected from other unprotected networks. This
OpenStack is an open-sourced company independent private cloud platform built with segregated resource pools that can interconnect. For example, a virtual machine can be created using OpenStack Nova, which will connect into the block storage component to store data. The same server can be connected into a vLAN(virtual network) to have other servers throughout various locations connect to one network without costly networking hardware. Configuration is relatively easy as there is need to count, track or monitor which servers have the software installed. Managing the VMs created in OpenStack Nova is also easy as it is possible to use the CLI from the browser through a VNC proxy. In fact, all of the resources and modules can be managed from the browser.
The components would be a High-Memory, High-CPU that have 32bit version Window PC and a 2.4 GHZ, Cluster Compute, Cluster GPU, High I/O, High Storage, High Memory Cluster, and t1.micro. Standard Instances have memory CPU intensive applications; High-Memory instances offer larger memory sizes for memory-intensive applications, including database and memory caching applications; and High-CPU instances have proportionally more CPU resources than memory (RAM) and are well suited for scale out compute-intensive applications. The software would be the Microsoft Security Essential with an Unbox Video player.
Cloud computing is defined by experts as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The meaning behind the word cloud is that it is a metaphor for the entire online web and its data as well. A cloud service differs from traditional hosting in three different ways. These three differences are that cloud computing is elastic, it is sold on demand, and the service is managed by the provider of the cloud. The easiest way to explain what cloud computing does is that it stores and gives access to different data and programs over the internet rather than just your computer’s hard drive. For it to be actually considered cloud computing it must include data or programs over the internet. Cloud computing can be done anytime, anywhere with an online connection.
This was a community originally created by Scott Chasin and hosted by crimelab.com which changed the world of software industry. It is basically an electronic mailing list fully dedicated to issues about computer security. It had hot topics being discussed in the global forum that says about vulnerabilities, exploitation methods and vendor security-related announcements. [2]
This was one arrangement that disposed of the considerable number of issues IT offices were confronting. The machine can be gotten to remotely from a fundamental station this helped the overseer to push the software's, send overhauls and fix administration through the remote system. This product likewise implied that the officers can stay in their individual vehicles and concentrate more at work they have as opposed to investing hours in the IT office to get the redesigns. There was consistency in the framework as every one of the machines would get same programming over the system. This additionally implied the officer can utilize the framework to get to the information and issue tickets in
...common risks and their mitigating techniques are: Unauthorized access to data centers, computer rooms, and wiring closets – this risk can be mitigated by applying policies, standards, procedures, and guidelines for staff and visitors to secure facilities. Servers must sometimes be shut down to perform maintenance – this can be mitigated by creating a system to tie servers, storage devices, and the network together and created redundancy to prevent down time on mission critical services. Server operating systems vulnerability – this can be mitigated by ensuring all server operating system environments are defined with the proper patches and updates. And lastly cloud computing virtual environments are not secure by default configurations – can be mitigated with setting up virtual firewalls and server segments on separate VLANs to help prevent failure in the network.
Its main role is to protect the public through the regulation of its registrants as well as “developing a sustainable organisation that minimises the negative impacts and maximises the positive.” These negative impacts are kept to a minimum by a series of different standards being set. Each registrant within the HCPC must meet these standards to avoid investigation.
Hybrid cloud is able to provide larger scale of environment. Private cloud and public cloud resource can be used to manage unexpected surges in workload.
Hypervisor is also known as virtual machine monitor (VMM). The VMM is a thin software layer that runs directly on a physical machine’s hardware. On top of the virtual machine monitor, there can be one or more virtual machines. The VMM provides each virtual machine with a set of virtual interfaces that resemble direct interfaces to the underlying hardware. Applications on a virtual machine can run without modification as if they were on running on a dedicated physical machine. The
Several types of cloud storage systems have been developed to supporting both personal and business uses. Cloud storage also a model of networked enterprise storage where the data is stored not only in the user's computer, but also in virtualized of storage, which generally hosted by third parties company.
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.