Introduction
UNIFIED HYBRID CLOUD SECURITY
Organizations are moving their services to public cloud and are
building more hybrid cloud solutions. With this, security is becoming
increasingly complex as administrators may no longer have access
to physical hosts and networks. This requires that many computing
services be virtualized and managed remotely, including security. While
public clouds can offer many security benefits, the generic solutions
provided by Microsoft Azure are limited and are not purpose-built for
the rapidly-changing security needs of today's enterprise. Until now,
users have had to rely on multiple third-party vendors to obtain end-to-
end protection for their virtualized environments.
Features
Specifically designed and optimized
for Microsoft Hyper-V and Microsoft Azure
UNIFIED HYBRID CLOUD SECURITY
Organizations are moving their services to public cloud and are
building more hybrid cloud solutions. With this, security is becoming
increasingly complex as administrators may no longer have access to
physical hosts and networks. This requires that many computing services
be virtualized and managed remotely, including security. While public
clouds can offer many security benefits, the generic solutions provided
by Microsoft Azure are limited and are not purpose-built for the
rapidly-changing security needs of today's enterprise. Until now, users
have had to rely on multiple third-party vendors to obtain end-to-end
protection for their virtualized environments.
SIMPLIFY THE SECURITY OF YOUR HYBRID
CLOUD
Acronis Cloud Security is a comprehensive security solution which
addresses all of these challenges by taking the industry's leading
security solution for Hyper-V and expanding it to the public cloud.
Acronis Cloud Security can be deployed either as a Windows or web
application - standalone, or from Microsoft Azure Marketplace.
SECURE ANY MICROSOFT CLOUD DEPLOYMENT
Acronis Cloud Security protects virtual machines (VMs) in any Microsoft
Cloud environment. For on-premises Hyper-V installations using the
native extensible switch, Acronis Cloud Security protects hosts,
clusters, VMs, networks, and virtual disks. For on-premises Hyper-V
using SDNv2, Acronis Cloud Security also includes Virtual Router
Security Appliance to secure the virtual networks. For Azure
installations, Acronis Cloud Security also uses the Virtual Router
Security Appliance and protects VMs, networks, and virtual disks, as
well as providing management of Azure account properties and
subscriptions.
EASY
Easily protect all of your Microsoft Cloud environ-ments: on-premises,
cloud, and hybrid
- Easy-to-use graphical user interface (GUI) provides visibility
into all Hyper-V clusters and Azure instances
- Manage security for your entire Microsoft hybrid cloud
on-premises and Azure - from a single central-ized console with no need
for administrators to log in to the Azure Portal
- Create Security Groups to enable automatic protec-tion - push
rule changes to an entire group of VMs all at once and automatically
apply security to new VMs created in oradded to the group
EFFICIENT
Streamline security operations across multiple clusters and Azure
instances
- Changed Block Tracking (CBT) is used to scan and analyze only the
blocks that have changed since the last scan, making scans up to 70X
faster
- Built-in Anti-Virus (AV) and Anti-Ransomware (ARW) protection
eliminates the need to acquire and deploy separate third-party
solutions - scans are performed at the network layer and require no
agents so there
- is no effect on VM performance
- Secure all your Microsoft Cloud resources from a single console,
eliminating the need for multiple cybersecurity tools
CONTROLLED
Secure all of your Microsoft Cloud environments: on-premises, cloud,
and hybrid
- Granular user and tenant management through role- based access
control (RBAC), separating users and resources, reducing risk of
cross-contamination
- Control network bandwidth usage on a per-VM basis, providing
Quality of Service (QoS) to prevent any VM from consuming too much and
negatively affecting the performance of other VM, services, or users
- Virtual firewall allows organizations to control all inbound,
outbound, and VM-to-VM traffic, inspecting packets before they reach
VMs or virtual network
SECURE
Meet strict security, privacy and compliance requirements with complete
control over access to your VMs, hosts, tenants, and administrative
functionality.
- Deep Packet Inspection (DPI) allows inspection of packet before
determining if the packet should be passed on
- Cisco Snort Intrusion Detection System (IDS) rules are integrated
into Acronis Cloud Security and iden-tify many types of network
attacks, including DoS/DDoS, cross-site scripting, buffer overflows,
stealth port scans, and more
- Logging of all events, network traffic, and user actions,
including results of changes, enabling easy and simple audit to meet
strict security compliance requirements.
RELIABLE
Multi-layered cyber protection that can scale to secure even the
largest and most-complex Hy-per-V and Azure deployments
- Provides cyber protection and security management across multiple
version of Hyper-V and Azure work-ing across dissimilar versions
- Management server is installed in a cluster-based configuration,
providing highly-available access to the security management console
- Security settings are preserved when virtual ma-chines are shut
down and even if the management server were unavailable, providing
uninterrupted and continuous cyber protection for Microsoft Cloud
Benefits
Automatically and immediately protect newly-created VMs with virtual
firewall
- Increases operational efficiency and lowers total cost of
ownership by eliminating point solutions and management complexity
- Built-in agentless anti-virus (AV) and anti-ransomware (ARW)
protections let you secure your data without a negative effect on VM
performance
- Control all inbound, outbound, and VM-to-VM network traffic with
the Acronis Cloud Security virtual firewall performing deep inspection
of the packets before delivery
- Integrated Intrusion Detection System (IDS) identifies many
attack types including DoS/DDoS, direct access attacks, cross-site
scripting, brute force, buffer overflows, stealth port scans, and many
more
- Security compliance audits made simple and easy with logging of
all network traffic, infrastructure configuration changes, and
administrator actions
- Centralized on-premises and Azure security management without the
need for administrators to log in to the Azure Portal
Environmental requirements
Microsoft Azure Hyper-V
- Windows Server 2019
- Hyper-V Server 2019
- Windows Server 2016
- Windows Server 2012 R2
Hybrid Cloud Configurations