5nine AzSec 5nine Cloud Security

Azure Security Simplified With All-New 5nine AzSec

As organizations move their services to the public cloud and hybrid cloud, security becomes increasingly complex. Instead of being able to monitor and protect your networks using on-premises tools and systems, you now need to configure and monitor your network security in a remote cloud provider’s datacenter. 5nine Software has just released 5nine AzSec and 5nine Cloud Security with Azure Security (AzSec), providing the only security solution for Microsoft datacenters that supports on-premises private clouds (Windows Server), service provider clouds (Azure Pack), and now the public cloud (Microsoft Azure). With 5nine AzSec you can simplify cloud networking security by consolidating rules, logs and billing into a single console.

5nine AzSec lets cloud administrators configure virtual machine (VM) network traffic rules and manage logs without using the Azure Portal. Simply launch 5nine AzSec, enter your subscription credentials, and you will see a list of resource groups, virtual machines and virtual network adapters that you can monitor. From here you can create, edit and delete inbound and outbound network traffic rules for your Azure VMs. Creating and applying firewall rules is done through a single interface, and you can specify a variety of important settings, such as the direction, ports, and port range, while also providing the rule with a priority, allowing you to rank the order that rules get applied.

Configure Azure firewall rules in a single step

Figure 1: Add a new firewall rule using 5nine AzSec

Standardizing your network security is easy with 5nine AzSec using pre-configured templates. When creating a new rule, you can select from any of over 75 common network firewall protocols to be applied to the network adapter.

Choose Azure firewall rule template

Figure 2: Apply any standard firewall rule to your virtual adapter with 5nine AzSec

Using the Azure Portal to configure these common security settings can be a challenge. For example, enabling network logging through the Azure Portal requires the admin to configure resource providers, register a new provider, create a resource group, configure logging on every network security group, turn on diagnosis, then configure log settings. With 5nine AzSec, simply select the resource groups that you want to monitor, and 5nine will take care of the rest!

Configure log settings

Figure 3: Configure logging with 5nine AzSec

Once you have turned on logging, you can send the security logs to various SIEM systems for analysis, including 5nine Cloud Security, SPLUNK and Microsoft OMS. Through regular network log analytics, you can verify that your network infrastructure meets your industry’s regulatory and compliance requirements.

To provide a unified management experience outside of the Azure Portal, 5nine AzSec even provides you with insights into your Azure subscription status, usage and billing. You can filter the report by date and see the cost of your storage, virtual machines, networking and other Azure resources.

AzSec Azure Billing

Figure 4: Azure billing and usage reporting through 5nine AzSec

With 5nine AzSec, cloud security administrators can simplify the management of their firewall rules, logs and bills using a single interface. 5nine AzSec can be deployed as an independent tool, or as a part of 5nine Cloud Security, the leading security solution designed for the Microsoft Cloud. Evaluate 5nine AzSec today!

We hope you enjoy AzSec and always welcome your feedback!

Symon Perriman
5nine Advisor & Evangelist
Twitter @SymonPerriman

Leave a Comment

Facebook