Eliminate Your Security Blind SpotsLearn How Hypervisor Introspection Protected Customers From WannaCry Even Before The Outbreak
Get a demo
IT TAKES 5 MONTHS TO UNCOVER A BREACH
Stealth attacks still overpower virtualization security despite major efforts from the security industry. In 2016, it took enterprises an average of 5 months to discover they had been breached, and researchers often found zero-days and sophisticated kernel-level malware at the root of the breaches.
Introducing a Revolution in Security
By joining their considerable expertise in IT security and data center virtualization, Bitdefender and Citrix have developed an entirely new security layer which malware cannot compromise or evade – through raw memory introspection directly at the hypervisor level.
A revolutionary security layer.
Malware cannot reach it, and
cannot hide from it.
RAW MEMORY INTROSPECTION – THEY SAID IT WAS IMPOSSIBLE
Bitdefender Hypervisor Introspection (HVI) is the first security solution that is able to uncover memory violations that endpoint security tools sometimes miss by directly analyzing raw memory lines - thereby ensuring they are not being altered by malware.
ISOLATED AND IMPOSSIBLE TO COMPROMISE, EVEN BY KERNEL-LEVEL MALWARE
Positioned completely outside the operating system, with hardware-enforced isolation, and with no agent or drivers installed on the endpoints, Bitdefender Hypervisor Introspection is impossible to take down or compromise by rootkits or other kernel-level threats.
DETECTS ZERO-DAYS THAT HEURISTICS MISS
By focusing on techniques, rather than the payloads, Bitdefender HVI is able to stay ahead of attacks, and protect you against notorious attack gateways such as browser zero-days or spear-phishing emails with exploited files attached that are not visible from within the guest OS.
Eliminate Your Security Blind Spots
RESPOND INSTANTLY TO ATTACKS
Apart from containing the attack in real time, Bitdefender HVI can also help remove the threat, by automatically injecting a temporary remediation tool in the affected Virtual Machine.
LEARN OF ONGOING ATTACKS IN REAL TIME AND SEE THE ATTACK CHAIN
Bitdefender HVI sends out alerts the instant a memory violation is detected, and provides detailed reporting of the attack chain, including affected processes, type of violation, and timeline of the attack.
INDEPENDENT FROM AND FULLY COMPATIBLE WITH EVERY ENDPOINT SECURITY TOOL
Instead of inserting an agent into each VM, Bitdefender HVI detects and secures infrastructures directly at hypervisor level, through a security virtual appliance. This is why, unlike other vendors that require you to remove your endpoint protection and replace it with theirs, Bitdefender HVI is complementary to and compatible with any existing security tools.
Fast Deployment. Easy to
Manage. High Performance.
FAST TO DEPLOY AND EASY TO MANAGE
Bitdefender HVI’s centralized approach to security makes its deployment a
matter of minutes and its management straightforward, through
Bitdefender’s GravityZone Control Center.
OPTIMIZED FOR PERFORMANCE.
BRINGS LITTLE TO NO IMPACT ON CONSOLIDATION RATIOS.
After much invested effort, Bitdefender HVI now monitors your infrastructure
without impacting consolidation ratios, or slowing down user activity on the VM.
"Citrix XenServer with Bitdefender HVI gives us this uniquely clever security edge"
Harri Ruoho | Business Manager | Soforread full testimony
Bitdefender HVI FAQ
Windows desktop operating systems:
- Windows 7
- Windows 8
- Windows 8.1
- Windows 10
Windows server operating systems:
- Windows Server 2008 R2
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2016
Linux operating systems:
- Debian 8, 64-bit
- Ubuntu 16.04 LTS, 64-bit
- Ubuntu 14.04 LTS 64-bit
- CentOS 7, 64-bit
- Red Hat Enterprise
- Any Intel® Sandy Bridge processor or later, with support for Intel® Virtualization Technology.
- VT-x or VT-d extensions must be enabled in BIOS.
- requires XenServer 7.x to run
Request A Demo
Intrigued yet? Reach out to us to discover how Hypervisor Introspection can help you
fortify your XenApps and XenDesktops against targeted attacks through live memory introspection.