What Secrets
Does Your
Infrastructure
Hold?

Hypervisor Introspection

Eliminate Your Security Blind Spots
Get a demo
IT TAKES 5 MONTHS TO UNCOVER A BREACH

Stealth attacks still overpower virtualization security despite major efforts from the security industry. In 2016, it took enterprises an average of 5 months to discover they have been breached, and found zero-days and sophisticated kernel-level malware to be often at the root of the breach.

Introducing a Revolution in Security

Bitdefender and Citrix joined their expertise in virtualization and security and developed a new security layer which malware cannot reach, nor can it hide from – through raw memory introspection directly at hypervisor level.

A revolutionary security layer.
Malware cannot reach it, and
cannot hide from it.

RAW MEMORY INTROSPECTION – THEY SAID IT WAS IMPOSSIBLE

Bitdefender Hypervisor Introspection (HVI) is the first security solution that is able to uncover memory violations that endpoint security tools sometimes miss by directly analyzing raw memory lines - which cannot be altered by malware.

ISOLATED AND IMPOSSIBLE TO COMPROMISE, EVEN BY KERNEL-LEVEL MALWARE

Positioned completely outside the operation system, with hardware-enforced isolation, and with no agent or drivers in the endpoints, Bitdefender Hypervisor Introspection is impossible to take down or compromise by rootkits or other kernel-level threats.

DETECTS ZERO-DAYS THAT HEURISTICS MISS

By focusing on techniques, rather than the payloads, Bitdefender HVI is able to stay ahead of attacks, and protect you against notorious attack gateways such as browser zero-days or spear-phishing emails with exploited files attached that are not visible from within the guest OS.

Eliminate Your
Security Blind Spots

RESPOND INSTANTLY TO ATTACKS

Apart from containing the attack in real time, Bitdefender HVI can also help remove the threat, by automatically inject a temporary remediation tool in the affected Virtual Machine.

LEARN OF UNDERGOING ATTACKS IN REAL TIME AND SEE THE ATTACK CHAIN

Bitdefender HVI sends out alerts the instant a memory violation is detected, and provides detailed reporting of the attack chain, including affected processes, type of violation, and timeline of the attack.

INDEPENDENT FROM AND FULLY COMPATIBLE WITH EVERY ENDPOINT SECURITY TOOL

Instead of inserting an agent into each VM, Bitdefender HVI detects and secures infrastructures directly at hypervisor level, through a security virtual appliance. This is why, unlike other vendors that require you to remove your endpoint protection and replace it with theirs, Bitdefender HVI is complementary to and compatible with any existing security tools.

Fast Deployment. Easy
Manage. High Performance.

AGENTLESS SECURITY

FAST TO DEPLOY AND EASY TO MANAGE

Bitdefender HVI’s centralized approach to security makes its deployment a
matter of minutes and its management straightforward, through
Bitdefender’s GravityZone Control Center.

OPTIMIZED FOR PERFORMANCE.

BRINGS LITTLE TO NO IMPACT ON CONSOLIDATION RATIOS.

After much invested effort, Bitdefender HVI now monitors your infrastructure
without impacting consolidation ratios, or slowing down user activity on the VM.

Bitdefender for Mac

Unterstützte Gast-Betriebssysteme

Windows-Desktop-Betriebssysteme:

  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

Windows-Server-Betriebssysteme:

  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Server 2008 R2

Linux-Betriebssysteme:

  • Debian 8.2, 64-Bit
  • Ubuntu 16.04 LTS, 64-Bit
  • Ubuntu 15.04, 64-Bit
  • Ubuntu 14.04 LTS 64-Bit
  • CentOS 7, 64-Bit
  • RedHat Enterprise Linux 7, 64-Bit

Host-Anforderungen

CPU-Micro-Architektur:

  • Jeder Intel® Sandy Bridge-Prozessor oder neuere Versionen, die Intel® Virtualization-Technologie unterstützen.
  • VT-x oder VT-d-Endungen müssen in BIOS aktiviert sein.

Software-Anforderungen:

  • XenServer 7 oder höher

DEMO ANFORDERN

Intreagued yet? Reach out to us to discover how Hypervisor Introspection can help you
fortify your XenApps and XenDesktops against targeted attacks through live memory introspection.

DEMO ANFORDERN requires XenServer 7 to run