Bitdefender has launched the Hypervisor-based Memory Introspection solution to solve the ‘context versus isolation’ dilemma facing virtualisation vendors and data centre administrators.
By carrying inspection at the hypervisor level, the technology will give complete insight into virtualised endpoints with zero footprint within the endpoints.
The company said the solution protects Windows and Linux endpoints from a level in the stack that is below guest operating systems.
Bitdefender’s Hypervisor-based Memory Introspection uses a higher level of privilege by leveraging hypervisor privileges (ring-minus-one) to detect and defeat attacks and previously installed malware.
Remediation techniques also take advantage of a unique method by injecting Bitdefender Clean-Up Tools into a running virtual endpoint, avoiding the assumption of a clean-state of the protected infrastructure.
Mihai Dontu, Chief Linux Officer at Bitdefender said: "Fundamentally, when both security and attackers are operating with kernel-level permissions, we encounter a stand-off situation.
"Virtualisation revolutionised computing by adding a layer of abstraction below operating systems, and our technology brings enhanced security to that layer."
Rares Stefan, VP of Global Alliances at Bitdefender added: "We are a major supporter of Linux and open source projects throughout the world, and joining the Linux Foundation demonstrates our commitment to the advancement of better security solutions to protect open source programs and projects.
"We’ve worked with the community for some time to identify and resolve several potential vulnerabilities and Bitdefender’s continued work in this area is growing in both scope and demand."
Bitdefender said it intends to make the technology widely available to customers by late 2015.