It seems that almost all of the software vendors have sprung up to launch their own "cloud security ". Cloud security is the savior in the security field, and its emergence has greatly improved the capability of anti-virus software. At present, all of them have exceptionally outstanding descriptions of their cloud security. Although they choose different acronyms, they can find that the descriptions are almost identical with each other. Next, let's take a look at the steps for updating the virus database before and after the "cloud security" of the anti-virus company. We will know what "cloud security" is.
Cloud security, as its name implies, is a new term that evolved from cloud computing. The "Cloud Security" plan is the latest embodiment of information Security in the Network Age, it integrates new technologies and concepts such as parallel processing, grid computing, and unknown virus behavior judgment, and monitors abnormal software behavior in the network through a large number of clients in the mesh, obtain the latest information about Trojans and malware on the internet, push them to the Server for automatic analysis and processing, and then distribute the virus and Trojan solutions to each client.
Before cloud security appears:
The user reports a virus sample, which is analyzed and tested by the virus engineer. If it is determined to be a virus, the virus sample is extracted from the feature value and added to the virus database for upgrade.
After the emergence of cloud security:
A collector is installed on the client. Once a suspicious file is detected by the collector, the suspicious file is automatically uploaded to the server, then, the virus automatic analysis system automatically analyzes the Suspicious File and extracts features, adds them to the virus sample library, and automatically upgrades the file.
The comparison shows that cloud security is not counted. It depends on whether suspicious files are detected and automatically uploaded from the user's machine ". No matter how large the number of servers required by cloud security is, simply "extracting suspicious files from users' machines" puts a vast majority of users in conflict. Imagine the consequences of collecting personal privacy, commercial confidential files, or programs on your machine as "suspicious Files" on the server.
The fact is that the technology revolution is true, or the concept is hyped again. I believe everyone understands it. A few years ago, the vendors of zhongan claimed that they had joined the "active defense" function overnight. Tests have proved that, most of these follow-up vendors simply put a part of the HIPS feature in the face of it and call it "active defense" to speculate.
Slowly discovering that the current security industry is gradually focusing on "Entertainment". Today, you have launched "cloud computing", and tomorrow I will launch a "cloud security" event ", your research has found that the "dark energy" of the universe. My research has found that the "dark security" of the operating system seems to be a mixture of great interest when nothing falls behind. Rising is also directly renamed as: Beijing Yijin Entertainment Technology Investment Co., Ltd., it is really unpleasant. Can we still trust anti-virus software?
Cloud computing is the savior of the security field in the future, or the hype in vain. I believe the majority of users have understood it. Integrity is the basic quality that any company should possess. If this is missing, how can we steal and change the concept? The results can only be lost in the hearts of the people like Sanlu and Baidu.
- Cloud security technology topics: cloud security
- 10 major security market forecasts in: cloud security trends (figure)
- Survival status of anti-virus software in the cloud computing age