In the face of a new type of spam threat to the rapid rise of the era, how effective real-time defense? Cloud Security is an innovative idea you can't be unaware of.
Figure A cellocloud™ e-mail Cloud Security Service
What is cloud computing
According to the definition of Wikipedia and the Gartner Research Institute, Cloud computing is a dynamic extension of the operation, the basic concept is through the network to automatically split the vast number of operations processing program into numerous smaller subroutines, and then to the large system of multiple servers, after the search, The processing results are passed back to the consumer after the operation analysis. Through this technology, service providers can handle tens of millions of millions of messages in a matter of seconds to achieve the same powerful network services as supercomputers. Cloud computing typically uses virtual patterns to provide information technology, including computing, storage and bandwidth, to users through the Internet in the form of "services", and clients do not need expertise or knowledge to obtain these services.
Security-as-a-service vs. Cloud security
Security-as-a-service (security as a service) the term first appeared in 2001, by antivirus software company McAfee. The implication of Security-as-a-service is that in the enterprise information architecture, security-related products, services and management can be obtained through the form of outsourcing, enterprises do not need to pay too much cost and human maintenance. Although this concept is good, but does not show practical benefits, after eight years, the threat of the internet has not been reduced, with the rapid hacker technology, software and operating system weaknesses continue to be found, corporate and organizational information security burden continues unabated. In addition, in the past two years, the complex network attack tactics and group of hacker organizations, has seriously threatened the organization operation and operation. Information security vendors have to think about better solutions, early detection of early warning, proactive defense, to improve the level of defense.
Fortunately, after the advent of cloud computing, just make up for the technical gap required by Security-as-a-service, this concept can be materialized into the information architecture, the formation of cloud security (cloud safety) of the new concept. The two major characteristics of cloud security are "global joint Threat Defense" and "Real-time online update protection". The Global joint Threat Defense collects huge volumes of data from around the world and uses its power to provide early assessment and early warning of unknown threats. "Real-time online update protection" is the use of cloud technology, the most real-time security updates to the active feedback to the client, to eliminate the defense of the window period, while reducing the burden of customer maintenance and management.
cellocloud™ e-mail cloud security Services
According to Cellolabs™ research, the biggest feature of spam is that hackers will send the same content to tens of hundreds of of millions of recipients, the best way to solve spam is to use cloud computing technology, build a powerful analytical computing platform to collect and monitor the global mail delivery behavior, trends, characteristics and other data, The real-time detection of burst mail attacks on the network, reduce the response time of the message threat outbreak, so that users get the most real-time updates and protection, to reduce the chance of the threat of intrusion.
At the beginning of 2007, Cellopoint pioneered the concept of "cloud security for email", developing "cellocloud™-email Cloud Safety" service, through which the Global Mail Joint Protection Network was established. Cellocloud™ (figure I) promotes the traditional spam defense technology, such as RBL blacklist, classification database, Bayesian algorithm (Bayesian), single user heuristic learning (heuristic algorithm), to the cloud security joint Protection architecture, A powerful server group dynamic analysis platform is built by cloud technology, and the necessary resources are retrieved dynamically, and 24/7 full time automatic operation analysis is carried out.
Sender Reputation (Sender credit rating) uses cloud computing's dynamic analysis technology to calculate the sender's credit score in real time. Cellocloud™ will be repeatedly validated according to the "behavior pattern", "activity scope", and "history" of the messages sent by the message to the unknown sender. The technology can block malicious emails in the cloud (in the cloud) based on the sender's reputation, preventing the threat of Zombie from being spread by zombie computers or puppet networks (Botnet).
Cellopoint Honey Pot System is a world-class spam collection system, with a large number of decoy accounts worldwide (decoy Accounts), which collects millions of new or variant spam samples every day, covering multiple languages and cross-border sources. When a new email threat sprang up, the cellocloud™ Threat Awareness System (Threat Sensor System) could detect abnormal mail behavior immediately within minutes, after cellocloud™ quick analysis, to submit defensive tactics to cgac™ (cellopoint Global spam Center) to do automatic verification, through a large number of samples of pressure and misjudgment test, the official release of "Anti-Spam feature database Update", real-time defense of the threat of mail. Cellocloud™, like a virtual security cloud, is ready to bring customers into the protection of the "e-mail Cloud security" service.
about Cellopoint
Cellopoint is committed to developing technology-innovative mail security and management products, from small, medium to large units, to the different organizational size, to provide a complete line of products to protect you from spam, phishing, spyware, virus and mail bomb attacks, while providing message encryption, archiving and retrieval programs , integrating security protection, auditing, and backup into a single solution that allows you to easily achieve an integrated threat defense and management (email UTM, unified Threat Management) goal that effectively integrates existing messaging systems to maintain optimal operating conditions, Allow customers to achieve the most economic benefits, including the lowest total holding cost and the most streamlined maintenance management costs. Cellopoint Website: www.cellopoint.com/cn