Challenge to see the real chapter, scholar Cloud Security strong march into the domestic market

Source: Internet
Author: User
Keywords ISC2014 scholar Safety Cloud
Tags asia-pacific business cloud cloud security cloud storage computer computer network computer virus

By the National Computer Network Emergency Management Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 The China Internet Security Congress (ISC2014), sponsored by the Internet Security Center and the China Internet Association Network and Information Security Working Committee, was held in September 24-25th at the Beijing National Convention Center. As the most authoritative annual summit of the Asia-Pacific Information Security, the Conference brings together the father of computer virus, the father of Chinese Internet security, the top security experts at home and abroad in China's information security field, and many manufacturers in the exhibition area are prepared a wonderful game.

September 24 morning, the scholar security cloud held a theme for "Black or white, is a master you will come" hacker challenge. The game is very simple, that is, before the start of the game to open its server password, the participants free access to all data, within the specified time to obtain documents clear as a challenge to success. Although this form is not complicated, but careful analysis of the competition, we will find: Before the start of the game to open the server password, it means that the server loading data is completely undefended, and completely rely on the scholar security cloud own protection technology to ensure data security. A word can explain the technical competition of white, but already can with sincere to the flesh of the true Yinggong contest of the dangerous degree of equate.

At the same time, the scholar Security Cloud Chairman Wang Donglin and scholar Security Cloud CTO Youbing jointly accepted the reporter interview.

Wang East, said the scholar security Cloud original main business, has been in the United States, Europe and Japan, China is mainly a technology research and development Center. Scholar Security Cloud in the United States, the main business is the medical profession, medical care is highly sensitive to safety of an industry, the United States Act on Medical Information privacy protection is very harsh, this also reflects the scholar security cloud in technology is absolutely perfect. In Japan is another business, directly with Dropbox competition.

Scholar security Cloud in 2012 began to provide security cloud storage services, currently in more than 100 countries, has more than 10 million of individual users. Scholar Security Cloud inherited the scholar Group for many years accumulated technology essence, by virtue of truprivacy cloud security technology, Surcloud cloud storage infrastructure and Visidoc cloud document technology three major innovation technology, in the global increasingly saturated cloud storage market has made its own territory.

2014, scholar Security Cloud began to carry out China's business, the strategy for small and medium enterprises is to provide public cloud services, the most important is to provide corporate cloud disk. Scholar Security Cloud has teamed up 360 together to launch enterprise Cloud disk, together to build the largest cloud storage technology service platform in China. The cooperation by the scholar do technology development, 360 do marketing, the two sides together to build a service system. This product has now entered the testing phase. For large enterprises, the scholar Security cloud provides private cloud solutions.

Scholar Security Cloud in the technical aspect accumulation mainly is the data security domain. Youbing told reporters that the safety of many levels, the scholar security Cloud defense is a layer, the first layer is network security, defensive DDoS and other network attacks; the second layer is operating system security, preventing attackers from exploiting operating system vulnerabilities for higher privileges. The main advantages of 360 are embodied in these two layers. While the scholar security Cloud provides a layer of data security inside, even if the hacker breached the first two defense barriers, your files are encrypted, hackers do not have the ability to decrypt, the data is still safe.

Truprivacy Cloud Data security technology is the only technology in the world that can provide complete cloud service function on the premise of server-side without key, including uploading, downloading, previewing, searching, sharing and password recovery. Truprivacy technology ensures that users ' documents are accessible only to themselves, even by system developers and internal administrators. Security encryption is linked to the whole, not only in the cloud does not save the data plaintext, even the key is encrypted to save, so even if the server and source code are open to hackers, the scholar is not worried about data leakage.

For the reliability of the data, the scholar security cloud has a basic indicator, that is, 11 9, that is, 100 billion files only allow 1 files to be lost.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.