Cloud security must be built on a stable cloud architecture

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

China IDC industry annual ceremony to "build cloud computing data center and Cloud Application Innovation" (http://www.idcquan.com/special/2011idc/) as the theme, a comprehensive interpretation of cloud data center and cloud application trends, bringing together hundreds of industry chain elite, Industry leaders and well-known experts at home and abroad to join the festivities. The conference will be held in January 2012 10-11th at the Beijing National Convention Center.

Ninko is a leading provider of global solutions for Internet content security and behavioral auditing and regulation. Based on years of strengthening the core of independent intellectual property research and Development, the company in the Internet content security management, Internet behavior Audit Management, IDC Security Audit Management, document encryption management, computer terminal security monitoring, Internet video audio program monitoring, Internet public opinion integrated management and other fields accumulated rich experience. Recently, any son of CTO Shen Zhijie visit the living room of IDC news conference, and in-depth exchanges with reporters.

For the Enterprise cloud security protection problem, any child line CTO Shen Zhijie said: "If you want to protect enterprise information in the" cloud "security, first of all, must establish a broad credibility, strong enough to build cloud computing architecture; second, the" public cloud "and" private cloud "to develop together, the ordinary cloud computing needs can be through the" common Cloud ", Important confidential information should be placed in the private cloud. ”

  

China IDC Circle: What do you think of the current domestic network security situation? What are the main challenges?

Shen Zhijie: At present, the domestic protection system operation of the network security products have been relatively good popularity, firewalls, IPS, anti-virus software and other network security products have been recognized by many users, the overall security situation is relatively stable. Now, the main problem is the information security on the network, including the information protection and the legal use of the information. Non-traditional security threats, from content security and behavior audit, have increased, which has caused great distress to network users, especially governments and enterprises.

The bigger challenge is that many users are unaware of the importance of defending against these non-traditional security threats, but continue to use some traditional means to maintain the network security of units, and a wide range of emphasis on external network security, light intranet security, rehabilitation, light prevention and other backward concepts, which brings great worries to the future security situation.

China IDC Circle: This year's network attacks frequently, domestic and foreign security situation is not optimistic, as a professional security service provider, Ninko can provide users what services?

Shen Zhijie: As a professional Internet content security and behavior audit and supervision of the overall solution provider, Ninko can provide users with content security and behavior audit of the overall solution, the company's main product lines include NET110 security audit products, the day of the network security management system, Internet video and audio Program management and audit system, IDC security Audit and management system, Internet domain name record and network management system, Internet public opinion analysis and management system. It can help users to defend many network information security threats, and help users build a secure, efficient and green network.

China IDC Circle: As the next generation of Internet development trends, cloud computing in security has been a concern, how do you think should protect enterprise information in the "cloud" security?

Shen Zhijie: As the focus of the IT industry, "cloud computing" has been widely mentioned in the past two years, and "cloud computing" is one of the most questioned is its security. I think that if we want to protect the security of enterprise information in the cloud, first, there must be a broadly credible and robust cloud computing architecture; second, the "public cloud" and "private cloud" need to be developed in tandem, and the common cloud needs can be made up of "common clouds", while important confidential information should be placed in the "private cloud".

China IDC Circle: The combination of traditional data center and cloud computing, the security industry has put forward higher requirements, Ninko how to deal with this challenge?

Shen Zhijie: With the combination of traditional data center and cloud computing, it will bring more information and more dynamic exchange, which poses a great challenge to the content management of Internet. To address this challenge, Help data Center users guard against the risk from content monitoring, Ninko upgraded the IDC security Audit and management system. After the upgrade, the system can be a comprehensive, timely monitoring and disposal of bad information, effectively prevent the spread of vulgar information, to help users get the data center business development of the corresponding data.

China IDC Circle: The sixth annual China IDC industry theme is "Building Cloud data center and Cloud Application Innovation Forum", what are your expectations for this year's Congress?

Shen Zhijie: The concept of "cloud computing" has been put forward for many years, but there are few real value applications for "cloud computing". I would like to see more about the "cloud computing" application in this year's China IDC industry annual ceremony.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.