If the 2009-year information security industry hot spots, there is no doubt that "cloud security" technology deserved. According to the reporter observes, whether is new technology or the newly application, the industry many mainstream security manufacturers all are moving toward "the cloud" to move closer. Interestingly, as cloud security applications become increasingly important, protection technologies for cloud server groups are emerging. It can be said that the current "cloud" more and more flavor. Puzzle One: Understanding "cloud security" technology before you understand the "cloud security" technology, the reporter should first emphasize that cloud security is not an absolute new technology. In fact, along with the development of cloud computing technology, cloud security is gradually developed and has been applied. Since the end of 2007, global malware, attacks have become increasingly complex and difficult to defend, under the pressure of "mass threat", the traditional security technology based on "signature" has been challenged, which just gives the "cloud security" technology development space. Prior to Fortinet China Technical director Li Hongkei in an exclusive interview with this newspaper that: "Cloud security, the most important technical characteristics of its partial operation of the strong ability and client Security configuration streamlining, that is, users often talk about thin client development trends." This is true for enterprise users with significant security improvements and reduced client maintenance advantages. The cloud security technology itself also provides an assessment of unknown threats and a defense push capability, so there is no doubt that there is a significant improvement in the level of security defense. He also said that the current important driving force for cloud security is the diversification of threats and dynamic, and now users are increasingly feeling that a single defense technology is difficult to achieve effective defensive effect. The diversity of applications allows current attacks to have multiple ways of infecting, spreading and triggering. For example, some of the mail-hosted malicious code can be part of the detection of spam, such as mail reputation list technology. This level does not block the success, then must analyze the mail content the threat, must use the virus decoding analysis technology. When the individual host is infected, the system process and the Internet server automatically interconnect trojan program download and transmission, this time the system command layer detection will play a role. Therefore, it can be seen that the defense of diversity threat requires dynamic multi-level detection capabilities. The advanced feature analysis capability of cloud Security provides users with multi-level threat defense analysis, and also improves the actual security efficiency to a great extent. Based on this, the reporter hope that the majority of enterprise users must understand a point of view: "Cloud security" technology is the future of content security protection technology development of the only way. Because from the current technological development, this is an unavoidable trend. In this respect, Xu Xuerong, senior security advisor for Trend Technology, said the number of cyber threats on the internet has exploded as a result of the rapid growth of user size and network applications. According to av-test.org statistics, the current daily production of new malicious programs around 30,000, through the production of virus code to protect the network threat of traditional technology can not provide effective protection, "cloud security"Using cloud computing processing mechanism, can calculate the network threat location on the Internet, in the network before the threat to the network to block, on the one hand to achieve broad spectrum protection, on the other hand to achieve efficient and timely protection. It is important to note that the cloud security inherent mechanism is "cloud computing" technology, due to the declining Internet access bandwidth prices and the continuous improvement of communication quality, cloud security has begun to activate the current vitality, and in 2009 derived into the market the latest hot. Similarly, Wedge NX's global CEO, Dr. Zhang Hongwen. "Cloud security is hot, and the technology itself is a combination of two areas: cloud computing and network-based threat defense," he said. "But interestingly, he questioned the accuracy of the current" cloud security "concept," security in every corner of the cloud security, which is a bit like the software field of the "Everyone is SaaS. In strict terms, ' cloud security ' must provide mandatory security defense support for enterprise data centers, server groups, and endpoints. However, he also reluctantly said that, no matter what the real definition, the security sector is already suffering from the "cloud" of the knife: to support cloud security or not! In a narrow sense, only security products that support cloud security technologies can ensure real-time, and, in the sense of endpoint security, enterprise IT Infrastructure defense, and server and desktop defenses Reliable security signature upgrades and technical support services. Careful readers can see that cloud security is explained in terms of technical principles, sometimes like clouds in the sky. But as a practical user of cloud security technology, routines, the technical director of Zhengzhou Institute of Light Industry, said that "cloud security" is an old concept, the previous enterprise is to use distributed architecture to do security system, but now called "cloud", but ultimately the main purpose of this technology is to improve the various nodes, Safety precautions at all locations. In other words, if it had been a one-man battle, then the "cloud security" would be the group battle. 1 2 3 4 next page >> view full text Navigation 1th page: Puzzle One: Understanding "cloud Security" Technology page 2nd: Mystery Two: "Cloud security" technical Standard 3rd page: Mystery three: "Cloud protection" Essential Page 4th: Beware of "cloud security" and the original: "Cloud Security + cloud protection" three big mysteries Technical Analysis (1) Back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.