Neusoft Liu Xinyu: Cloud computing brings new challenges to intranet security

Source: Internet
Author: User
Keywords Cloud computing intranet security

Liu Xinyu, Senior Advisor to Neusoft Network security, traditional intranet security refers to the source of the attack from the network, the target is also in the network, and with the complexity of network applications in recent years and the diversification of attacks, many of the use of network equipment as a springboard, cross-domain attack events also gradually emerged, For example: some malicious attackers from outside the network directly attack some important targets, when the attack is not valid, will consider first to fall with the target located in the same network of some of the vulnerabilities of the device, obtain administrator privileges, and then use these devices to launch attacks within the network, the success rate is extremely high.

In addition, the growing popularity of cloud computing applications is bound to be more and more networks to join the cloud, when the task of undertaking cloud computing, the network above the operation of the application will show the characteristics of virtualization, diversification. In particular, these operations may not have any connection at all, also do not belong to the same user, access to these business customers to the network to initiate access, then, in the same network for the diversification of the task of protection, will become a follow-up to solve one of the important issues, this is a key aspect of cloud security.

Liu Xinyu also said that the communications industry has a wealth of computing resources, in the hot discussion of cloud technology has been at the forefront. To join the cloud in the implementation of cloud computing tasks of these networks, how to ensure that their responsibilities and applications in the network security isolation and mutual security, become operators to face the problem. Although the virtual technology used in cloud computing can provide a relatively independent computing platform, in fact, there are some channels for interoperability between multiple computing tasks on the same network or even the same host, and how to ensure its security becomes a new challenge.

Neusoft has been in the field of information security since 1996, and has been committed to the overall construction of information security, and intranet security is an important direction. From the monitoring level of IDs, business isolation of the VPN, intranet audit system, Internet behavior Supervision system, network traffic monitoring system, network security access verification system, customer desktop management system and security for the overall operation of the network management platform, has formed a more comprehensive product system, effectively solve the intranet security monitoring , control, audit and other security needs.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.