Solutions should focus on three major aspects of cloud security
Source: Internet
Author: User
KeywordsCloud security Cloud computing
Since the advent of cloud computing services, a large number of security incidents have aroused widespread concern and further raised the user's trust in public cloud services. From the user level, especially the need for large enterprise users have begun to cloud security, security issues in the deployment of cloud services can not be ignored, so in the provision of cloud computing services solutions to the cloud security has a new depth of understanding, from the product level, technical level and strategic level to deconstruct cloud security, To better provide users with a complete and secure cloud solution.
Product level
From the current security products from the major security companies based on cloud technology to look at, cloud security is based on cloud computing business model application of security software, hardware, users, institutions, security cloud platform collectively. It is an important branch of "cloud computing" technology, is the result of hybrid development and natural evolution of Peer-to-peer technology, grid technology, cloud computing technology and so on, and has been widely used in anti-virus field.
The first proposed "cloud security" is the concept of trend technology, May 2008, Trend technology in the United States officially launched a "cloud security" technology. The concept of cloud security has been raised for a wide range of controversies, and many people consider it a pseudo proposition. But the facts speak louder than words, the development of cloud security like a gust of wind, rising, trends, Kaspersky, MCAFEE, SYMANTEC, Jiangmin technology, PANDA, Jinshan, etc. have launched a cloud security solutions, and Chinese manufacturers in the "cloud security" technology applications to the forefront of the world.
Technical level
As the traditional information system, the security vulnerabilities of cloud computing system are unavoidable, and because of the service network, data centralization, platform sharing and participation role diversification, the security risk faced by cloud computing is more complicated than the traditional information system.
But it should also be seen that in most cases, cloud service providers can provide more professional and sophisticated security features such as access control, attack prevention, data backup and security audits, and security upgrades and enhancements to the cloud IT system through unified security measures and policies. This improves the security level of this part of the user system and data.
Strategic level
At present, the information technology field is gradually monopolized by developed countries, especially the United States, the world's real strength to develop and provide "cloud computing" services companies only Google, Microsoft, IBM (micro-blog) and Amazon and other small it giants. While developing countries have no technical power, their strategic choices are very limited. The current pattern is that multinational companies in the "cloud computing" area of the aggressive and governments of the "cloud computing" the development of far-reaching planning for China's political, economic, technological and national security have formed a serious challenge. In fact, if we do not have the "cloud computing" power, the vast majority of businesses and individuals will have no choice but to store and process data in the "Cloud Computing" center as described above in order to meet application needs.
Therefore, in the country's continuous improvement of cloud computing, cloud security related policies and research and development, to the cloud service providers, program providers to provide opportunities, while the programme also has the obligation to help clouds enterprises to establish information security management norms, to ensure that the cloud computing health and orderly development.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.