The Internet strategy accelerates in the time of layout "cloud security"

Source: Internet
Author: User
Keywords Cloud security anti-virus software already layout
Tags anti- anti-virus antivirus manufacturers antivirus software anti-virus software change cloud cloud security

[Guide] In recent years, the security industry has never been a trust crisis, "anti-virus software regardless of use", "anti-virus software can not kill Trojan" and other views are rife. 1988-1998 was the era of the DOS virus, when the mainstream security products are hardware anti-virus card; 1999-2007 is the Windows Virus era, mainstream security products are a variety of anti-virus software; 2008 began, the virus has been completely internet, into the "cloud security" era.

In recent years, the security industry has never been a trust crisis, "anti-virus software no Use", "anti-virus software can not kill Trojans" and other views. Because now the virus has been internet, and anti-virus software still stay in the "stand-alone security = Kill Windows Virus", antivirus software will go to where?

The security industry needs to change

In the eyes of security experts, history is repeating itself. Now the network applications, operating systems, browser Plug-ins, such as a series of changes in the use of the environment, has made traditional anti-virus software can not cope with the existing network threats, including the industrialization of Trojans, viruses, such as the Internet, and the original DOS virus evolved to Windows virus, The urgent need for anti-virus software products to carry out fundamental technological innovation.

From 1988, the first computer virus "small ball virus" was intercepted, so far, the development of computer viruses has undergone three major stages of development. 1988-1998 was the era of the DOS virus, when the mainstream security products are hardware anti-virus card; 1999-2007 is the Windows Virus era, mainstream security products are a variety of anti-virus software; 2008 began, the virus has been completely internet, into the "cloud security" era.

Around 1996, when the mainstream security products "hardware Anti-Virus card" heyday, but has shown such as "Poor Compatibility", "Hard Card address conflict" and other issues, and anti-virus software is able to better solve these problems. 1998, rising anti-virus software in the market has completely replaced the hardware anti-virus card, the first interception, thoroughly killed the famous CIH virus, so that "antivirus software" This product began to be familiar with ordinary users.

Now "anti-virus software" encountered problems, with the original "Hardware Anti-Virus card" encountered a lot of similarities, are due to the user's use of the environment, computer applications have undergone major changes, thus forcing the entire security industry to adapt to change. Initially, the computer operating system from the DOS upgrade to Windows, the domestic market, the original Hancock, anti-virus cards, Chinese character processing software, such as a number of IT products have been into the trough, or even completely disappeared.

The speed of Internet strategy

From the Windows age of viruses to the "cloud security" era, the biggest change is the internet of viruses, hackers make full use of the network's sharing, information interaction, Low-cost features, reconstructed the virus spread, the invasion of the chain, they use the web page hanging horse This cheap intrusion mode to frequent upgrades, Batch automatic shell, and so on, to drag down the expensive anti-virus manufacturers.

Industry insiders pointed out that the only response to the policy, can only be anti-virus software Internet. Antivirus manufacturers also need to use the Internet low-cost information sharing costs, low-cost computing capacity to construct their own industrial processes, the destruction of the chain of hacker transmission virus, jumping out of the "stand-alone mode antivirus, virus intrusion through the internet, and then kill, and then invade" the shackles, so as to break the deadlock.

In the absence of "cloud security" before, the user's computer has any suspicious software running, which accounts lost, access to the Web page which is poisonous, antivirus manufacturers do not know this information. With the 2009 new products released shortly before the rising, "cloud security" technology is officially enabled. With the "cloud security", hanging Horse Web pages, Trojan download site, trojan often modified system settings and other information is uploaded to the server, after analysis and processing, experts can cut off the source of the Trojan, do a good job in advance preventive measures.

Can cloud security succeed

With the first release of the "cloud security" concept of the 2009 full functional security software, whether the trend of international security manufacturers technology, Kaspersky or local manufacturers rising, Jinshan, has been in their own products to join the "cloud" security layout. In addition, many international antivirus manufacturers Kaspersky, MacFee, and NOD32, and so on in this year to increase the strength of the Chinese market. Due to the relative saturation of overseas markets, more and more international manufacturers enter China and cause fierce competition.

Rising vice president Yiding recently revealed that the government departments of "cloud security" innovation is very supportive, there have been some national projects started, will invest some funds to support. Yiding's comments mean that although the concept of "cloud security" has been challenged by hype, many security vendors are still actively planning.

However, some experts also calmly pointed out that although "cloud security" is the direction of the future, however, due to the current limitations of technology development, first of all, "cloud computing" is still in development, and not in the actual user to become an absolute leader, which based on its development of "cloud security" can only be in the current security software to repair. Again is at present to the threat file judgment technology is immature, the credit attestation scanning standard has not stereotyped, also very difficult lets the user be assured.

Original source from "Bit net", reprint please keep the original link: http://sec.chinabyte.com/277/12090277.shtml

(Responsible editor: Lu Guang)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.