Trend Cloud security and network security construction of Zhengzhou Institute of Light Industry

Source: Internet
Author: User
Keywords Light industry safety
Tags application block cloud cloud security cloud security technology code create crossing
Network security may be the most suitable for the "barrel effect" concept of it construction, all aspects of protection in place to create a relatively safe network environment. In this comprehensive protection, the economic crisis of last year undoubtedly made many enterprises more headaches. Some corporate IT executives complain of "overall security and reduced investment", which makes many it executives feel that this year's network security building will face more severe challenges.

The Zhengzhou Institute of Light Industry, which has only 5 network security administrators, faces the same challenges, but has a way of coping with it. Crossing security, good steel. Last year's global economic crisis continued, so the various enterprises in the IT budget shrinking, network security construction has also been affected. But routines, director of it at Zhengzhou Institute of Light Industry, said: "Network security should not be lax because of reduced investment." In contrast to the previous overall deployment of security products, the most needed now is to deploy security products at key points, with limited inputs to key areas. ”

Although not directly affected by the financial crisis, but the Zhengzhou Institute of Light industry or the attitude of prevention tightened monetary, which in the network security construction on the formation of a "good steel to use the edge of the" concept of construction. As the first national purchase Trend Technology Web security Gateway-IWSA 5000 of colleges and universities, Zhengzhou Institute of Light industry's security needs are also very "practical": to ensure the basic needs of security, from the practical.

Routines said: "At present the school in the network security aspect still pays more attention, especially the application effect is good, the cost is not too high the anti-virus system, the school did not reduce this aspect the investment." "In recent years, with the popularity of the Internet, web threats have become increasingly serious." New malware is constantly automatically downloaded from the Web. From the discovery of malware samples, to the production of virus signatures, and then to users to update the virus library, the user network security of the "empty Window" has been extended, the probability of the threat is greatly increased.

These threats to schools such as Zhengzhou Institute of Light Industry has brought about two adverse effects, one is the business impact. For example, malicious threats will block the network, so that bandwidth, so that the system response slowed down, and the second is the policy impact. such as hackers tampering with the Web page, dissemination of bad information. In order to block the malicious threat of intrusion into the campus network, Zhengzhou Institute of Light Industry to consider using the current more popular gateway interception scheme.

An accidental opportunity, Zhengzhou Institute of Light Industry in contact with the trend of technology IWSA products, after inspection, comparison, testing, and finally decided to deploy, expect from the gateway to eliminate web threats intrusion network. Hardware Security Gateway product IWSA, as a trend technology, not only uses the most advanced cloud security technology, but also does not occupy the customer's network resources. Although Zhengzhou Institute of Light Industry has only 5 network security administrators, but faced with a large number of network threats, does not highlight the problem of inadequate personnel.

After deploying IWSA, there is a significant decrease in the number of virus events to be processed on a daily basis. IWSA not only simplifies deployment and day-to-day management, but also greatly relieves the pressure of network security administrators and lowers the human costs associated with network security. At the same time, because the IWSA malicious Web page is done in the cloud, it greatly reduces the number of virus code downloads, thus reducing the consumption of enterprise network resources and hardware devices due to downloading and distributing virus code.

It can be said that the application of IWSA, in doing a good job of preventing viruses, but also for the college to save the human and material input. Avoid the individual combat cloud security to create a comprehensive protection of security is not only the responsibility of safety products, for the application of people, also need to bear a certain responsibility. In the concept of WRT (web reputation Technology), one of the core technologies of cloud security proposed by trend technology, Web pages are divided into different security levels according to their own 50 attributes.

When accessing these sites, users will be prompted for security and block access to malicious Web pages. However, routines that the site is not enough to grade, but also should be to the people who visit the rating. For frequently poisoned terminals, the bandwidth of their access should be reduced. This will prevent the occurrence of external attacks. Routines said: "Security is in the various links, the user-side desktop protection, LAN for external protection, LAN protection, special server protection, etc. are essential."

Protection to form a system, not only to do a single point. And cloud security is a good way to avoid ' one-man battle '. "The idea of routines is now being progressively realized with the help of cloud security. At present, Zhengzhou Institute of Light Industry currently deployed IWSA and OfficeScan8.0 are supported by the cloud security technology is the use of distributed security concepts, the security protection of the "point" into the "face", from the client protection, server protection, extended to the gateway protection, improve the protection of each node, The final form of comprehensive protection.

Trend technology "cloud security" has been completely beyond the traditional virus code comparison method, is the trend of science and technology lasted 2.5, cost 300 million U.S. dollars, and in June 2008, the world's first release of the new generation of network security technology. By deploying 5 of the world's largest threat data centers and 34000 cloud servers, it will take at least 2 hours of hand-crafted signatures, compressed into a few seconds with cloud computing technology, and significantly shorten the "empty window period."

It is understood that the trend of technology, "cloud security" technology, can handle 250 million samples a day, to prevent 20,000 new viruses invade the network, and to ensure that the cloud query in milliseconds to complete, will not cause delay to users. Routines Introduction: "Although the safety of investment has been reduced, but if we strengthen the training of personnel, improve the level of application, the formation of good internet use habits and strong awareness of security precautions, will allow limited security products to play a greater value." This is a way to deal with the economic crisis. ”

The Zhengzhou Institute of Light Industry has created a three-dimensional protection system that can sit back and relax in the face of a menacing web threat, after a number of security solutions are deployed, such as the Web security gateway IWSA, the antivirus wall network version officescan, the built-in anti-spam messaging system, and so on. Summary can be seen, the trend science and technology "cloud security" played a vital role in the network security protection of Zhengzhou Light Industry institute, especially through integrating the OfficeScan and IWSA of "cloud security" technology, building a stereoscopic and multi-level protection system for the campus network security protection, making the campus network cleaner, More efficient and safer!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.