Triple benefit for operators to deploy "cloud security"
Source: Internet
Author: User
KeywordsCloud security cloud security McAfee
Is cloud security really safe? At the end of April 2011, Sony was attacked by hackers, and more than 77 million of users ' animated cloud service users ' names, emails and password-key information were stolen. There is evidence that hackers who hacked the Sony database used Amazon's EC2 cloud computing service and used the service to launch an attack. The Sony hacking scandal raises doubts about the current hot cloud computing, and is cloud services really safe? The report by IDC, the world's leading market research firm, says 87.5% of users now believe that "security issues" are a major obstacle to their adoption of cloud-related services. In fact, at present the security of the concept of cloud security vendors very much, in the current era of service homogenization, the industry's focus on the security enterprise has shifted to the Yunan system-wide way of building. McAfee, which provides cloud security solutions for a number of telecom operators, including At&t, has a unique understanding and experience in cloud security. In response to current carrier cloud service security threats and McAfee's coping strategies, the reporter interviewed McAfee China technical director Zheng. "For the cloud, cloud, from the cloud," according to Zheng, cloud security can be divided into three aspects, can be visualized as "for the cloud, based on cloud, from the cloud," which is also a very appropriate way for operators to partition. McAfee provides the corresponding cloud security solution in these three areas, which helps operators achieve security performance improvements at low cost and gain value-added revenue. Zheng said that "for the cloud" is how to protect the enterprise's cloud computing system, including public and private clouds. Amazon, for example, provides a public cloud service. At present, the three major operators in China are actively exploiting cloud services, and their cloud systems also face security threats. "Cloud based" means how to provide security services to users. Traditionally, the enterprise establishes the security management system, needs to buy the hardware and software and consumes the manpower management, but the cloud based security service is like the tap water general, may save the user to build the security system the trouble. At present, operators have established their own security systems, and similarly, in order to save money, you can directly select the cloud security services provided by the manufacturer. In addition, operators also choose to work with security vendors to provide cloud security value-added services to end users. "This model is emerging globally. "From the Cloud" refers to the use of cloud computing to improve security protection capabilities. "This is our use of cloud computing to enhance our own and user security capabilities," Zheng, the world every day there are tens of thousands of new attacks appear, if also based on traditional methods to prevent intrusion virus, users will not be able to guard against. With the latest information from sensors distributed around the world, including intrusion information, virus information, and through the security vendors in some data centers across the country to share information, you can give timely solutions and distribution. Build the Cloud security system GTI in response to the current carrier's demand for security, Zheng says, on the one hand, operators want to build high-performance security systems at low cost, on the otherIt also wants to be able to move from a passive defense virus attack to the initiative to attack from the source, eliminating security threats at the initial stage. "Both of these need to be implemented by cloud security services. "It is understood that" cloud security "technology to achieve the premise is a large cloud and thin client combination, so how to build an effective intelligent threat collection system, Computing cloud system, service cloud distribution system becomes very important. To accommodate this need, McAfee launches its own cloud security Network global threat IntelliSense system (GTI). The GTI combines security in the messaging, Web, and network security areas, creating a multi-platform umbrella for Internet security that has long been missing in the area of Internet security. GTI accumulates a large amount of data from more than 7,000 sensors in more than 100 countries (which includes more than 110 billion messages and millions of URLs per month) to create the most accurate archive of all senders, messages, Web sites, and domain activities on the Internet, and then the GTI These files can be used to monitor for violations of expected behavior, thus accurately defining potential security risks and threats in advance. According to Zheng, currently the GTI system can detect more than 50,000 malicious software every day, 20 billion times a month to e-mail reputation inquiries and 75 billion network reputation inquiries. "It can be said that McAfee offers the widest range of SaaS security solutions in the world, offering a variety of options for IDC, and providing a choice of multiple tiers of protection for IDC customers." As a variety of SaaS security Solutions, the GTI is a strong supporter of McAfee. "Help at&t build cloud security services at present, US operator at&t provides a mail-based cloud security service that provides security value-added services for its IDC users. The system is built by McAfee. For the implementation of the system, Zheng said McAfee first provided the cloud services to at&t, including spam and virus-mail filtering, as well as the archiving of messages and other means of protection. and by providing the at&t corresponding to the cloud of the IDC security services, so that its IDC users can use modular mail security services. These mail security services include virus mail and spam filtering and mail archiving. Of course, the choice of these services depends entirely on the user. For at&t, adding this value-added service does not require any hardware investment, no need to buy mail security gateways, additional servers, and no need to occupy the computer room resources and equipment, including network bandwidth, power, room space, etc., but to achieve its IDC business differentiation, enrich the user experience. It is worth mentioning that the service provided by At&t is accompanied by the evolution of McAfee's Cloud Mail Security Service, and continues to improve service quality without any additional investment. At&t by this way, on the one hand givingUsers provide a competitive differentiated support services, improve the competitiveness of their own market and customer viscosity, on the other hand reduce their own losses, and truly realize the green IT services advocated. Cloud security issues for everyone to introduce so much, I hope that readers in the page to get the information you want, the site will continue to pay attention to the relevant content. "Editorial Recommendation" traditional anti-virus concept of the end of the domestic pseudo-cloud security in the cloudy safe road where data protection is the key to how to look at cloud security issues? Rising won the "Best Technology Innovation Award" "Cloud Security" to lead the future direction of cloud security concerns just cloud? "Responsible Editor: Liyan TEL: (010) 68476606" Original: Operators Deploy "cloud security" to get triple benefits return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.