Understanding cloud computing and the full new Generation Cloud Security 2.0 technology (1)
Source: Internet
Author: User
KeywordsCloud computing Cloud Security 2.0
At present, cloud security has become a hot topic in the information security world. With the development of the security situation, the connotation of cloud security has been evolving, and new technologies and schemes have been integrated clouds the concept of security. For enterprise users, with the entire new generation of cloud Security 2.0 of the technology system gradually surfaced, the user's own security defense deployment also followed by a new change: the use of cloud technology to promote terminal security defense has become a brand-new experience. When it comes to cloud Security 2.0, insiders understand that any new technology is not an overnight occurrence. For security deployments, the current Cloud Security 2.0 system is upgraded from the traditional cloud security solution, through the addition of cloud client file reputation technology, threat discovery management technology, terminal security management technology, the new Cloud Security 2.0 technology system to the enterprise user's terminal security and response more in place. One aspect: Cloud Client file Reputation technology previous trend technology China's general manager Oscar in an exclusive interview with this newspaper, said the cloud client file reputation represents the past 25 years the popular anti-malware processing technology fundamental changes. In the final analysis, the root cause of this technology is to deal with the new and malicious threats, which are massive threats. Ping, general manager of Barracuda China, said a massive threat is a new type of threat characterized by exponential growth in numbers, which needs to be identified and handled by Anti-malware Protection solutions to ensure that users are protected without affecting normal business activities. According to IDC, up to the beginning of 2009, around 850 new malware will be added to the world approximately every hour. This number is expected to continue to rise by 2015, with 26,000 new malware per hour. "In view of this, enterprise users desperately need a new anti-malware protection infrastructure that can successfully deal with new and massive threats, avoid damage to itself, and minimize the impact of this malware on business operations." In other words, the cloud client file reputation technology has emerged. Oscar said. The reporter's view is that the current cloud client file reputation also belongs to a type of file reputation, or called blacklist interception mechanism. This technology uses traditional Anti-malware protection and defines anti-malware in the cloud to reduce the impact of overlapping and increased transmission patterns on customer networks. In fact, cloud client file reputation technology separates files from client scans, ensuring that scanning services can be looked up through the network so that local cloud scanning services, or scanning services across the Internet, can work as much as possible. This also solves the problem of extending the number of information updates to a large number of terminal systems in the network. Once the new content is updated on the scan server, all enterprise users can be protected immediately through the scan server. Overall, the mainstream security vendors will have a variety of types of file reputation technology, the different products of the file reputation technology is not the same, but the technicalThe technique fully utilizes the threat protection storage information based on cloud security and efficient client intelligent filtering, so all file reputation technology belongs to Cloud Security 2.0. Two points: Threat Discovery management technology at present, due to the increasingly complex threat of network security, the problem of data leakage in the workplace is endless. Some traditional security technologies, such as firewalls, ips\ids, and VPNs, are focused on preventing external threats from entering corporate networks, and are not effective in defending internal threats from corporate networks being invaded by employees browsing infected Web pages, accessing Web mail, or using IM software. According to the survey published by Trend technology, end users around the world are more likely to participate in high-risk online activities at work than at home, as of the two quarter of this year, such as opening an unknown email attachment or clicking on a malicious link. Obviously, employees do not have a correct understanding of network security at work. In addition, security solutions such as network access control emphasize evaluating and authenticating the initial state of a company's employees ' endpoints, according to the US receptacle World Report. Once the user has been approved for the first time, it will no longer be monitored, and users can also make malicious acts against the network. If a company employee is unaware of the dangerous consequences of these malicious acts, it may violate the security rules and result in data loss. In addition, today's "No boundaries" enterprises can freely share the information of employees and partners around the world, which undoubtedly further increases the security risk. Wedge NX, the global CEO of Zhang Hongwen, said to reporters that the current conditions for security reform has matured. He stressed that if the visibility of the cause of the invasion and its precise location were insufficient, the information technology sector of the enterprise could not identify the most appropriate remedy. To effectively increase coverage, security technicians need to get more information. In fact, if you understand that most threats are generated through gateways through it technology, the enterprise should install the appropriate gateway protection program. It is easy to see that businesses need a "security alert system" to accurately identify new known malware and measure the extent of damage that has occurred. In addition, businesses need a system that can fix and manage network threats to ensure proper, prompt repair and timely delivery of reports, identifying ways to prevent threats. Clearly, these requirements have been embraced by the Cloud Security 2.0 technology system. The Oscar view is that only the introduction of threat discovery management technology can meet the needs of enterprises to detect, reduce and manage threats within the network. And through the cloud computing platform, enterprises can quickly and effectively deal with malicious software, greatly reduce network damage control costs and improve the overall security level. According to the introduction, Currently, the Integrated Threat Discovery management technology in the Cloud Security 2.0 system is divided into three major phases: first, detect the network internal security threats; second, the management phase, using cloud security technology architecture for correlation analysis, wide spectrum identification of malicious behavior, identify the root cause of the threat, tracking and provide threat analysis; Third, feedback phase, make full use of cloudSecurity technology identifies and feeds on the latest security threats, and obtains detailed and timely defense support through the cloud's Security Center. The reporter found that in the current architecture, threat detection and threat discovery management often work together to monitor suspicious behavior in the network, thus detecting malicious software that is not found by traditional pattern matching. New technologies can mark malicious software that spreads or infects other users, including hidden malware that causes internal data to leak or receive instructions from a malicious source, such as a zombie network. 1 2 Next >> view full-text Navigation 1th page: Understanding Cloud Computing and all-generation Cloud Security 2.0 Technology Page 2nd: Understanding Cloud Computing and the entire next Generation Cloud Security 2.0 technology under the original: Understanding cloud computing and the entire new Generation Cloud Security 2.0 technology (1) Return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.