Eight reasons for adopting the no-proxy terminal security protection technology

Source: Internet
Author: User
Tags virus scan

Anyone familiar with terminal security knows that terminal security management is a time-consuming and laborious task. terminals are widely distributed, diverse, and difficult to control. Traditional terminal security protection methods need to deploy proxies on terminals to ensure that these proxies are always effective and can be updated in a timely manner. This is a challenging task.

The arrival of the era of virtualization and cloud computing has completely changed all of this. The virtual infrastructure brings new management and control measures to the enterprise's computing environment, making no proxy security possible. Compared with the traditional proxy mode, the non-proxy mode has many advantages:

1. Simplified deployment

Virtualization technology can help administrators quickly and simply deploy the system. Deploying a New System Using a virtual machine template is a simple and pleasant task, with no proxy mode, the Administrator does not need to deploy or update the agent in the model machine to better ensure the compliance of the Virtual Machine and reduce the volume and management workload of the virtual machine. The added work is to deploy a secure virtual device SVA on each physical server. Taking the conventional integration ratio of as an example, the deployment workload is reduced by 4/5. If the application scenario is VDI, A server can deploy dozens of virtual desktops, and the deployment workload is only a fraction of the proxy mode.

Ii. simplified management

Maintaining the terminal, especially the security proxy inside the terminal, is one of the important tasks of the Administrator. In proxy mode, the Administrator must monitor the agent status on each terminal at any time, promptly detects problems such as no proxy, abnormal proxy functions, and obsolete proxy. If the protection is not in place, the security of the entire network will be greatly affected. The non-proxy mode is used, and the management workload of this Part does not exist. The added work is the management of security Virtual Device SVA. According to the above, the management workload is only a fraction to a tenth of the proxy mode.

3. Avoid virus scanning storms

Security agents occupy a large amount of Host resources when performing virus scanning. in virtual infrastructure, virus scanning has a more significant impact on performance. When a virtual machine is started and periodically performs scanning or when a worm virus is prevalent, if the scanning behavior cannot be effectively controlled, a virus scan storm may occur, seriously affecting the performance of the business system or even service interruption. In non-proxy mode, the scanning of multiple virtual machines running on the same physical server is uniformly scheduled, and resource occupation is effectively controlled, eliminating the occurrence of virus scanning storms.

4. Reduce resource usage

The Security Proxy running on the host occupies the CPU, memory, and disk resources of the host. Engine and virus-defined updates occupy network resources. In recent years, malicious programs have grown rapidly, and the volume of Anti-Virus products and virus definition files has increased. Although security vendors have continuously introduced new technologies to reduce the impact of security agents on hosts, still cannot effectively solve this problem. This problem does not exist in the non-proxy mode. When the number of terminals is large, the number of resources saved will be considerable.
Figure 1 shows the comparison of memory resource usage in two modes, and Figure 2 shows the comparison of the bandwidth usage of virus update in two modes.
650) this. width = 650; "border =" 0 "alt =" when there are too many other large numbers of small numbers of numbers "src = ".. /attachment/201201/005605492 .jpg"/> 650) this. width = 650; "border =" 0 "alt =" "src =" http://img1.51cto.com/attachment/201201/163151403.jpg "/>

5. Keep up to date

In traditional mode, if the host is often shut down or offline, security products cannot be updated in a timely manner. When the host is powered on or connected again, the system is vulnerable to infection and damage. 0-day attacks are increasing. If the real-time update of Anti-Virus products and virus definitions cannot be ensured, the protection effect will be greatly reduced. No proxy mode is used, as long as the security Virtual Device SVA is guaranteed to be online at any time, it can be updated in a timely manner.

6. higher density and lower cost

As mentioned above, the no-proxy mode can greatly reduce resource usage and completely eliminate virus scanning storms. Therefore, it can increase deployment density and reduce hardware procurement costs. In addition, non-Proxy Security protection products for virtualization platforms usually provide the physical CPU-based authorization mode, in which the product is purchased, it is much more cost-effective than purchasing by the number of deployed nodes. The higher the deployment density, the higher the price/performance ratio.

7. Better security

Many malicious programs take security products as their targets. Security products must have good self-protection functions, but such self-protection functions are not effective. Once a security product is infected with malicious code, it not only fails to provide protection, but also accelerates the delivery of malicious code. This hidden danger is eliminated in non-proxy mode. Security Virtual Device SVA adopts a dedicated system with a high security level, which significantly improves the overall security in the agentless mode.

8. Higher efficiency

In non-proxy mode, physical hosts are the basic unit of security protection, activities generated on all virtual machines running on a physical host are monitored by the security Virtual Device SVA deployed on the physical host. When multiple virtual machines perform the same activity, SVA can use the cache technology to accelerate scanning to improve scanning efficiency, especially those operating systems and application files that are already present in multiple virtual machines, the scanning performance will be greatly improved.

650) this. width = 650; "border =" 0 "alt =" too many times? "Src =" ../attachment/201201/005444725 .jpg"/>

For more information about the no-proxy terminal security solution, visit:

VMware vShield Endpoint cloud security solution:
Http://www.vmware.com/cn/products/datacenter-virtualization/vshield-endpoint/overview.html

TrendMicro Deep Security non-Proxy Security Solution:
Http://cn.trendmicro.com/cn/products/enterprise/DSDeepSecurity/index.html

BitDefender SVE No proxy security solution:
Http://www.bitdefender.com/sve

This article is from the blog "Simon [love life, love learning]". For more information, contact the author!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.