On the security from the boundary to the data-centric

Source: Internet
Author: User

Traditionally, corporate information security has focused on border defense-stifling it before it threatens to enter the corporate network. Such protection is important, but it now has cloud computing, mobile devices, and apt-advanced continuous penetration attacks. The information security required by the enterprise is to be able to protect their data, regardless of where the data is taken, regardless of the device on which the data is stored. Therefore, the enterprise needs a new, data-centric security strategy.

The previous time trend technology has held annual sharing activities for analysts and announced our new vision for data-centric information security. As early as 2008, trend technology launched the active cloud interception service, it can be our cloud technology, including e-mail, Web pages and documents and other credit rating services to do a further connectivity analysis. Such global threat intelligence technology can be blocked before it threatens to enter the network. But target attacks, as well as the ubiquity of cloud computing and mobile devices, extend the boundaries of the entire network. What the enterprise really needs is far beyond the traditional "out and inside" protection. Enterprises need to be "introverted" protection, and the focus is on the data itself. So we have to make our active cloud-cutting services smarter, and to be able to provide more protection, both locally and in the cloud, that can adapt to the threat of change.

For companies, this represents a trend-tech product that includes new perceptual technologies to collect local-side threat information and to perceive the use of internal data (who, where, what, when) to establish personalized data protection. This protection is provided by a unified architecture, with central control capabilities to manage the policy settings and actions of the entire network. Combined with global threat intelligence technologies and customizable local-side protection, the new active cloud-cutting service allows organizations to establish effective data-use policies and detect possible data-disclosure issues, whether from advanced sustainability threats, 0 jet-lag malware, or targeted attacks.

Chen Yihua, chief executive of Trend Technology, gave a speech on cloud computing at Las Vegas's VMworld conference. Before concluding her speech, she introduced the new security model (where you can see a short video of the speech). If the company can confirm that it is safe, no matter where the data is, the company will be more comfortable embracing consumer it, leveraging mobile technology to increase employee productivity, or adopting new infrastructure, such as cloud computing technology. To learn more about the data-centric security model, you can access this page of trend technology.

This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.