The cloud: the arrival of the cloud security era? (1)

Source: Internet
Author: User



Recently, the promotion of "cloud security" has become the focus of the industry. What is cloud security? The concept of "cloud security" comes from "cloud computing". It can be said that "cloud security" is the application of "cloud computing" Technology in the information security field. To put it more simply, "cloud security" refers to the use of the client to collect virus samples, and then find a processing method for distribution to users, in this way, the entire Internet has become a large anti-virus software that safeguards the security of users' computers.

Cloud security concept proposal

In March this year, rising Kaka 5.2 integrated the "automatic online diagnosis" function. Every time a user starts a computer, the module automatically detects and extracts suspicious Trojan samples from the computer. If abnormal behavior programs are found, the module uploads the samples to the rising "Trojan/malware Automatic Analysis System" for analysis, and feedback the results to the user. Since Kaka has tens of millions of active users, any samples of the users will be collected, which can solve the difficult problem of collecting Trojan samples to the greatest extent. With advances in technologies such as automatic shelling and Behavior Identification to identify unknown viruses, rising servers can automatically handle most of the new viruses Uploaded By Kaka. In this way, the rising server and tens of millions of Kaka users can form a virtual network, referred to as "Cloud ". All attacks against the cloud are intercepted, recorded, and counterattacked by the server.

The cloud: the arrival of the cloud security Era

Rising

In July 16, rising company officially released the "Rising Star Card netbook Security Assistant version 6.0", and launched the Internet-based new Security model-"Cloud Security" Cloud Security) program.

Rising Security experts said that rising Kaka 6.0 is completely designed based on the Internet and is an important part of Rising's "Cloud Security" Cloud Security program, this product has three unique anti-Trojan functions: automatic online diagnosis, Trojan behavior judgment and interception, and Trojan download interception, it is a brand new anti-Trojan weapon that integrates anti-DDoS, query, and killing. Rising Cloud Security plans to closely connect users and rising technology platforms over the Internet to form a large network for Trojan/malware monitoring and detection and removal, each "rising Kaka 6.0" User contributes to the "Cloud Security" Cloud Security) program and shares the Security achievements of all other users.

Trend Micro

On June 19, July 22, Trend Micro presented the next-generation content security protection solution built on the Cloud security technical architecture Cloud-Client at the press conference titled "Web security Cloud era, formally entered the "cloud security" field.

As the next-generation content security architecture, SecureCloud cloud security technology aims to dynamically evaluate the security level of accessed information and block it directly at the source end before malicious information intrude into the network, this provides zero-touch and zero-infection protection.

Trend Micro, as the first cloud computing platform-based security solution provider in the world, is of great significance to the entire information security industry. For the entire cloud computing puzzle in the IT industry, collective migration of members in the industrial chain is required, especially the establishment of the cloud computing architecture of information security vendors ", in the future, the cloud computing industry will become a new paradise for Web threats. with the release of a complete network information security solution based on the cloud computing architecture, Trend Micro has added an important segment to the IT industry's cloud computing puzzle.

Kaspersky

Kaspersky launched a security solution in early August: Kaspersky full-featured security software 2009. In this solution, we have organically integrated various security modules specifically developed by Kaspersky Lab for current security threats, including the "cloud security" technology, provides users with complete security defense from various perspectives. In fact, Kaspersky Lab is the first security vendor to push "cloud security" technology to commercial use.

IBM and Google were the first vendors to commercialize the "cloud computing" technology. They use the "cloud computing" technology and the efficiency and stability of distributed computing to provide users with better application services. For information security vendors, especially content security vendors, cloud computing technology can be used to cope with the security threats brought about by the explosive growth of malicious code. It should be said that "cloud computing" or "cloud security" are in the security product architecture, the primary role is to quickly collect, summarize, and respond to the latest malicious code, spam, phishing URLs, and other information. It organically integrates a large number of clients and shares the security threat information submitted by all users who voluntarily join in to form a massive malicious threat rapid response system, said Gao Xiaowei, product manager of Beijing Kaspersky Technology Co., Ltd.

McAfee

On June 23, September 8, the famous security vendor McAfee announced that it would launch the cloud computing-based security system Artemis. The system can protect computers from viruses, Trojans, or other security threats.

Researchers at McAfee's Avert Labs said the system could reduce the time needed to collect and detect malware and the time required to configure the entire solution. With the development of the security system, this time has been reduced from the past few days to several hours, and has now dropped to "Several milliseconds ".

Traditional security systems use threat signature databases to manage malware information. As a cloud computing service, Artemis can respond to threats before the signature file is released.

Marcus said Avert Labs researchers found tens of thousands of new signature files every week. If the user's computer is equipped with an Artemis system, once the computer detects a suspicious file, it will immediately contact the McAfee server to determine whether the suspicious file is malicious. In this way, McAfee can also use the  to provide enterprises with customized security solutions.






Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.