The core of cloud security is to go beyond the traditional method of intercepting Web threats. Instead, it uses global networks that collect threat information. This network uses Trend Micro's cloud security technology to intercept Web threats before they reach the network or computer.
Web reputation service. Trend Micro's Web reputation Service specifies the credibility score based on factors such as the website pages found by malware behavior analysis, historical location changes, and signs of suspicious activities, to track the credibility of the Web page. This technology will then be used to continue scanning websites and prevent users from accessing infected websites.
To improve accuracy and reduce false positive rate, Trend Micro Web reputation Service specifies a credit score for a website's specific webpage or link, rather than classifying or blocking the entire website, generally, only a portion of valid websites are under attack, and their credibility can change over time.
By comparing credit scores, you can know the potential risk level of a website. When a user accesses a website with potential risks, the user can receive a system reminder or block it in time to help the user quickly confirm the security of the target website. The Web reputation service can prevent malicious program sources. The zero-day attack prevention is based on the credibility of the website, rather than the actual content. Therefore, it can effectively prevent initial downloads of malware and users can obtain protection capabilities before they enter the network.
Email credit service. Trend Micro's email reputation Service Checks IP addresses based on known spam source reputation databases and verifies IP addresses using dynamic services that can evaluate the reputation of email senders in real time. Credit scoring is refined by constantly analyzing IP address behavior, activity scope, and history. Malicious email is intercepted in the cloud according to the sender's IP address, so as to prevent Web threats such as botnets from reaching the network or users' computers.
- Cloud security technology topics: cloud security
- Pandatv security: Internet security will enter the "cloud computing" Era
- How do users comment on "Cloud" security?