Three credit services of cloud security

Source: Internet
Author: User

The core of cloud security is to go beyond the traditional method of intercepting Web threats. Instead, it uses global networks that collect threat information. This network uses Trend Micro's cloud security technology to intercept Web threats before they reach the network or computer.

Figure 1

Web reputation service. Trend Micro's Web reputation Service specifies the credibility score based on factors such as the website pages found by malware behavior analysis, historical location changes, and signs of suspicious activities, to track the credibility of the Web page. This technology will then be used to continue scanning websites and prevent users from accessing infected websites.

To improve accuracy and reduce false positive rate, Trend Micro Web reputation Service specifies a credit score for a website's specific webpage or link, rather than classifying or blocking the entire website, generally, only a portion of valid websites are under attack, and their credibility can change over time.

By comparing credit scores, you can know the potential risk level of a website. When a user accesses a website with potential risks, the user can receive a system reminder or block it in time to help the user quickly confirm the security of the target website. The Web reputation service can prevent malicious program sources. The zero-day attack prevention is based on the credibility of the website, rather than the actual content. Therefore, it can effectively prevent initial downloads of malware and users can obtain protection capabilities before they enter the network.

Email credit service. Trend Micro's email reputation Service Checks IP addresses based on known spam source reputation databases and verifies IP addresses using dynamic services that can evaluate the reputation of email senders in real time. Credit scoring is refined by constantly analyzing IP address behavior, activity scope, and history. Malicious email is intercepted in the cloud according to the sender's IP address, so as to prevent Web threats such as botnets from reaching the network or users' computers.

  1. Cloud security technology topics: cloud security
  2. Pandatv security: Internet security will enter the "cloud computing" Era
  3. How do users comment on "Cloud" security?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.