Anti-Virus Software for Web Security Products
As an important security application tool, anti-virus software has always been favored by users. As the saying goes, anti-virus software will continue to improve the detection and removal technology and operating mechanism with the variants and proliferation of various viruses.
In recent years, the anti-virus software market has become increasingly competitive. domestic manufacturers have also paid more attention to product technology innovation and advertising. There are two anti-virus software KV2010, which subverts the traditional anti-virus mode and uses 29 security protections, as well as 2010 anti-virus software which focuses on Intelligent Active Defense and fast detection and removal, it only accounts for 2011 of Kingsoft drug overlord, which claims to be the real cloud detection and removal of MB of memory. On the other hand, foreign security vendors have just gained a firm foothold in the domestic enterprise-level market and have entered the competition in the domestic retail market. What's more, the concept of ignoring the Chinese security market has been changed to a great scale to enter China. For example, Avira, the first anti-virus software in Germany this year (also known as Little red umbrella), is the best example to enter the Chinese market.
Currently, anti-virus software at Home and Abroad accounts for half of the domestic security market. Among the five dominant foreign Antivirus software brands, Trend Micro's PC-cillin, MacOS, Kaspersky, Symantec's Norton Antivirus and Panda Antivirus software products. In China, Kingsoft, 360 anti-virus, Jiangmin, and rising.
It should be noted that the online edition (Enterprise Edition) market of anti-virus software is also an area that cannot be ignored. These enterprise-level anti-virus software requires a higher technical level and service level than the common edition. It not only requires multi-platform support, but also supports all network protocols and email systems that may be applied by the enterprise.
Compared with foreign security vendors, anti-virus software vendors in China currently have two advantages: price and local virus detection. However, in the long run, with the increasing depth of Internet applications and the improvement of living standards, people will pay more attention to network security, this makes the security software products that provide the best service and advanced technology undefeated for a long time.
WAF for Web Security Products
A firewall is a device that helps ensure information security. It allows or restricts the transmission of data according to specific rules. It can be an exclusive hardware or a set of software set up on general hardware. The network is segmented and isolated based on functional, confidentiality, security, and other requirements, respectively limiting the threats caused by attacks and intrusions to smaller subnets, improve the overall security level of the network system. Common routers, virtual LAN, and firewalls are currently the main network segmentation methods.
In terms of implementation principle, firewall technology includes four categories: Network-level firewall (also called packet filter firewall), application-level gateway, firewall-level gateway, and rule inspection firewall. Each of them has its own strengths. The specific use or mixed use depends on the specific needs.
Network-level firewall-generally based on the source address and Destination Address, application, protocol, and the port of each IP packet to determine whether or not to pass. A router is a "traditional" network-level firewall. Most routers can check this information to determine whether to forward the received packets. However, it cannot determine where an IP packet comes from, where to go.
Application Gateway-application gateway can check incoming and outgoing data packets and transmit data through gateway replication to prevent direct connection between trusted servers and clients and untrusted hosts. Application-level gateways can understand the protocols at the application layer, perform complex access control, and perform fine registration and auditing. It targets special network application service protocols (data filtering protocols) and can analyze data packets and generate relevant reports.
Hierarchical gateway-a hierarchical gateway is used to monitor the TCP handshake information between trusted customers or servers and untrusted hosts, so as to determine whether the Session is legal, the hierarchical gateway filters data packets at the Session Layer in the OSI model, which is a layer 2 higher than the packet filtering firewall. The ingress gateway also provides an important security function: Proxy Server ).
Rule check firewall-this firewall combines the features of packet filtering firewall, firewall-level gateway, and application-level gateway. However, unlike an application-level network firewall, it does not break the Client/Server mode to analyze data at the application layer, allowing trusted clients to establish direct connections with untrusted hosts. The rule check firewall does not rely on an application-layer proxy, but on an algorithm to identify incoming and outgoing application-layer data. These algorithms compare inbound and outbound data packets through the mode of known valid data packets, in theory, this is more effective than the application-level proxy in data packet filtering.
Generally, the firewall can be configured in the following network connection areas:
A. Connection Between the Intranet and the Internet. You can use a firewall as a gateway device to implement address translation (NAT), network isolation (DMZ), and access security control.
B. In the WAN System, the LAN of the enterprise headquarters regards the LAN of each branch as an insecure system. You must install firewalls separately and use the VPN functions of firewalls to form a virtual private network.
C. When you need to serve mobile dial-up users, use the VPN function of the firewall to form a dial-up VPN (VPDN ).
D. SP can use the load balancing function of the firewall to add a firewall between the public access server and the client for load balancing, access control, user authentication, traffic control, log recording, and other functions.
E. You can use a firewall when there is information control requirement between networks in different departments of the enterprise network.
Currently, the competition for firewalls in the domestic market is fierce. On the one hand, foreign vendors have successively entered the Chinese market. The well-known foreign firewalls in the Chinese market include checkpoints, Gauntlet, Pix, and Netscreen. On the other hand, due to the large demand in the firewall market, many domestic network security vendors use firewalls as their first choice in production. For example, Skynet, tianrongxin, zhongke netwei, Lenovo, Hisense, and Ziguang all have their own firewalls.
Compared with domestic products, foreign firewalls occupy a high level of technical maturity. Foreign firewall products are generally used for finance, telecom, and large-scale ISP services. Domestic self-developed firewalls are mainly concentrated in the low-end field. However, considering the potential hazards of firewalls outside China, State authorities and military departments generally use their own firewall products.
The content of the Web security product has been introduced to you. I hope you can understand it.