Nowadays, it is not easy to secure mobile devices such as laptops, cell phones, and PDAs. The endpoint security is extremely immature, and the security professionals have little to worry about.
Cloud computing and cloud security continue to promote the development of data and online applications, which is a revolutionary impetus to the traditional peripheral network security. Enterprise Users all need to use brand new mobile devices to access data through wireless networks. Some creative attackers are constantly inventing new methods to steal data from companies, so they can sell data on the black market. Internet security has been lagging behind the security form.
It is not easy to keep up with the evolving security form, but the answer may be on cloud computing and cloud security. Security experts know that they need to extend peripheral security controls to endpoints. One of the methods is to install the Security Proxy on a PC, which is highly risky and costly. Another option is to use some new Web-based security service providers, such as Purewire. Purewire implements Web security by directly forwarding Web communication through a proxy system. This service is between the user and the Web. It makes security decisions on the content generated on the Web. The Sandbox technology can be used to identify the web pages that users can browse based on different situations.
In cloud security, remote users who need to access resources stored in the cloud must first carefully check a security service provider. Cloud security services for malware and spam occupy a certain market share. Other security services are rapidly turning to cloud security, such as vulnerability scanning, denial of service protection, authentication, and data leakage services.
Cloud-based security has many advantages over the security proxy on the laptop. For example, some end users may disable the proxy installed on the endpoint, but the agent in charge of it can be completely controlled by the supplier. In addition, security agents installed on individual devices are expensive and difficult to manage. A leading traditional security control company recently discovered an unpleasant fact: it analyzed Nearly 8000 of its personal computers and found 3000 computers (mostly mobile laptops) all have zombie clients installed.
From the perspective of technological development trends, it is suspected that the Endpoint Security Proxy has gone astray. For example, for iPhone, users cannot install their own security software on the iPhone, because such things do not exist.
To be honest, cloud-based security providers are also facing challenges, most of which are price-based. Suppliers must ensure data security from and to remote users. Considering the burden of this architecture, cloud-based security services may become part of a larger cloud service.
This means that ISP, a large cloud-based company (such as Google), and a wireless operating company supporting 3G or higher bandwidth may play an important role in this security role. I believe that the share of cloud security delivery will continue to increase in the next few years.
Most small and medium-sized enterprises are taking a wait-and-see approach. Many managers believe that cloud security has many factors that may lead to loss of enterprise value. Although cloud computing is pushing Network Access to edge devices, the fact is that many small and medium-sized enterprises have not handed over their IT architecture and computing needs to the cloud.
Today, it is difficult to ensure the data security of mobile devices. The security of the Internet is not mature. The market needs faster and more stable development.