200 million viruses wreak havoc on internet trends technology Q "Cloud security"

Source: Internet
Author: User
Keywords Cloud security trend technology
"Now the virus is increasing at a tremendous rate, there are about 20,000 new malicious programs every day, which poses a great challenge to traditional anti-virus methods." "August 6, the global vice president of trend technology, Greater China's executive director Oscar told reporters that the trend of technology to anti-virus software technology upgrades aimed at the" cloud security.


 


that the trend technology cloud security technology is through dynamic access to the security rating of the information, the establishment of a variety of credit library, which is equivalent to the virus signature stored in the cloud, before the malicious information into the user's computer, it will be directly blocked.





Oscar that the current industry is a turning point, a huge amount of new viruses and increasingly large virus database so that the traditional anti-virus model is increasingly weak, anti-virus software market will face a new shuffle. In fact, in addition to trend technology, rising also announced a high-profile launch of the "Cloud Security" program, using cloud computing technology to build a more complete security defense system to deal with the emerging virus.





"Cloud Security" on the road





Despite the recent launch of the concept of "cloud security", Oscar said trend technology had started doing research and development before 2.5, and it was related to the prevention of spam.





"The main focus was on spam, and we bought a company in the United States." According to Oscar, in June 2005, Trend Technology acquired a company called Kelkea. The latter mainly provides IP filtering and reputation services, which provide services that effectively protect against phishing, domain spoofing, and attacks via botnets (Botnet).





trend Technology hopes to strengthen its anti-spam solutions through this acquisition. Data show that in 2004, 70% of the world's e-mail communications were spam. According to Oscar, until two years ago, the Internet or mainly mail virus, "We are in the prevention and control of spam when there is a problem, because of the fear of accidental deletion, must be all the mail to save, customers need to be at any time to find."





However, as the number of messages becomes larger, it becomes more difficult to find jobs.





"Using Kelkea technology, trend technology can create new security patterns at the network level to address security threats." "The trend technology is beginning to apply to cloud computing in the research and development of spam," Oscar said. "At first it was a mixture of its own databases and clouds, because technology was immature".





as the virus began to shift from mail to Web in recent years, the number of viruses is increasing and the database is getting bigger, "so we decided to simply start all over the cloud and reinvest the server structure."





It is understood that trend technology in the world has 34,000 of servers to build cloud security network. Oscar said the current trend of technology in the cloud security of the cumulative investment has exceeded 100 million U.S. dollars, "which server maintenance costs will be 10 million dollars a year."





learned that, according to the three main ways the virus arrives at the computer, trend technology has launched a Web reputation service and e-mail reputation service based on "cloud security", and is planning to launch a document reputation service next year.





Another anti-virus software manufacturer Rising also launched a "cloud security" program. Rising of the practice is, through the Rising Card assistant monitor the user's computer files, automatically send suspicious documents to the analysis system rising, monitoring is the virus to give killing, and the results to share with other users.





"will users and rising technology platform through the Internet closely linked to form a huge trojan, malicious software monitoring killing network." "Rising safety engineer Tao said," It may take several hours before manual processing of a sample, now in this way only a few minutes. ”





traditional antivirus mode meets bottleneck





Trend Technology Product technology consultant Xu Xuerong said that the virus to invade the computer mainly through three ways: one is USB, the second is the mail, the third is the Web, "from the current situation, the web has become the most important way to spread the virus."





Trend Technology monitoring data show that the Web threat reported by TrendLabs increased 17.31 times times from 2005 to the first two quarters of 2008. TrendLabs predicts that if the number of threats continues to grow at the current rate, there will be 233 million unique threats in 2015, with more than 26598 new threats to be detected per hour endpoint systems.





According to the Xu Xuerong, the traditional method of tracking daily threat rates and then releasing timely security updates will no longer be safe, because signature updates never catch up with the speed at which new viruses are generated.





It is understood that antivirus software manufacturers are commonly used in the code than the technology, through the collection of malicious program samples, develop signatures and then put these signatures to users to achieve anti-virus effect. Because the virus signatures are kept at the user terminal, the user must maintain constant updates to achieve a better defense virus.





However, traditional code is rapidly losing the effectiveness of the technology-killing virus.





"2005, one day only about 50 signatures were added to the database, and in 2008 the number increased to 5000. Oscar said that the proliferation of viruses on the one hand will cause the antivirus manufacturer's busy, "No matter how the update will have loopholes."





In addition, because the virus signature files are exponential growth, there is an irreconcilable contradiction between the limited storage space and the endless number of viruses, which can result in a large consumption of the user's computer resources.





It is this pressure that has forced antivirus vendors to start looking for new models, and cloud computing is just a way for antivirus vendors to bring new ideas: through a large cloud of servers, the user's computer to access malicious information before it blocked, do not need users of the computer to store a large virus library.





Oscar said, "I think the industry is a turning point, we find the way is cloud security, other manufacturers may have other ways, but the traditional model will certainly change." ”





, a market research firm Gartner, predicts that security software will shift from PCs to cloud computing. By 2013, the cost of online security software services will increase 3 times-fold. In the next five years, according to Gartner, the proportion of malware and spam detection revenue to total message security revenue will increase from 20% to 60% in cloud-based e-mail and instant messaging.





Effect Checking





in Oscar view, the emergence of cloud security to allow customers in the traditional anti-virus way more than a choice, as to whether the industry trend caused by other manufacturers follow up, is not sure. This is because, as a new technology, the effect of cloud security has yet to be tested.





Some people think that rising cloud security just borrowed the "cloud" of the name, in fact, just improved the virus collection methods. In this respect, Tao said, "The current cloud security is still in the initial stage, this is only the first step of the cloud security plan, the future companies will be more than 70% of energy for this area." ”





in fact, the application of trend technology to cloud security is also in the test water stage. According to Oscar, current trend technology has put some of the company's low-end product line into the "cloud security" program, while most high-end product lines, is still in the preparation process.





at the same time, the trend is currently taking the "cloud Security + code alignment" Dual protection mode, cloud security is as a user to provide the first line of defense, and did not completely abandon the traditional virus signature in the terminal.





However, Oscar says that the feedback from users who have adopted cloud security services has given him a lot of confidence that "previously customers complained that the monitoring rate was not good enough and complained less after using this technology".





Xu Xuerong said that in the second quarter of this year, trend technology to 28 companies using cloud security Technology Survey, "27 of them expressed satisfaction or very satisfied, the network virus outbreak has a significant decline." The result is beyond our imagination. "
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.