"Three times a year upgrade memory, still can not meet the high requirements of antivirus software." Each upgrade product model, the computer's system resource occupancy rate is soaring, anxious to maintain the highest configuration of the year to become! Now, at the same time get efficient security and smooth network operation, unexpectedly became a kind of extravagant hope! "Mr. Zhang, the IT director of an enterprise, and many of the enterprise's IT executives, is hard to choose between efficient anti-virus products and optimizing network resources."
Based on the customer's dual demand for security effects and minimum hardware configuration, trend technology pioneered the cloud security technology in July this year, surpassing traditional code-comparison techniques by saving most signature files to the Internet Cloud database and keeping the minimum number at the endpoint. Intercept web threats before they reach the corporate network. This new approach not only frees up a lot of system resources on the client side and reduces the bandwidth consumption of the endpoints, but also provides more timely and more comprehensive and timely protection. Therefore, "cloud security" by many enterprise IT managers is called the economic crisis, the Enterprise network security "life-saving straw."
Traditional virus code updates overwhelmed Enterprise memory
In recent years, the rapid increase in the number of viruses, anti-virus products for memory requirements are also rising. Since 2001 to occupy 10M of memory, up to now, a common security solution of the memory demand of up to 100M, and more full-featured, better effect of the plan will need 160M. It is clear that the high cost of 160M memory consumption has deterred many businesses. Trend Technology Product Technology consultant Xu Xuerong introduced: "The reason why anti-virus products eat memory is so amazing, not only because the network security solutions more and more functions, functional modules more and more perfect, more important because in recent years, the memory consumption of virus signature files grow exponentially." In 2005, only about 50 signatures were added to the database, and in 2008 the number increased to 5,000. ”
The traditional anti-virus technology is to study the virus samples and carry out the virus characteristic contrast to realize the security protection to the user. Its technical principle decides, guarantees the enterprise network security, must have the virus signature database which is consistent with the virus quantity as far as possible. The huge database is entirely at the expense of enterprise memory, system resources. In the face of the current economic crisis, this high hardware investment in exchange for network security practices, for many enterprise users is undoubtedly worse. To rely on the traditional virus signature way to kill a virus, it is impossible to reduce memory footprint, we must do a radical transformation of the idea of anti-virus.
Cloud protection frees up 70% of enterprise memory footprint
ICBC is a hardcore user of trend technology, from the 1998 version of the first network version of protection software 3.52 to today's three-dimensional security solution, experienced a trend in technology from the traditional code contrast technology to the cloud security technology conversion. Its IT leader: "Cloud security technology in the release of memory effect is not what we think of, compared to the previous, cloud security reduced by 70% of the amount of memory." I remember when OfficeScan7.3 upgraded to OfficeScan 8.0, the memory footprint rose from 70MB to 100MB, and we had to increase the hardware input from the terminals. And now, I believe, according to the Cloud Security Technology Service standards, we no longer need to increase the cost of memory procurement in two years. ”
Trend Technology Cloud security technology will be stored in the local virus signature of 70% of the global set up 5 data centers, 34,000 servers, and the client only store a small number of virus code. The traditional anti-virus approach is to scan local files for virus killing by calling virus signatures, which can severely deplete local memory. And cloud security technology is through the cloud query, completely block the source containing malicious code to block, the consumption of cloud server resources. Therefore, cloud security technology greatly reduces the security solution to the local memory footprint.
Taking the OfficeScan product as an example, the trend Science and Technology Experiment Center compared the data before and after the application of Yunan technology, which reduced the core memory footprint from 75M to 21M, and reduced the 70% core memory footprint. According to the trend technology product technology consultant Xu Xuerong Introduction: Trend technology also plans to launch the second quarter of next year OfficeScan 10.0, in the product to add cloud security, another core technology file reputation technology, the cloud server stored in the virus signature ratio increased to 80%, further release of local memory.
The figure is OfficeScan 8.0, the traditional technology occupies kernel Memory 75M
Figure OfficeScan 8.0, cloud security total footprint of memory only about 21M
Efficient drug-blocking to prolong the life of enterprise assets
According to the survey found that 96% of the virus is in the "client" This is the last security line to be found, and if the enterprise's network gate-gateway, the deployment of security measures, can withstand most attacks, thereby further reducing the client's memory footprint requirements.
At present, the trend of technology cloud security can support an average of 5 billion strokes per day, processing sample data 1.2TB, database first hit can reach 99%. With the help of cloud security, trend technology now blocks up to 10 million infections a day. The use of cloud security technology IWSA products, at the gateway can block more than 70% of the virus. Shanghai Austrian American Advertising Co., Ltd. Beijing branch in one months encountered a variety of network security violations reached 520,000, and through the IWSA Embedded cloud security technology to block out 370,000 of them, greatly reducing the number of threats to the terminal and reduce the terminal burden. At present, more and more users gradually realize the importance of the deployment of Web security gateway, this market is also considered by a number of research agencies as the fastest growing network security areas.
It can be said that the use of cloud security technology, as well as the deployment of a Web security gateway, enterprise terminals for anti-virus software memory footprint needs greatly reduced. At the same time, the hardware gateway product IWSA because embedded cloud security technology, also effectively saves the enterprise network bandwidth resources. At the end of the crisis, this has undoubtedly increased the use of fixed assets for users and reduced the number of unnecessary investments. The most important is that cloud security not only effectively enhance the utilization of user resources, the unified centralized management platform to effectively save the IT staff management costs, employees can also be more assured access to Internet content, security doubled. All this comes from the trend of science and technology cloud security never stop guarding.