Chinese entrepreneurs on the cloud view

Source: Internet
Author: User

More and more cloud computing is known to us, let's talk about a Chinese company's view of cloud computing

Large Suzhou area in Taiwan, Europe and the United States many manufacturing enterprises, Information Technology Co., Ltd. security product manager that Trend Micro cloud security technology and products particularly suitable for manufacturing enterprises.

"No security company is 100% committed to putting an end to virus threats, and the advantage of Trend Micro's cloud security is that it reduces the end-user anti-virus pressure." Traditional virus code is denser than a peer-to-peer, and users update the virus database and search daily Engine, which put a great strain on the computer, especially those that have been used for 3 to 5 years.

Ni Zhifeng said: "The earliest batch of Taiwanese enterprises in Suzhou set up factories for more than 15 years. According to the relevant regulations of these enterprises, the IT asset renewal cycle is 5-8 years. Every day, the patch update will definitely affect the use of office systems such as ERP and OA Efficiency, but without virus signature updates, there is no control over the virus's outbreak. "As can be seen, there is a conflict between security and productivity in some organizations, and there is a conflict between security and corporate operating cost controls. Concentration of such contradictions in 2007, Panda burning incense in Suzhou manufacturing enterprises in the group caused a wide range of losses, a number of corporate production network paralyzed. "The problem is that IT equipment is too old, users do not have the extra resources to update the virus database.Smart security just solve the user conflicts in this area, neither investment in IT equipment updates, but also get the latest security services."

Three-dimensional protection

In addition to resolving the above contradictions, Ni Zhifeng believes that the second advantage of Trend Micro's cloud security is that it establishes a three-dimensional protection system from the gateway to the terminal and processes the anti-virus in stages.

At present, mail attack has become one of the main means of network attacks, especially with malicious viruses, Trojans, web pages, Trojans, as well as the use of software loopholes Trojans spread over the Internet flood disaster, the user opens and reads the mail, Trojans Will infect the system and be spread by means of removable storage devices.

In 2009, some well-known mobile storage manufacturers in the world just bought a batch of USB flash drive because of containing virus files, which were later returned by the users. After ascertaining that the upstream accessory manufacturers' office network was invaded by the virus, the U disk drives the office network The virus in the production network. This incident gave Ni Zhifeng two tips: First, we must establish a three-dimensional protection system, the virus may be transmitted from the network, it may be mail or removable storage media; the other hand, must establish a unified standard upstream and downstream industry chain Protection system. "Asus, BenQ and other companies in the surrounding areas have 300 ~ 400 parts suppliers, Trend Micro's 2010 launch of 'small TDA' is particularly suitable for such enterprises, 'small TDA' on the one hand to allow accessory suppliers and leading manufacturers to enjoy At the same level of security services, on the other hand saves on investment. "

For the security issues of small and medium-sized manufacturing enterprises, Trend Micro's cloud security can detect and analyze the user's data packets and traffic mirrored to the background research center. Research Center will provide users with test reports, including: network anomaly traffic analysis, virus analysis and solution strategies, this solution to make up for the lack of user network management issues. Ni Zhifeng said: "The manufacturing company with 400 computers is only equipped with 2-3 network administrators, even with professional network management can not do a 24-hour watch, but the trend of cloud security can provide 24-hour EOG expert service, security Warnings can be promptly notified to users via email, SMS. "

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.