Cloud Computing Era: 10 Security Technologies

Source: Internet
Author: User
As mobile, cloud computing, and IoT expand enterprise networks and add endpoints, security becomes critical. Security teams should remain vigilant at all times, and they should also learn about new technologies to help protect their corporate geographic attacks.

The threats faced by enterprise IT are still at a very high level. We often see media reports of a large number of data leakage incidents and attacks.

As attackers improve their attack capabilities, companies must also improve their ability to protect access and prevent attacks. Security risk leaders must evaluate and use the latest technologies to resist advanced attacks, better implement digital business transformation, and embrace new computing methods.

Examples include cloud computing, mobile, and DevOps.

10 security technologies you must be familiar with in the cloud computing era

Here are ten technologies that can help companies protect their data and information:

1. Cloud computing workload protection platform

Currently, companies have different types of work responsibilities, infrastructure, and locations, including physical/virtual machines and containers, in addition to public/private clouds. Cloud computing work is responsible for protecting the platform, allowing companies to manage their various workloads, infrastructure, and locations from a single management console, so they can also deploy common security policies across all locations.

2. Cloud Access Security Broker (CASB)

Many companies use multiple cloud services and applications, all of which are monitored from one CASB. Therefore, companies can effectively implement security policies, resolve cloud service risks, and ensure compliance across all cloud services (public and private clouds) .

3. Escrow Detection and Response (MDR)

Usually companies will consider using MDR services when they do not have the resources or personnel to continuously monitor threats. These service providers enable companies to improve their threat detection and incident response through continuous monitoring capabilities.

4. Micro Partitioning

This enables enterprises to separate and isolate applications and job responsibilities in a virtual data center. It uses a virtualized software-only security model to assign fine-tuned security policies to each partition or even each job.

5. Container Security Solution

The container is an independent executable part of the software, which also includes everything needed to run it, including code, runtime, settings, system tools, and system libraries. Containers usually share the operating system, and any attack on the operating system may cause all containers to be infected. Container security solutions can enable scanning before the container is created. In addition to providing protection, they also monitor the runtime.

6. Deception techniques

Sometimes malicious activities will penetrate the corporate network without being detected by other types of network defense systems deployed by the enterprise. In this case, deception techniques can provide insight and can be used to find and detect such malicious activities. It will also take an active security posture and defeat attackers by deceiving them. Currently available deception technology solutions can cover multiple levels within the enterprise stack and cover networks, data, applications, and endpoints.

7. Software Defined Peripheral (SDP)

With different systems and participants connected through the same network of the enterprise, SDP allows the enterprise to define who needs to know what, thereby effectively removing sensitive information from the public eye. This can help reduce the attack surface by checking the identity and status of the device before allowing it to access the application infrastructure.

8. Remote browser

The remote browser provides a remote virtual environment in which a web browser can be opened, and since this environment is not connected to the corporate network, browser-based malware cannot penetrate the corporate network to steal data.

9. Endpoint Detection and Response (EDR)

These security solutions can monitor all endpoints for any abnormal/malicious behavior. EDR focuses on detecting abnormal activities and then investigating the abnormal activities. If a threat is found, it will repair and mitigate it. According to Gartner, by 2020 Nian'an, 80% of large enterprises, 25% of medium-sized enterprises, and 10% of small enterprises worldwide will use EDR functions.

10. Network Traffic Analysis (NTA)

These security solutions can monitor network traffic, connections, traffic, and objects to see if there are any suspicious threats or malicious content. When malicious content is found, the malicious content will be quarantined for further action.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.