Cloud computing security who has the strength of the defenders who spend their homes?

Source: Internet
Author: User
Keywords Cloud computing cloud computing security
Cloud computing security--Cloud computing "dream" of a ticking time bomb a few years ago in the Red Herring magazine, Herring there has been such a word, so that many people, including the author impressed: "In the future, we will no longer surf the internet, because we are destined to be 24 hours of people online." "Time goes by, the prophecy of the year is becoming a reality," cloud computing "the arrival of the era, so for individuals and enterprises," 24-hour online "is no longer just information transmission and acquisition, but also a variety of key applications to achieve. As it critic Keso on the "cloud Computing Age": "The only reason we buy an Internet device in the future is because it is easy to surf the internet, the device itself does not need to install any software, it will do is to open the browser to access the Internet, so that the Web terminal to achieve all information processing and storage. "Everything comes from the network, everything is based on the network, everything runs on the network." It is clear that such an environment is of unprecedented significance for telecom operators, and IDC has made it clear in recent comments that telecoms operators are the most promising cloud service providers and that cloud computing will be an important booster for the transformation of the telecoms industry. Because cloud computing is essentially a telecom value-added service that is represented by IT equipment, systems, or software. As a result, IDC predicts that in the near future, cloud computing will become the most important growth point for telecom operators in value-added services, which is also the core of the future industrial strategic layout of operators. The prospect of cloud computing in the telecom operators ' transition strategy is widely acknowledged. However, IDC also said that in this "hopeful cloud", there are many worrying factors, including cloud computing security is the most eye-catching one, and this is tied to operators and many companies cloud computing "dream" of a time bomb. Cloud computing or "swamp" computing? At a recent RSA 2010 security Conference, Ronald L. Rivest, a professor at MIT, the Turing Prize laureate, and a renowned information security expert, said in a tongue-in-cheek way about cloud computing security, "maybe we're called Cloud computing is a mistake in itself because it's easy to make people feel interesting and safe. But in fact, the network is full of threats and sinister, if we had called it ' swamp Computing (Swamp computing) ' may be more able to make people have a correct understanding of it. "Indeed, as with the Chinese idiom" cry ", if we can't handle cloud computing security, this beautiful" cloud computing "is likely to turn into real" mud calculations "and drag our businesses and businesses into the swamp. However, protecting cloud computing security is not easy, says John Chambers, chief executive of Cisco, who believes that cloud computing will be a nightmare for cybersecurity (security nightmare) and that by traditional means of protection it will not be possible to call people from this nightmareWake。 The Cloud Security Alliance's latest research also shows that 51% of corporate CIOs think cloud computing security is the biggest concern. Moreover, these security issues are not a worry, and it is actually happening. For operators, for example, to ensure the availability of cloud computing, the most important thing is to protect against DDoS attacks, and in the era of cloud computing, this is a huge challenge. So what do security companies do? Behind the "escalation", Cisco's own web site recently posted a circular on the Guard cleaning Center upgrade solution, which said Cisco's Guard Cleaning Center solution will face an upgrade, with Cisco's partner Arbor Network company continuing to provide new, Comprehensive and comprehensive DDoS attack solutions. It is said that "key elements of the overall solution include NetFlow technology for Cisco switching and routing platforms, Arbor Peakflow SP and cleaning System (TMS threat Management system)." Cisco specifically points out that for future development, customers are advised to migrate/upgrade to this new architecture as a protection against DDoS attacks. "We know that at home, Cisco's Guard Cleaning Center solution has been successfully widely used in large Internet operators, hosting centers and large enterprise customers, has a good market potential, so such a product, why will eventually be referred to partners Arbor NX to upgrade the next generation of products? In fact, the most important factor is that the advent of the cloud computing era, the complexity of the network application environment and the diversity of attack changes quickly increased, making cloud computing security into a more need to focus and professional "technical work." The security of the Internet application layer is becoming more and more prominent in the cloud computing service model, according to the Cloud Security Alliance survey. From the famous Information security blog-The track we learned that in the recent network 20 highest levels of security threats 16 of the application layer threat, many attacks, information leaks are due to the application layer problems. The rapid growth of applications such as microblogs, Facebook, Sharepoint, wikis, and so on in the deployment of business applications has created a number of risks, such as data loss, regulatory compliance, operational costs, reduced productivity, and business continuity. Specifically to DDoS attacks, we recall that the development of its solution can be found in the 2000, the Internet has just arisen, users usually use a DDoS firewall can effectively resist attacks. In 2005, with the development of Web 2.0, managed service security providers (MSSP) became the best solution of the era. Now in the era of cloud computing, the original approach is clearly not applicable. It is for this reason that Cisco decided to stop developing the Guard module and to collaborate with the long-time Internet top traffic analyst Arbor Company to achieve abnormal traffic through integrated routing and security technologyCloud cleaning System (primarily DDoS) upgrades the clean Pipes solution to version 2.0. In clean pipes 2.0, the Arbor peakflow SP Threat Management System (TMS) will be the guard upgrade scenario. And the new scheme will eventually achieve efficient "cloud cleaning" through SaaS (secure service). Who is the most promising "bomb-breaking unit"? Why, then, did Cisco choose the "Next Generation" of Arbor NX, which is unknown at home, as recommended to customers? In the future of cloud computing security issues, but also those enterprises become the most promising "bomb"? In fact, we look at Arbor NX to find that Cisco's favor is not only due to long-term collaboration with Cisco and investment strategy and shareholder relations, but more importantly, Arbor has a unique carrier-level deployment and Atlas threat visibility of empirical data accumulation. Arbor NX is not a late-learner who squeezes into the "cloud table", which is, in fact, a potential leader in the field, with more than 70% of the world's operators and large enterprises in foreign markets. Its long-term accumulation of the Atlas threat base based on operator experience makes Arbor NX's slogan "Know Your network (Know Your receptacle)" Not an empty word, it is this real control and understanding, Can eliminate and solve the complex and changeable security threats in future cloud computing applications. With a glimpse of sack, from Cisco Guard to Arbor NX New solution upgrades, we can see the future solution to cloud computing security problems, that is, cloud computing security threat, can not only around the various "security policy", But the need for security enterprises to be more rooted in specific network applications, and through the technical means of real-time understanding and induction of these applications, in order to truly solve the cloud computing application of the volatile security threats. The Oscar-winning film "The Bomb-breaking force" in the first of the film "... war is a drug, yes, the wealth and value accumulated by network development will make more and more people" addicted "to attack and destroy, the war of information security will never stop, and every responsible security Enterprise's greatest honor , is to act as the "cloud era" qualified "bomb". 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' title= ' cloud computing security who has the strength of the defenders who spend their homes? "Name=" image_operate_52031311794032668 "alt=" "width=" 458 "height=" 378"src=" Http://images.51cto.com/files/uploadimg/20110728/1014150.jpg "/> Third generation based on" cloud " Calculation of the main four characteristics of the cleaning center: one: Intelligent detection and Analysis system and cleaning center integration, based on operator-level full network monitoring system to control the flow of traffic and decided to clean the action. Improved predictability and accuracy. Second: Cloud cleaning system for the application layer of attack protection has a special design including (DNS, HTTP, SIP, etc.), and the first to support the next generation of IPV6 network environment. Third: The cloud cleaning system has the traceability ability of the abnormal flow and in combination with the Atlas threat database and fingerprint mechanism to prevent the latest attacks, including the 0 Zero-day attack; Four: The Cloud cleaning system provides a foundation for operators to provide abnormal flow cleaning services for a wide range of services for the protected object. Improved user experience to purchase DDoS services. Cloud computing is the emerging technology in recent years, it must become the focus of attention, while the security of cloud computing has become a hot topic of discussion, please readers pay attention to this information to share with us: http://bbs.51cto.com/"Editorial Recommendation" Cloud security is a prerequisite for cloud computing on a large scale cloud computing security technology architecture support trend Technology OfficeScan won seven wins before Citrix Technology director: Virtualization will solve cloud computing security real-name network in cloud computing environment how to manage nearly half of enterprises have encountered cloud computing security problems. Responsible Editor: Liyan TEL: (010) 68476606 "Original: Cloud computing security who has the strength of the defenders who spend their homes?" Back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.