"51cto.com comprehensive report" In today's IT security circle, do not speak cloud technology is too outdated, but cloud technology is how to play a role in the field of information security? As consumers, how to actually use cloud technology to protect their information property security? Cloud technology in the application process to provide us with what convenience, and what need to pay attention to it? The question mark is too many easy to faint, the answer abstract wants human life. Let us take the new launch of Kaspersky security forces 2012 for example, comprehensively and concretely analyze the application of cloud security in the solution, a sweeping "cloud" in the "Halo"! As in previous versions, Kaspersky Security 2012 contains the Kaspersky Security Network, the Kaspersky Lab's cloud security system, which stores a large number of trusted or dangerous and suspicious application information. Cloud-protected databases are updated very quickly--a new threat is discovered and information is added to the database in minutes. Security forces 2012 "cloud" also includes many convenient protection functions. such as file Advisor, Web site Advisor, anti-spam module, and so on. File Advisor users just click the mouse, select the "View reputation in KSN" option in the menu to view the threat rating of the file in the Kaspersky Security Network (KSN) cloud Security Service, as well as information about the geographic trend of the file, the level of trust that other users have assigned to it, and so on. This information is stored in the Kaspersky Lab's cloud tracking and rapid response system. Web Site Advisor version 2012 products can be directly from the cloud to obtain the latest malicious website information, including adult, violence and other objectionable content of the site. Security forces 2012 will also warn you if you encounter dangerous links that redirect users to scams, phishing sites, malicious web sites, or spam-making sites. Anti-spam This module can be embedded in the user's computer installed in the mail client, all received e-mail spam scanning, through the message headers, message body and attachment image analysis, to filter out spam. The new anti-spam kernel in security forces 2012 organically combines the latest "cloud security" technology with heuristic analysis technology, which significantly improves the rate of spam recognition. In addition, in order to make it easier for users to understand the practical role of cloud security technology and to have an intuitive understanding of the functions of Kaspersky's Security Network, a visual cloud protection interface is also set up in security forces 2012. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border= ' 0 "alt=" "width=" 567 "height=" 429 "src=" http ://images.51cto.com/files/uploadimg/20110713/0941590.jpg "/> Visual Cloud Protection Interface Cloud technology is gradually being perfected by different fields and different vendors, Its current technical weaknesses will slowly be overcome and eliminated. In this connection, Kaspersky related personnel said that in the future will be more in the cloud security technology research and development, and put forward: should be fully integrated with the advantages of cloud security technology and the stability of traditional anti-virus technology, better provide users with information security protection. "Responsible editor: Watch Happiness TEL: (010) 68476606" Original: To "cloud" don't faint! Detailed Kabayun technology return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.