Survey: 65.1% of users think Cloud security is the use of cloud computing technology to enhance enterprise information security; 62.9% of users think that cloud security is to provide security as a service, such as cloud antivirus; 54% of users think Cloud security is about solving the security problems of cloud computing itself.
Analysis, as the concept of cloud computing, cloud Security also does not have a unified view, for the above three formulations, the user's recognition level is basically equivalent, which also shows that cloud security to solve a lot of problems, including the cloud itself security, the traditional sense of information security, Security is the service model and how to use cloud computing to improve information security, and so on.
2010 is coming to an end, is also the major companies to sum up and look forward to the year, for McAfee, this year is a difficult to forget the year, recently, McAfee Vice president and Asia-Pacific chief technology officer Michael Sentonas and McAfee senior vice president of the content and cloud security business general manager Marc Mr. Olesen came to Beijing to share McAfee's path of cloud security with Chinese users. At the meeting, Michael Sentonas analyzed the current threats to the network environment and cited a series of data to demonstrate the severity of these threats. According to IDC's latest data report, in the next 10 years, the digital universe will be full of 35ZB of data (1zb=1 trillion GB), responsible for McAfee content and cloud security business general manager Marc Olesen analysis of cloud security facing three major trends: first, the content of explosive growth; Compliance requirements are becoming more and more important; third, the security of the cloud is particularly important. And from the three-dimensional definition of cloud security, that is, security comes from cloud, security based on (in) cloud, security in order to (for) cloud Analysis Cloud security technology brings enterprise opportunities and challenges.
Cloud security to solve the vicious attack of explosive growth "panacea"
Along with SNS (full name social Networking services, that is, social network service) application is speeding up, As the impact of Web2.0 applications continues to widen, the Internet is more open and free, and its threats are exploding, and the number of malware in the past year is more than the total of malware over the years, and there is an explosive growth trend.
McAfee Vice president and Asia Pacific Chief technology officer Michael Sentonas said to the author, "McAfee found 100,000 of potential malware samples a day, which can identify more than 55,000 new malware." McAfee identifies about 200,000 new zombie viruses a day, and identifies 2 million new malicious websites each month. ”
Three big cloud security trends need "three-dimensional" way to deal with
Faced with such a large amount of data, when faced with 55,000 new threats each month, 38 malicious threats per minute, how should you face 38 malicious threats per minute? It's obviously not very easy to implement the program, This is a problem that everyone in the world has no way to get rid of, because these malware growth rate is very fast, 200,000 computers are attacked every day, 200,000 sites are attacked each month. To address this conundrum, with the advent of the cloud computing era, McAfee has put the latest research and development effort into the cloud over the past 18-24 months.
McAfee currently deploys 120 million nodes in more than 120 countries worldwide, which can connect to McAfee's cloud, the global Threat Intelligence System (GTI). McAfee analyzes 75 billion websites and 20 billion emails a month. If the computer finds bad documents, it also needs to be analyzed if these bad features are analyzed. When the user faces so many attacks, there may be 38 to 39 new attacks per minute. If there is no update per minute, then how to protect the Enterprise terminal? This is also the efficiency that cloud security can produce. If you find a suspicious document on your computer, users can ask McAfee if it is possible to go through it and then analyze it by McAfee, telling users if they have seen this suspicious document, the benefits that McAfee's products put into the cloud, and McAfee's unique advantage of deploying millions of sensors worldwide, Can collect a lot of information in real time. McAfee can analyze a variety of attacks and the number of threats, including documents, the Web, and mailboxes.
Maikfeil Safety Telemetry Range
Cloud computing is a hot topic this year, there is a lot of confusion about cloud computing users, how to use cloud computing, how to ensure the security of the cloud? The three important trends in the security industry have a direct impact on cloud security. The first important trend is the explosive growth of content; The second important trend is compliance requirements, where companies have strict compliance requirements, and the third trend is security itself. The number of threats we face today is increasing and the level of threat is increasingly complex. In the face of this situation, what are the requirements of security itself?
As shown above, the Web site of ICBC's website is not icbc.com, but 1 cbc.com, internet users in peacetime do not seriously look at the online may not find this is a phishing site. This is just one example of a malicious threat, but it has shown that today's virus is complex and today's hackers are tricky. Faced with complex environmental changes and ever-changing attacks, users are usually required to protect their intellectual property and assets, those conventional methods are no longer applicable. What does that mean? It means that it is not possible to put all the products and all the assets in such a castle in the same way as in the past. Many of the user's intellectual property, critical business, and sensitive data are now migrating to mobile PCs. The security enterprise first utilizes the good cloud, then protects the information, but not only protects the information periphery to be enough, needs to protect the information itself.
When it comes to how to use cloud? Maikfeil, general manager of the security business, Mr. Marc Olesen, quoted US President Barack Obama as saying: "The technology that supports our creation and construction is also used by those who try to disrupt and destroy." He said: "It is our friend and our enemy." Because it is an innovative platform, it improves its competitiveness, but it can also be exploited by criminals. ”
Marc Olesen, general manager of Maikfeil Security business
How do we make use of the cloud? Security, first and foremost, is security, the service model, the security application based on cloud. In fact, we can see today more and more enterprises, began to apply cloud security, on the one hand to reduce costs, on the one hand improve efficiency. The enterprise needs to realize resource optimization on the basis of cloud security, and can save 50% of cost based on cloud security. McAfee has a very wide range of security, service product lines, terminals, e-mail, web security, and vulnerability management. No single vendor in the industry can rival McAfee for a cloud-wide solution.
The second part is security in the cloud. The use of blacklist technology in the cloud can greatly reduce the protection time, down to 15 minutes, even we can predict what the customer needs. Security is currently the biggest constraint on cloud computing applications, and many cloud service providers receive ISO annual certification every year. Of course, ISO certification is a good foundation, but also a good start. Because cloud technology is changing too fast, doing it once a year is definitely not enough and requires a daily technical review program to supplement the ISO annual certification.
The cloud security plan is a daily replenishment plan, and every day the service provider detects if there is a loophole and the vulnerabilities are controllable. This user is very assured that the cloud service provider through such certification to meet user needs. Today, there are a lot of enterprise data in the dynamic process, we need to ensure that these data security in the cloud, including e-mail security, web security and DLP and so on.
If the network is in a dynamic environment, then cloud security is a dynamic environment of the Stormtroopers, cloud security requires operators, users and security vendors to work together to deal with the change of the explosive growth of malicious attacks.