In the reporter's view, "cloud computing old, cloud security new", has become an indisputable fact. But this old new how can let the user rest assured use, need to go the road still very long. In fact, from the end of 2008, IDC, Gartner and other advisory bodies have made security vendors of cloud server groups have security risks, as well as the use of "cloud security" program to protect the enterprise user server groups need to fully consider the report. To address this problem, a number of security companies in the early this year launched a variety of server-oriented "cloud protection" campaign.
According to Xu Xuerong, in the "cloud security" technology, cloud services group security is the entire "cloud security" technology application of the foundation, this is another direction in the current security field, in this respect the manufacturer's investment is the biggest, almost to the extreme. In addition, he stressed that trend technology the current solution focuses on protecting the access security of enterprise users ' networks, and the cloud security system already has a good security practice in the area of server group protection: Current trend Technology Cloud server group computing clouds have more than 2000 servers distributed in the world's five major data centers, Service Cloud has more than 34,000 servers distributed in various countries in the world's telecommunications room, these servers using encryption authentication, redundancy backup, security isolation, server node security, and other security protection technology.
In addition, from the point of view of application, enterprise users mainly look at the protection effect. Earlier, Shanghai import and Export inspection and Quarantine bureau chief Wu Hualing in an exclusive interview with this newspaper said: "Because the ' cloud security ' technology has very prominent protection Trojan, spyware, malicious program attack effect, so our acceptance is very high." From the actual use, the integration of ' cloud security ' technology products, due to the network threat before the intrusion has been blocked, so that our management and maintenance costs and human consumption has been greatly reduced. At present, we have pioneered the security monitoring of the "cloud security" model in the inspection and quarantine system. ”
Li Hongkei also holds the same view, saying that the robustness and safety of cloud networks is part of a network of manufacturers ' services, a fundamental component of the premise. Each manufacturer should be able to deploy its robust protection system as a service network when building cloud networks, which is indivisible. And Fortinet's Fortiguard cloud network perimeter deployed a perfect seven-layer defense gateway, the system is fully redundant design, and has the automatic recovery capability, the regional network full mesh synchronization, so the cloud network fully equipped with the conditions of robust protection.
It is understood that the Fortiguard Cloud Security Service Network for every FortiGate security gateway in the world to provide distributed security services, using push-type security updates and analysis to ensure that clients get global security Analysis Services, hundreds of millions of of the weekly threat sample analysis capabilities and updates, Each client's network joints can share the latest threat analysis results from different regions. The Fortiguard Cloud Security Service Network can analyze the security authentication request and query submitted by the Client Security gateway, and provide the analysis result quickly, so that the client gateway has the maximum strength security defense ability under the most simplified configuration.
It needs to be stressed that "cloud security" or "cloud protection", the most important thing is to let users experience the unified threat defense and cloud service network of the actual effect. In other words, to protect the security of the enterprise entity is the first step, "cloud security" is a service model, the user is most intuitive or to see the part of the security entity, after all, this is the user side of the product, is the user can perceive the part. When users realize the consistent defensive effect of the protected entities used in different threats, it is easy to accept that part of the cloud service group that is not touched.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.