Cloud safety, passive safety protection for pain killers?
Source: Internet
Author: User
KeywordsSecurity cloud security security software more and more has been
We know that usually network or computer security is through the security software or the system comes with some defense procedures to protect against security threats, but this passive defense method has been unable to adapt to the increasingly serious security situation. With the http://www.aliyun.com/zixun/aggregation/13420.html "> Cloud computer and Cloud security concepts translated into application of technical practice, this passive pain will be changed."
How Cloud Security Works
In fact, "cloud security" in the beginning of the idea has been a concern, many people think that this is the concept of speculation, not what the climate, may not lead the next generation of security technology, but today we see "cloud security" has been applied to practice, and obtained a majority of praise.
About "cloud security", here are a few key words "to launch the user's power", "parallel", "active Kill", in tandem formed a "cloud security" group collection of centralized processing, active kill work flow, in order to strengthen the security of the computer and network.
For example, our daily email, using the ERS technology protection, it can check the IP address according to the known spam source reputation database, and verify the IP address. Reputation ratings are optimized by continuous analysis of IP address "behavior", scope of activity, and previous history. Future discovery of the sender's IP address, the sending of malicious e-mail will be intercepted in the cloud, thereby preventing threats to users.
ERS technology owner Trend Technology, its "cloud security" core technology framework is the use of the world's five server centers, more than 1000 security experts to deal with more than 1200G of data per day efficiency, play its technology, experts, data center of the expertise of the invasion in the dissemination process, So as to avoid causing a large area of user victimization, advocating the initiative to prevent the threat to arrive.
Changes brought about by cloud security
China's personal computer users have more than 93% of the virus infection rate, the incidence of viral infection is increasing, mainly due to the rapid Internet popularization, networked PC users more and more, and the nature of the spread of the virus has changed. Now computers and networks, malicious programs, spam and web threats, as well as network vulnerabilities and even the problem of data loss is becoming more and more serious, online payment and personal information security and other aspects of the threat is more and more, so the use of existing security measures have obviously not keep up with the security environment changes.
"Cloud security" the biggest innovation is to change the status of passive anti-virus, making security software security threats in the face of security more active, involving more extensive, killing virus Trojans and other kinds of more. Where individual users participate in the task of security maintenance, greatly improve the efficiency of security protection, coupled with the faster processing of security software, the computer and network threats can be strangled before arrival.
At present, the domestic major security software vendors are pushing cloud security service concept. The technical framework of the trend is mainly composed of its international team of security experts, and the use of users throughout the world, as well as the unique automatic matching database and advanced servers all over the world. In addition, the security environment of trend security software is more complex, it is these complex security environment and their advanced cloud technology, so that he can better optimize the "cloud security" technology core, make it more advanced and efficient.
The general "cloud security" technology process is the collection of user feedback by technical engineers to deal with, the trend is to use the database to match the feedback if the database has the new virus data, the server can be automatically processed, or in the way of human-computer binding processing, processing efficiency and processing capacity are significantly different.
Pervasive application of cloud security
The grim computer and network security situation is the biggest push for "cloud security" and universal application of cloud computing. At present, Google, Microsoft and other IT giants big cloud computer, and domestic security software manufacturers have joined the Cloud security camp, this momentum will be to a certain extent to the "cloud security" of the popularization of the application played a role in promoting. At present, although we have a lot of cloud technology similar places, but certainly the technology leadership and forward-looking aspects of strong and more user-approved.
We used to think that Internet security is the work of antivirus software vendors or website operators. But today the security environment and the form are changing, and passive defense cannot cope with the threat. and "cloud security" just can launch users to find the threat actively, and focus on the technical advantages of security threats to deal with, to meet the development trend of security protection, change the passive security protection of the pain. (Author: Ling-GE)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.