Cloud security enters the third level outlook has been achieved

Source: Internet
Author: User
Keywords Security technology cloud security cloud security
There is no doubt that cloud security technology is a practical technology for the landing of cloud computing concepts. Each vendor has a different understanding of cloud security and begins to implement its own understanding into the product. To rising company, 360 companies, such as representatives of manufacturers, cloud security is interpreted as the use of terminals to collect viruses, trojans, and processing in the cloud, in turn, the virus library for more user services; With the trend of technology as the representative of the manufacturers, the cloud security rose to the Internet files, mail, Web pages for the credibility of the evaluation , in the cloud to establish the credibility of the network mechanism, the use of this reputation library to security services to users. "These cloud security concepts are not wrong, because this is the first two phases of cloud security." "Recently, reporters interviewed McAfee Laboratory Network Defense Research Director Mr. Bu, he told reporters." But he also suggested that only those two phases were not enough, in fact, McAfee's cloud security technology has entered a third phase, that is, the evaluation of the credibility of the file, mail or Web site, so as to further predict possible future security threats, so as to take measures to provide security services for the user network. "This is the first time in the world. "He stressed. He further explained that the associated credit assessment service was based on four credit evaluation bases, including network credit, document credit, application service credit and mail credit. It's more nuanced than other credit evaluations, for example, the relationship between the network credit, is not a Web site to see a certain Web page was Hung horse, will be the entire site block, but the specific analysis of the horse's Web page, and then associated analysis of the transmission of its IP address, comprehensive analysis, and then take specific preventive measures according to the situation. Bu's department, the world renowned avert Labs, has since October 2009 McAfee renamed the Department McAfee Labs (McAfee Labs). The lab focuses on identifying and tracking the growing range of malicious virus threats, studying network security, Internet Security and e-mail security, and increasing vulnerability attacks. He introduces, it's like real life: in the United States, the first to establish a personal integrity system, credit assessment for everyone, and then issued a variety of loans, or people on the basis of business dealings, can greatly reduce the risk of fraud. In the network, as well, once the system is established, it is possible to predict future security threats based on certain algorithms and correlations. To achieve the third cloud security phase, McAfee Labs developed several technologies and gradually began to install them in all of its product lines. The first technology called Trustedsource Technology, is in the cloud to create a mail and Web page Cleaning center, all the Mail and Web page first into the cleaning center for cleaning, and then sent to the corporate network, to ensure that the mail or Web page is clean, without any viruses or trojans. This is the industry's first e-mail and network credibility security system. The second technology is Artemis, also known as IAT Moon Goddess Technology, is based on the letter of the documentWith technology, when users download files on the Internet, the technology can identify whether the file is a good file or a problematic file in the cloud, and then recommend that users take the strategy of downloading or blocking downloads to ensure the security of the system. and has been deployed in all of McAfee's security products, users can enjoy this service as long as they buy McAfee products. "Editorial Recommendations" cloud security indicates a secure future US 70% of online users use cloud computing technology cloud computing the biggest challenge is network security "editor: Faya TEL: (010) 68476606" Original: Cloud security into the third level outlook has been achieved return to the network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.