There is no doubt that cloud security technology is a practical technology for the landing of cloud computing concepts. Each vendor has a different understanding of cloud security and begins to implement its own understanding into the product. To rising company, 360 companies, such as representatives of manufacturers, cloud security is interpreted as the use of terminals to collect viruses, trojans, and processing in the cloud, in turn, the virus library for more user services; With the trend of technology as the representative of the manufacturers, the cloud security rose to the Internet files, mail, Web pages for the credibility of the evaluation , in the cloud to establish the credibility of the network mechanism, the use of this reputation library to security services to users. "These cloud security concepts are not wrong, because this is the first two phases of cloud security." "Recently, reporters interviewed McAfee Laboratory Network Defense Research Director Mr. Bu, he told reporters." But he also suggested that only those two phases were not enough, in fact, McAfee's cloud security technology has entered a third phase, that is, the evaluation of the credibility of the file, mail or Web site, so as to further predict possible future security threats, so as to take measures to provide security services for the user network. "This is the first time in the world. "He stressed. He further explained that the associated credit assessment service was based on four credit evaluation bases, including network credit, document credit, application service credit and mail credit. It's more nuanced than other credit evaluations, for example, the relationship between the network credit, is not a Web site to see a certain Web page was Hung horse, will be the entire site block, but the specific analysis of the horse's Web page, and then associated analysis of the transmission of its IP address, comprehensive analysis, and then take specific preventive measures according to the situation. Bu's department, the world renowned avert Labs, has since October 2009 McAfee renamed the Department McAfee Labs (McAfee Labs). The lab focuses on identifying and tracking the growing range of malicious virus threats, studying network security, Internet Security and e-mail security, and increasing vulnerability attacks. He introduces, it's like real life: in the United States, the first to establish a personal integrity system, credit assessment for everyone, and then issued a variety of loans, or people on the basis of business dealings, can greatly reduce the risk of fraud. In the network, as well, once the system is established, it is possible to predict future security threats based on certain algorithms and correlations. To achieve the third cloud security phase, McAfee Labs developed several technologies and gradually began to install them in all of its product lines. The first technology called Trustedsource Technology, is in the cloud to create a mail and Web page Cleaning center, all the Mail and Web page first into the cleaning center for cleaning, and then sent to the corporate network, to ensure that the mail or Web page is clean, without any viruses or trojans. This is the industry's first e-mail and network credibility security system. The second technology is Artemis, also known as IAT Moon Goddess Technology, is based on the document of creditTechnology, when users download files on the Internet, the technology can identify whether the file is a good file or a problematic file in the cloud, and then recommend that users take the strategy of downloading or blocking downloads to ensure the security of the system. and has been deployed in all of McAfee's security products, users can enjoy this service as long as they buy McAfee products. "Editorial Recommendation" cloud Security applications, browser "cloud" Security era security mainstream development of the major "cloud security" technical details on the definition of cloud security six kinds of views "responsible editor: Faya TEL: (010) 68476606" Original: Cloud security into the third level return network security Home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.