Cloud security is "safe Internet" has come to an absolute

Source: Internet
Author: User
Keywords Security we see cloud Security new

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

  

Yanping, Director of Communication and Development Center, China Internet Association

Yanping: Good morning to you all! At the end of 2008, a lot of people I would like to have a review of the development of the market this year, I think the rising safety technology conference today, in fact, to all of us to provide an opportunity to think about finishing in the year-end. Including me personally, I am also a fan of security technology, so I am also very interested in attending such a meeting today.

So throughout the 2008, from the beginning to now, I think we every safe, whether practitioners or enthusiasts, we have seen the development of the market changes, some changes may be a general change in the market level, and some changes may be in the next three or five years of security technology industry market pattern, including the structure and shape of related technologies has far-reaching implications, and I am not afraid to say what these major changes are, but to share with you some of our concerns.

The first point is the subdivision and expansion of the security features and applications that are starting from the simple virus prevention of the past to a wide variety of new applications for new internet business, beginning to expand to the surrounding and even future center of the architecture. We see in the past system, for example, now see for Account protection, password protection, game security, E-commerce payment process of security, and so on, this is what we see the product is good, the application is also fine subdivision expansion. Security applications We have also seen the structure of security vendors ' products expanding.

Another aspect we also see in the security aspect an integration trend, in the user, everybody wants to be able specialization in should have the application link inside to face various problems, in fact the user hoped that such a security is the whole integrated solution, can penetrate the entire business flow, It process throughout the enterprise architecture. So we also see different security vendors in their own security product architecture integration, and the integration of the application of the object to the enterprise and customer needs in all aspects of the application of targeted applications to individual customers in all aspects. We see a particularly large number of up-and-comer, or strong mainstream enterprises, through the restructuring of the technical architecture in turn to cover the entire market, this is the trend we see integration and integration.

The third is the strengthening of the system and security, we mainly see Microsoft in this area, from the system and security aspects of the new trends, which will have a very far-reaching impact on the next phase of the value chain. And we see that in terms of security, because the past has also mentioned active and passive security, especially active security technology and passive security technology in the past for quite a long time, the past active security is based on rules of security, is now based on new technology, intelligent active security, which is also a relatively important change, With the intelligent active security technology, then its vitality is not only the continuation, but also has been a new development. So that's one of my deepest feelings.

Fourth, personally, two or three years ago, there was a strong sense that the division of labor between the client and server is changing, and that the server side, whether it is the input of the relevant market or the needs of the enterprise, including the relevant enterprises to the value of the market is also undergoing significant changes, This can also be called the enterprise's Secure terminal market, also known as the server-side security market. With this change, I think there is a significant impact on the distribution structure of security, in this regard, we have been seeing the actions of different security vendors on the server side this year, including the security actions of the client, including the combination of the two, and there are a lot of new things in it, which is very interesting to change, This change is the 08 security technology, the sixth important information, rising through the "cloud security" proposed. When it comes to cloud security, you might think of cloud computing, or maybe it's a concept? or the packaging of the product? My understanding is not that this is the Internet, the technology structure of the Internet, application architecture, data structure is what? If you only understand the Internet from a PC perspective, cloud security may be incomprehensible. But if you see a data system that combines center and distribution, and in this distributed environment, the relevant client's role in computing, processing, and processing of data is indicative of how the security architecture and data of the Internet are being used together, that is, the architecture of the data and the architecture of the application will face new challenges, But I think the process of this challenge and the process is the whole industry with the user to promote the process, as long as the user's direction, conform to the direction of the mainstream Internet enterprises, then the security of the architecture, including the relevant definition must be acceptable for the market, even for the end-user acceptance. So we on some of the current problems, and the new rules of the future order, or full of confidence, especially the rising of China's mainstream has been very successful internet security companies have done a lot of technical work, we also believe that the next section under the leadership of the development of the security market, We are very optimistic.

Hope that in today's meeting, including the Forum can continue to learn from you, ask, thank you!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.