"Cloud security" lifting enterprise network security protection quality

Source: Internet
Author: User
Keywords Cloud security network security cloud Security enterprise network quality protection
South China Tobacco Company since the establishment of the network, the investment in the construction of enterprise network security attaches great importance to the 2003 Purchase Trend technology client anti-virus software, and in various network boundaries to deploy a firewall and other security equipment. However, with the development of enterprise information construction, the normal operation of business system can not leave the network, the stable operation of the computer. This period of time, happens to be the Chinese virus industry into the golden period of development, tobacco companies are not spared. In view of this situation, Ye, the tobacco enterprise's administrator, said in an interview: "With the development of the business, the company's own network has also been adjusted to the majority of the business application servers are concentrated in the headquarters management, so that the entire tobacco business application environment has been greatly improved, Most business applications become very dependent on the network. But with the change of application environment and Internet threat, the network version of antivirus system designed two years ago began to show a passive situation, so it is time to design the original anti-virus system. "In order to better carry out the design of antivirus system, the company's joint trend technology for the internal network of the Enterprise to do a one-month anti-virus data monitoring." Engineers of this trend think that repairing the old virus, which is repeatedly infected by the internal network, is the most onerous task in daily work. Antivirus systems have more than 34,000 records in the last three months, and more than 80% of them are old viruses that repeat infection. In this regard, the South China tobacco IT team after a long discussion, think that the cause of the phenomenon are as follows: First, the end-user's security awareness is severely weak, the security of the use of computers is not understood, leading users to access a variety of Web pages when the virus intrusion; There is no complete virus response mechanism and service flow, lead to a large number of repetitive work, serious occupation of the daily work resources; Third, because of the rapid development of computer viruses, the average speed of 4 new viruses per second, the update of the client virus database is not effective to prevent the invasion of new forms of virus. Variant of the virus, causing users to repeatedly deal with the "old Virus" illusion. After finding out the reason, the tobacco company adopted the trend technology "cloud security" intelligent Network Protection program. Engineers for the trend Technology said that, considering that the enterprise is a network of unified Internet exports, through the original OfficeScan log analysis that more than 80% of the virus through the Web into the tobacco company's internal network. Therefore, the decision to deploy the Web security Gateway IWSA on the corporate network's internet exit is determined to intercept. By enabling web reputation technology wrt on the IWSA, intercepting a large number of network user-initiated access to suspicious high-risk URLs, greatly reducing the risk to users due to access to the URL, avoiding the security of the end user is not strong, resulting in Web Access security problems. In addition, through the WRT of suspicious Web Access interception, but also can block most of the virus variants of the download to prevent the invasion of new viruses, but also the network already exists in the virusCan not be variant, reduce the intranet OfficeScan client's antivirus pressure. Because the IWSA deployment is transparent, the operation of IWSA will not affect the day-to-day use of tobacco companies, but also to ensure that users access to the Web page security. In addition, another threat to the tobacco company's transmission route is USB. Therefore, in addition to security protection at the gateway, trend technology to the user's use of the OfficeScan from 7.3 to 8.0, and the launch of the USB Virus Defense module, in order to control the USB disk virus in the spread of the network to ensure the security of the enterprise intranet controllable. Cloud Security "editorial recommendations" accurate and efficient low cost--cloud security technology topics Security mainstream development of the major "cloud security" technical details on the definition of cloud security six kinds of views "responsible editor: Faya TEL: (010) 68476606" Original: "Cloud security" lifting enterprise network security protection quality Back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.