Cloud security promotion opportunity and challenge coexist

Source: Internet
Author: User
Keywords Cloud Security security
Tags added analysis anti- anti-virus application automatic behavior business
In recent years, the development of cloud computing in IT industry is surging, from the original concept gradually to the actual application of the evolution. With the increasing competition of telecom industry, the increasing demand of computing ability and business processing ability, the application of cloud computing has been gradually embodied in China's telecom industry.

Cloud security has become a market opportunity for many security vendors as the cloud becomes increasingly dominant. How to collect users ' security threats quickly and efficiently, how to enhance the automatic and accurate analysis of the attack behavior of new viruses, and how to guarantee the rights of logged-in users and the privacy of users are not compromised, which also becomes the focus and challenge of cloud security in the future.

Three typical patterns of cloud security

Cloud security is a prerequisite for the application of cloud computing in the telecommunications level, said Dr Huang Yuanfei, a network and information security Technology Working Committee of China's Standardization Association, that cloud security, as an internet-based security service, presents three typical patterns of cloud security centers, cloud security hosting services, and Security Operations Centers (SOC).

According to statistics, the total number of global viruses has more than 11 million, in 2008 around the world every day about 5000 virus signatures were added to the virus database, and this number in 2005 only 50. Dr Huang Yuanfei said at present, the virus industry has formed the Internet, and security vendors of anti-virus software only to the Internet to deal with, cloud security is not a pure anti-virus technology, but a concept of anti-virus, is the idea of safe internet and ideas, so the establishment of cloud Security Center is also imperative work.

The second pattern of cloud security is embodied in the cloud security hosting service, which includes web security hosting, spam prevention, malicious code detection, and security protection for Web2.0 Web sites. Huang Yuanfei pointed out: "At present some operators are also doing Web2.0 website security protection Work, I think can apply cloud security idea to carry on." According to statistics, by 2012 IDC's Web security hosting market will grow by 49% annually, while the mail security hosting market will increase by 35%.

The third model of cloud security is the Security Operations Center (SOC). Because each system now has its own separate monitoring system, in order to achieve firewall protection, virus intrusion, identity authentication and other security measures, and operator-level event warnings are tens of millions of orders, which greatly increased the burden of the administrator. The use of SOC to deal with IDs logs, FW logs, traffic logs, application logs, database logs and other information, it is conducive to customer management of cloud security, increase controllability.

Security Value-added service is imperative

In terms of security value-added services, Dr Huang Yunfei said that the value-added services that operators do for their customers mean that they can provide network and security service for users and security of value-added services by virtue of public telecommunication network resources and other communication devices. It is understood that BT in the market has launched a security value-added services, and for individual users to launch a security service, its main revenue to remove operating income, but also a large part of the revenue from the service.

Since 2006, the original Ministry of Information industry has launched the "Sunshine Green Network Project" series of activities aimed at improving and purifying the Internet environment. In 2007, Fujian Telecom also vigorously promote the "Sunshine account" and other green Internet products, the use of technical means to purify the network environment, so that the vast number of young people in full access to the Internet, while free from internet pornography.

Dr Huang Yuanfei said that security value-added as a value-added telecommunications business in the domestic promotion is underway, and has some revenue, in addition to the operators of IDC security services are also essential, including IDC flow cleaning, security Devis, SOC, and some security monitoring business.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.