Cloud security technology has begun to bear fruit

Source: Internet
Author: User
Keywords Cloud Security Technology
Cloud security technology as a new generation of technology concepts, making the Internet security field has been a comprehensive impact, a wave of technology updates followed. More and more enterprises try and use cloud security technology, making Internet users form a powerful alliance of offense and defense. Faced with the network security revolution brought by cloud security technology, many manufacturers and experts have disputed the development and pros and cons of it. However, according to the survey, cloud security technology has begun to bear fruit. In the first half of 2010, the global Internet security environment has been comprehensively improved, which is an important milestone in the anti-virus industry. According to Rising "2010 first half of the Internet Security Report" Statistics, the first half of 2010, rising "cloud security technology" system to intercept a total of 4,221,366 new virus samples, compared with the same period last year down 53.7%. This is the first time that the number of new viruses has dropped dramatically. In the first half of 2010, rising intercepted 596 million people infected with the virus, the average daily infection reached 3.31 million. According to the number of infected people, the number of variants and the representativeness of the comprehensive assessment, "Microsoft Bug Worm King" became the first half of the "Poison King", a total of more than 7 million people infected with the Internet. Compared with last year's poison King, the number of its infection has been greatly reduced. At the same time, rising client total interception to 138 million netizens were hanged horse website attack, on average 770,000 per day, compared to the same period last year, 5.89 million internet users were attacked, down 87%. Judging from the above three Internet security indicators, the security threats that netizens encountered in 2010 have been greatly alleviated. Both the number of poisoned people and the number of new viruses are down by more than 50% over the same period last year. Rising security experts said that this and "cloud security technology" in the entire Internet ecological circle of the universal application is inseparable, at present, including search engines, browsers, IM and other industries, hundreds of partners have adopted the "rising cloud security" results, so that the horse attack significantly reduced, "cloud security Technology" Is the first factor to improve the Internet security environment. For example, the user in search Sogou search engine, "cloud security Technology" system will search results in the URL address and system data to compare, if found hanging horse site will remind users. In this way, a lot of horse-hanging web site has not reached the user's computer before has been intercepted, which greatly reduced the computer users of the poisoning probability. At present, including search engines, download software, im software, browsers and so on have adopted this mechanism, this makes the need to break through the "layer of defense" intrusion into the user's computer network of horse-mounted attacks significantly reduced. 2010 in the first half of the main way to hang the horse "js hanging horse" mainly, each monthly account for about 60%. In addition, according to the statistics of rising, the frame hanging horse way is rising trend, this way of hanging horse relatively concealed, not easy to detect. On the contrary, because antivirus software active defense powerful function, the virus file downloads to the local will be monitored to discover and the direct elimination, therefore downloads through the virus the way of hanging horse is decreasing gradually. At the same time, rising "cloud security technology" data center intercepted data shows that 201The first half of the 0-year blocked Trojan site domain name type, ranked number one is ". org", interception amount to 14,505,013 times, there are 81.5% of the Trojan site use, and the top five, ranked immediately followed by the domain name ". com", ". cn", ". Info", ". com.cn". Rising is the field of cloud security advocates, July 2008, rising set up the world's first commercial application of the cloud security system platform, significantly improve the anti-virus software response efficiency and killing speed, leading anti-virus software from the artificial processing virus into the system to automatically analyze the virus to deal with the era. Now, she has invested nearly 5000 cloud servers, more than 300 research teams and tens of millions of research and development funds to build a "cloud security" system. Fully help users reduce virus threats and build a more secure Internet. "Editorial Recommendation" antivirus full cloud security who is worth the real choice cloud computing information security prospects unknown who to protect the cloud in the information security protection of the cloud Operators cloud computing: Information Security Open a new chapter "Editor: Zhangqi TEL: (010) 68476606" Original: Cloud security technology has begun to return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.