Cloud security versus virus looking forward to technological progress

Source: Internet
Author: User
Keywords Cloud security cloud security versus viruses
With the rapid development of information technology, the development of virus technology is not outdated. So the new anti-virus technology comes into being under people's long-awaited--cloud security. See the cloud security is not a few don't think, with some cloud security technology application products appear, cloud security is no longer mysterious. It is shocking to learn recently about a group of numbers on viruses. The number of new viruses per hour in 2005 is 38, the number of new viruses per hour in 2007 is 627, and the number of new viruses produced per hour in 2008 is nearly 2000. With the development of technology, there will be more and more viruses in the future. And how long will our antivirus virus library be updated? Even if the first time to update the virus database, is only waiting to kill the soft manufacturers "life-saving medicine." With the advancement of technology, more and more viruses will show a strong vitality before being analyzed, so that more and more users become their "prey". Facing the reduction of virus technology threshold and the "popularization" of hackers, the technology of killing soft manufacturers must be improved. In recent years, there has been a virus to detect the mechanism, can bypass anti-virus tools, as well as in the form of virus-code phishing, but also traditional anti-virus software is not detected. Virus-infected way: Visit malicious Web site accounted for 42%, download malicious programs accounted for 34%, through e-mail infection accounted for 9%, through mobile hard drives and other equipment infection accounted for 8%; We can see that most of the infected viruses are connected to the Internet. So the network has become the hardest hit by the virus, 2009, we have heard of the emergence of new types of mobile phone viruses, with the development of our network life will be more and more closely with the virus. For a growing number of viruses that are harder to prevent, trend technology is taking the lead in introducing cloud security technology as a coping tool around the world. Their virus sample library is divided into three categories: the basic database of virus samples, the popular virus library and special format virus library (mainly for the shell of the virus), the virus to classify the different treatment, this is indeed a bright spot. As the first company to launch the application of cloud security manufacturers, rising users and rising technology platform through the Internet closely linked to form a huge Trojan/malicious software monitoring, killing network, each "rising card 6.0" users for the "cloud Security" program to contribute a force, while sharing the safety of all other users of the results. The cloud security technology of trend technology is beyond the traditional method of intercepting web threats, the cloud Client security architecture based on Web reputation (WRT), mail reputation Technology (ERS) and file Reputation Technology (FRS), By saving most of the signature files to an Internet cloud database and keeping them at the bottom of the list, trend technology is technically better able to intercept web threats before they reach the end user or corporate network. "Rising and the trend of cloud security have the same place, are using the Internet platform as an interactive platform for virus detection, but the difference between the two is also a lot." such as Kaka 6.0 is mainly to the user computer system suspicious module automatic monitoring, and trend cloud security is for Web pages, mail, file three categories in the network transmission process security monitoring. "One person in the industry said. Although cloud security let us see a glimmer of light, but the technology is not mature enough to let us trust the point, at present for the cloud security or doubt louder than accept the call. Compare the cloud security technology white paper for each vendor. It can be found that the "cloud Security" program issued by domestic manufacturers has not yet broken through the code compared to traditional technology, unable to effectively address the dynamic surge of security threats, the response rate is still limited by the process of code production problems, can not be stopped at the source before the threat arrives, is still close to hand-to-hand combat, but the code production process optimization. At the same time, compared with global brands, the domestic security manufacturers started late, in the credibility of technology has not yet established a complete system, is still in the stage of perfecting the architecture. "Editorial recommendations" to clear clouds and cloud Security + cloud protection Mystery resolution: Cloud Computing and network security 6 trends Cloud Security is a basic service Architecture "responsible Editor: Faya TEL: (010) 68476606" Original: Cloud security vs virus looking forward to technical progress return to the network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.