Deep security trends in cloud computing environments

Source: Internet
Author: User
Keywords China security we

Due to the maturity of cloud computing, the internal resources of the current data center are being continuously virtualized. Many data center construction people use the virtualization technology to excavate the traditional physical computing environment more potential, achieve the goal of maximizing resource utilization, reduce the cost of construction and operation. While virtualization has become a major trend in computing and storage resources and has begun to scale up, most of them still use traditional security solutions to address the current threat situation, but this will undoubtedly increase operational complexity, reduce host performance, and virtual machine density. These results in the inability to fully utilize virtualization and cloud computing technologies to maximize ROI.

Recently, the famous security manufacturers trend technology released its deep Security 9.0 server Depth Safety protection system, the product with VMware Vcloud and Amazon Cloud platform to achieve the perfect integration, the adoption of the industry's first multi-tenant architecture, enabling the software definition of the data Center (SDDC) Enterprise or service provider can provide its users with a unique, secure, multi-tenant cloud environment and help large and medium sized enterprises to unleash the real power of the cloud on a flexible, efficient, secure, and highly rewarding operating platform.

To get a better understanding of this product and the security solution under the virtualization environment, the author interviewed Wu Qinu, senior product manager of pupils and VMware, the trend technology China business development director. Wu Qinu said: "In this era of technology, nothing more than the pursuit of the following points, the first is fast, can quickly to when the entire virtual data center deployment is complete when the security policy is also born. The second is flexible, we have a standard module, the user can be modified above, can also be directly deployed. Quick adjustments can be made for different tenants and different levels of use. The third is refining, I believe you will see more and more do not install, even without a separate configuration, all automation can achieve products. There is only one purpose to make the management of the cloud computing center easier and easier. “

Pupils said: "Our strategy is very clear, is to deep security to create a secure platform, and the function is constantly enriched." However, the development of China also considers various localization problems. So we set up a local virus laboratory in China five years ago, only to deal with the security problems in China, will provide the virus trojan, security information update in China. We have also established a laboratory in Tianjin with the Chinese National Computer Virus Defense Center to advise the national unit and the core Information Virus Management Center. And in Nanjing has 500 people's research and development center. A lot of times will also directly send engineers to the client to solve problems and communication. We hope to make the trend of science and technology in China's most international, while the most foreign businessmen in China. In addition, some customers will have compliance requirements. In the new era of virtualization, most customers want a separate log management platform as a channel for compliance. So we have another way of doing this is to transfer the logs to these customers and let them manage it themselves. ”

Performance enhancements for agentless platforms are one of the key features of this version upgrade, which prevents duplicate data from being scanned again, especially in the VDI environment, with a cache design of the ESX layer. "From server virtualization to VDI Desktop virtualization to the cloud," pupils said. Without the installation process, the agentless architecture is the most effective in the third phase of the cloud. All the virtual machines in the Vcloud account at random planning, as long as the completion of deployment, security policy can be automatically deployed, this is done in the traditional agent way. ”

Deep Security provides VMware users with complete intrusion prevention and performance monitoring programs, and provides dynamic virtual patches on a high-performance platform without the need to install agents, dramatically reducing workloads for data centers and private cloud environments. And the entire new generation of deep security 9.0, will be the enterprise virtualization and public cloud platform operators to provide the best performance of safety protection, and maintain the highest level of security and compliance.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.