As the most basic component node of the enterprise network, the terminal is the target of hackers and virus makers because it stores a large amount of sensitive data, meanwhile, because the terminal faces the internal staffs of the enterprise directly, the management is difficult, which leads to the weakest link in the Enterprise network. This allows enterprise users to rethink their own terminal security! Coincidentally, July 24, a theme for "Rethinking Your Terminal security" At the Cloud Security 2.0 conference, the trend technology company in the theater format of the current terminal virus complex status, and to enterprise users launched a cloud security 2 multi-level terminal security solutions and related two core products, respectively, deployed in the network layer trend Technology Threat discovery System (Threat Discovery Suite, abbreviation TDS) and the star product trend deployed at the end of the technology Antivirus Wall Network Edition (TrendMicro OfficeScan Corporate Edition). In fact, cloud security upgrades from 1.0 to 2.0, and trend technology took a year. According to the Global senior vice president and Greater China General manager Oscar, Cloud Security 2.0 increased the file reputation technology and the application of Multi-Protocol Association analysis technology, so that the file reputation technology (FRT) and the Web reputation Technology (WRT), mail reputation Technology (ERT) to achieve relevance and interaction, To provide customers with more secure and effective protection shield, which is a major change in the management of Terminal system security and resource release. The advent of cloud Security 2.0 will also allow more security vendors to rethink what the core value of cloud security should bring to users. According to the trend of science and technology global Anti-Virus research and Technical Support Center statistics: Today, network threats increase at a rate of 1 new viruses every two seconds; Enterprise Terminal memory will therefore be consumed at a 3mb/-month rate to store constantly updated virus codes; Each virus code is deployed to 1000 terminals for at least 4 hours, during which time The terminal is unable to obtain timely protection. According to the U.S. Osterman study, "Cloud Client Enterprise Security Impact Assessment Report", in today's threat environment, a company with 5,000 employees, in the case of the traditional terminal protection has been deployed, 2/3 of the end of the year will still be infected, the enterprise will lose 2 , the cost of RMB 503,200 is threatened to purge and to pay for employee productivity. At the same time, because the threat can not locate the source of infection, the virus will continue to repeat the infection in the corporate network, resulting in the loss of enterprises are constantly magnified! Cloud Security 2.0 Enhanced Terminal security deployment trend technology in this opportunity, launched by the Multi-Protocol association analysis technology and file reputation technology of multi-level terminal security solutions, for the enterprise terminal Security and add sharp weapon. According to the introduction, trend technology Anti-Virus wall network version of OfficeScan 10 as a trend of the classic products, the success of Cloud Security 2.0 in the File Reputation technology (FRT), with Cloud Security 1.0 of the Web reputation Technology (WRT) intoLine consolidation. File reputation technology relies on the huge cloud threat database, users to access the file before accessing the credibility of the file to prevent malicious files download access. 34000 Server Cloud to complete the query in milliseconds, to help enterprises achieve 0 jet lag virus code update, 0 time virus code deployment, 0 resources occupy the growth of three "0" Protection! According to reporters, the trend of science and technology to visit the Global 1000 CIO, and its corporate network terminals for security checks, found that the safety of terminals far less than the CIO's expected. Terminal is not only the target of network threat attack, but also because it faces the internal employees, so it becomes difficult in security protection and management. As one of the core technologies of this Conference, Cloud Security 2.0 Multi-Protocol association analysis technology can be analyzed in nearly hundred kinds of common protocols, by monitoring the abnormal behavior in the network, tracking the threat initiator, locating the source of the threat infection. Based on the trend of the technology development, technology threat discovery equipment TDA from the network layer for the terminal initiative to build a three-dimensional model, using threat correlation analysis, multi-protocol correlation analysis to quickly locate the source of infection, found in the corporate network of "broiler" and various unknown threats or security management problems, And through the interaction with the trend Science and Technology Monitoring Center (MOC), the company provides management services for the enterprise network, thus forming a complete set of threat Discovery System (TDS) for the enterprise users to provide the first time response strategy. Trend Technology Cloud Security 2 multi-level terminal security solution using the trend technology TDs and OfficeScan 10 Real-time protection linkage, can block the virus into the terminal, effectively prevent virus outbreaks, chickens, network hanging horse, worm outbreak, illegal intrusion and other known and unknown network threats. Reliance Cloud Security 2.0, the first protection of the Jianyun Security 2.0 will be a large number of anti-virus features will be migrated from the terminal to the cloud, and through the gateway and the end product intelligent linkage, the formation of "terminal → Gateway", "terminal → Cloud", "Gateway → cloud" multilayer defense system, in the large compression of the protection of the empty window period, Simplify the application and management of the difficulty, improve the efficiency of the entire information system. Trend Technology Cloud Security 2.0 illustrates the meaning of "simple operation", which makes it easy to control the unmanageable security management, and the pain and wound that many enterprises suffer from terminal security management will be smoothed by Cloud Security 2.0 technology. Trend technology in 3.5 of the time for cloud security research and development, a total of more than 400 million dollars to build 34000 servers to form a huge cloud. Now, including the country's largest banking institutions, the world's largest manufacturers of notebook hinges and China's important government departments have begun to enjoy the trend technology cloud security technology to bring convenience. In 51CTO Reporter's view, the arrival of cloud Security 2.0, will let more enterprise users Rethink network terminal security is enough, how to better improve management efficiency and improve ROI will be the focus of CIO thinking. The way of information security protection under the network War of "editorial recommendation": The system and the technology simultaneously the day melts the letter: YunAll bring complex security challenges authoritative release: Cloud security biggest threat and solution "responsible Editor: CC TEL: (010) 68476606" Original: "Cloud Security" enterprise Terminal security protection return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.