Recently, trend technology has launched the trend Technology Cloud Security 2.0 with the theme "Rethinking your Terminal safety". 1 years from 1.0 to 2.0, why? What's so special about cloud Security 2.0?
1, Crisis: Traditional terminal protection is not safe
As the most basic component node of the enterprise network, the terminal is the target of hackers and virus makers because it stores a large amount of sensitive data, meanwhile, because the terminal faces the internal staffs of the enterprise directly, the management is difficult, which leads to the weakest link in the Enterprise network. According to the trend of science and technology global Anti-Virus research and Technical Support Center statistics:
Today, network threats increase at a rate of 1 new viruses every two seconds;
Enterprise Terminal memory will therefore be occupied with the 3mb/-month speed to store the constantly updated virus code;
Each virus code is deployed to 1000 terminals at least 4 hours, during which the terminal can not obtain timely protection.
According to the U.S. Osterman study, "Cloud Client Enterprise Security Impact Assessment Report", in today's threat environment, a company with 5,000 employees, in the case of the traditional terminal protection has been deployed, 2/3 of the end of the year will still be infected, the enterprise will lose 2 , the cost of RMB 503,200 is threatened to purge and to pay for employee productivity. At the same time, because the threat can not locate the source of infection, the virus will continue to repeat the infection in the corporate network, resulting in the loss of enterprises are constantly magnified!
This allows enterprise users to rethink their own terminal security!
2, Response: Cloud Security 2.0 strengthen the terminal security deployment
Trend technology in the launch of the Conference based on the Multi-Protocol association analysis technology and file reputation technology multi-level terminal security solutions for the enterprise terminal Security and add sharp weapon.
Trend Technology Anti-Virus Wall network version OfficeScan 10 as a trend of the classic products, the success of Cloud Security 2.0 in the File Reputation technology (FRT), with Cloud Security 1.0 web reputation Technology (WRT) integration. File reputation technology relies on the huge cloud threat database, users to access the file before accessing the credibility of the file to prevent malicious files download access. 34000 Server Cloud to complete the query in milliseconds, to help enterprises achieve 0 jet lag virus code update, 0 time virus code deployment, 0 resources occupy the growth of three "0" Protection!
Trend Technology has visited 1000 CIOs worldwide and conducted security checks on its corporate network terminals, finding that terminals are far less secure than CIOs expected. Terminal is not only the target of network threat attack, but also because it faces the internal employees, so it becomes difficult in security protection and management.
As one of the core technologies of this Conference, Cloud Security 2.0 Multi-Protocol association analysis technology can be analyzed in nearly hundred kinds of common protocols, by monitoring the abnormal behavior in the network, tracking the threat initiator, locating the source of the threat infection. The trend of technology development based on this technology threat discovery device TDA a stereo model from the network layer for the terminal. Using threat correlation analysis and multi-protocol correlation analysis to locate the infection source quickly, discover the "broiler" and various unknown threats or security management problems in the enterprise network, and pass the same trend science and Technology Monitoring Center (MOC ) to provide management services for the enterprise network, thus forming a complete set of threat Discovery System (TDS) to provide enterprise users with the first time to respond to the strategy.
Trend Technology Cloud Security 2 multi-level terminal security solution using the trend technology TDs and OfficeScan 10 Real-time protection linkage, can block the virus into the terminal, effectively prevent virus outbreaks, chickens, network hanging horse, worm outbreak, illegal intrusion and other known and unknown network threats.
Cloud Security 2.0 migrates a large number of antivirus functions from the terminal to the cloud, and through the gateway and the end product intelligent linkage, the formation of "terminal → Gateway", "terminal → Cloud", "Gateway → cloud" multilayer defense system, in the large compression protection of the window period, simplifying the application and management of the difficulty, Improve the efficiency of the whole information system. Trend Technology Cloud Security 2.0 illustrates the meaning of "simple operation", which makes it easy to control the unmanageable security management, and the pain and wound that many enterprises suffer from terminal security management will be smoothed by Cloud Security 2.0 technology.