It is reported that in the upcoming 2014 "Inspur World" wave technology and application summit, positioned in China's leading cloud computing solutions provider, the wave will be launched for Cloud data Center Cloud Host Security product solutions, the same period will hold "cloud Data center Security" forum.
The "Inspur World" Conference is a summit of technology applications organized by wave group for key customers and partners. The "Cloud Data Center Security" Sub-forum is a meeting of the wave-oriented security theme of the cloud data center, which will invite the industry's top security experts, security enterprise CIOs, and security management agencies to share cutting-edge insights and innovative practices in cloud data center security. The wave will be broadcast on the Internet, technical topics, high-end interviews and other communication platform to share the wonderful content of the event.
New applications of cloud computing and new threats
According to the Ministry of Industry and Information Technology published in the "2014 Cloud computing White Paper" shows: 2013 Global cloud services market is about 131.7 billion U.S. dollars, annual growth rate of 18%, the next few years cloud services market will maintain more than 15% growth rate, 2017 will reach 244.2 billion U.S. dollars. 2013 China's public cloud services market size of about 4.76 billion yuan, the growth rate was slower than 2012, but still reached 36%, far higher than the global average level.
On the one hand, the application of cloud computing continues to deepen, virtualization, large data and many other emerging technologies in a large number of applications, users have benefited from the cloud application, and on the other hand, new technologies, new applications also brought about the security aspects of the problems and challenges, the traditional security techniques have emerged technical bottlenecks and In IDC's latest global survey, users account for more than 70% per cent of sceptical users of cloud computing security, performance, and reliability.
When talking about cloud computing security, Zhang, general manager of the Information Security division of the Wave group, said: "Cloud computing, the pace of development of large data has exceeded the pace of information security technology development." When users choose cloud service providers, stability, security, network quality is their first consideration of the three major elements. From the experience of domestic and foreign development, cloud computing security and trust system is the key to promote the development of cloud computing. ”
From traditional data center security to cloud Host Security
The wave will release the cloud Host Security product solution, the core Focus cloud data center, focusing on cloud tenant and operator security risks, providing business continuity protection.
Server virtualization, network virtualization, software definition data centers, BYOD these new application elements make the cloud data center in dynamic change. Traditional network security, terminal security, and border security have been unable to defend against malicious threats aimed at "Guest OS mirroring tampering", "host tenant attack", and "virtual machine tampering".
It is understood that the wave will be released by the cloud Host Security product solution adapted to the cloud data center security features and needs, will be from physical host security, virtual Host security, software definition of computing storage pool security three level to provide threat prevention.
"The value of data has become ever more important in terms of cloud computing and the use of big data," Zhang says. The cloud host system carries the core business of the key industry and is the core of the security of the Cloud data center. Cloud Host Security Implementation path has two: one is autonomous controllable, the second is safe and reliable, independent controllable is the premise, safe and reliable is the guarantee. He explained that autonomous control refers to the autonomy of the host system, domestic customers can use the host system of independent production, which in the United States, Japan and other developed countries have basically become a convention. Safe and reliable means that through a series of safety technology measures and safety management means, to ensure the confidentiality, integrity and usability of the host system in data processing and business operation, the wave Cloud Host Security product solution is realized by establishing the hardware and software Integration trust chain technology from the bottom server to the upper layer business system. ”
A strong team of guests, sharing cloud security Frontier technology topics
From the agenda of the Conference, we have learned that the meeting guest lineup is very strong, the Chinese Academy of Engineering Academician Shen, the Ministry of Public Security Network Safety Bureau Guo Qiquan Chief engineer, Professor Huazhong University of Shundeqing, Wave Information Security Division Cai and other IT security experts will bring forward cloud security technology sharing, national technology, The tender and other partners will introduce the latest development of cloud security industry from the cloud security industry chain level, and the Chinese Institute of Physical Engineering will share the latest practice of cloud data center security. The entire sub-forum will present a high degree of authority, professionalism and pertinence, the wonderful content should not be missed.
Background: Continued wave Host Security strategy, continuous force in the security field
1996, the Tide develops the network security technology research, concentrates on the enterprise class security technology research and the security product development.
November 2006, the wave of domestic release based on the kernel layer of the operating system security reinforcement software-wave SSR operating system security enhancement system.
September 2007, by the wave of "information security technology Server security technology Requirements-gb/t21028-2007" by the National Standardization Committee officially announced as the national standard, this is the first security standards in our server field.
2010, the wave of research and development of the first level of protection in line with the level three standard security server, leading the host security technology into a new development process.
December 2013, the tide released the Host Security Strategy, released China's first set of hardware, operating system, security software "Trinity" of the Host Security program to fill our country in the field of host security gaps.
January 2014, authoritative investigation organization CCID data shows: 2013 Tide in the host operating system security consolidation field market share first, for 8 consecutive years to obtain domestic server security strengthening product brand influence first.
August 2014, the Tide Union, 360 and other mainstream security manufacturers to build open cloud computing and large data security research platform for a certain industry cloud customers to launch a trusted cloud and large data security practices.
September 2014, the wave in the industry's first 2-way and 4-way model of trusted server products, for the security of Cloud data center to provide a solid infrastructure.
October 2014, in the Inspur World Wave Technology and application summit of the Cloud Data Center security sub-Forum, released the first domestic cloud Host security product solutions.