Cloud security indicates a secure future (1)

Source: Internet
Author: User
Keywords Security cloud security cloud security
Since 2007, the trend in malicious code has been much different than it was before: the new threat is for profit, and the number is dramatic, trying to overwhelm the defenses of antivirus software in huge numbers. To the hacker's mind, a massive amount of malicious code has spawned a security-sector revolution, have long wanted to get rid of the "attacked-defense" passive situation of the anti-virus software manufacturers to change, the introduction of "cloud security" system to counter the malicious threat, and in the security industry triggered a cloud security "prairie fire." Three major trends in technology China's general manager Oscar told reporters: "Cloud security is definitely not a gimmick, but a major change in anti-virus technology and mode." "July 2008, after several years of technical reserves, trend technology finally decided to change the traditional anti-virus mode at the terminal and gateway, the anti-virus function to the" cloud. At the time, the security threats to end users generally came from three ways: browsing Web pages, e-mail, and Internet files, and using search technology to mark all three of these things as security levels could theoretically block most attacks on the network. For this reason, trend technology has developed a search page in the cloud, the discovery of malicious code is unsafe, if the user attempts to access the Web page, the "cloud security" mode of blocking, while at the user terminal, only need to install an antivirus engine, do not need to update the virus code, which avoids a large amount of resource consumption. The "cloud security" model of trend technology is one of the earliest "cloud security" concepts and technologies in anti-virus field. To achieve this ' cloud security ' architecture, trend technology has prepared 3.5 of the time, invested 400 million of dollars, built 5 cloud data centers around the world, installed 34000 cloud servers, and ran maintenance costs of more than 15 million dollars a year. Also in July, rising issued a card 6.0, so that users need to install the software, added to the rising "cloud security" program, the Internet virus can be comprehensively collected and killed. Rising company vice president Lu Qing said rising of the "cloud security" is the use of its vast number of end-users in the country, collecting from the front-line terminal users infected with the virus code samples, and uploaded to the rising cloud data Center for analysis, then the cloud database will analyze the results of the next upload to the Internet on each end-user computer. In this way, end users have become an integral part of the cloud security system, contributing their own strength to cloud security. Although the cloud security model for two vendors is quite different, their actions mark the advent of the Cloud Security 1.0 era. And, in a few months, cloud security has evolved from 1.0 to 2.0. December 2008, rising will cloud security upgrades to version 2.0, the 2.0 version of the characteristics: not only can upload virus code at any time, but also upload the user-side detected by the horse site, which greatly expanded the security of the cloud area of defense. Trend technology for the "Cloud Security 2.0" version of the launch of a longer time to prepare. In July 2009, Trend Technology announced that it had upgraded its "cloud security" to the "Cloud Security 2.0" version a year ago,and announced the introduction of a new "cloud Security 2.0" multi-level terminal security solutions and related two core products. On the basis of the cloud Security 1.0 emphasis on the Web virus killing, Cloud Security 2.0 has increased the application of the file reputation technology and the Multi-Protocol Association analysis Technology, which makes the file reputation technology interact with the Web reputation technology and the mail reputation technology. Oscar that the virus transmission from U disk will still greatly damage the network. "The current spread of the virus still follows the 2/8 principle: 80% of the virus from the Internet, 20% of viruses from the traditional media such as U disk." "How to locate which computer is infected with the virus in the U disk is a new challenge for users," he said. As an important part of the Cloud Security 2.0 program, Trend technology has launched a threat discovery system installed at the gateway to address this challenge, which can pinpoint-tds terminals. In this way, "cloud security" 2.0 formed a "terminal to the Gateway", "terminal to the Cloud", "Gateway to the Cloud" multi-layer defense system. Rising and trend of technology cloud security is very representative of the two cloud security, rising emphasis on the terminal virus collection capabilities, by the distribution of the Internet in every corner of the user terminal collection of virus code, and then uploaded to the cloud to build a "cloud security" system. And the trend of technology to emphasize the cloud of computing capacity, relying on a large amount of servers composed of "cloud architecture" system, manufacturers through the Internet to collect and analyze virus code, and then antivirus for end users. The reporter believes that the trend of technology cloud security is a more active model, because its idea is to try not to give the virus to infect the user's computer opportunities. Foreign manufacturers seem more inclined to adopt this model. Kaspersky Product Manager Gao to reporters, Kaspersky believes that the ideal way is to provide a proactive protection system, can be in advance of the security of unknown procedures for security analysis, and so on, or security ratings, the different security levels of unknown programs to control the level of authority to prevent them from possible damage to the system, This can be immune to new malicious threats before they are created. This is more advanced and efficient defense technology, Kaspersky named the Technology "application control." Gao that "application control" technology will soon become the mainstream of antimalware technology. Of course, the reporter did not belittle the meaning of rising cloud security. After all, cloud security is a new thing, there are different technical models is an inevitable phenomenon. In fact, rising and trend of technology, "cloud security" of the beginning of the technical route is different, but is heading towards the same goal is moving forward: terminals more and more "thin", cloud virus library and anti-virus ability is more and more strong. Trend technology has realized the terminal "0" Virus code storage, the end of the resources completely released, and rising also said that through the "cloud Security" system data analysis, rising experts can make the maximum anti-virus software optimization, so that its ability to kill more powerful, less consumption of resources, since the "cloud security" plan implementation, Rising anti-virus software virus database volume has been reduced by more than 60%. Although trend technology and rising companyThe cloud security model adopted is completely different, but two companies agree that Cloud security is the only development direction for the future anti-virus industry. The success of anti-virus software vendors in cloud security has also led to the transformation of traditional hardware security vendors cloud security. However, not all hardware security vendors can be transformed, because cloud security has a high demand for the "cloud" resources accumulated by the vendors. 1 2 Next >> view full-text navigation page 1th: Cloud security identifies the future of Security on page 2nd: Cloud Security Identifies the future of security the next source: Cloud Security indicates a secure future (1) Return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.