Understanding Cloud Security
"Cloud security" plan is the latest embodiment of information security in the network age, it integrates the new technologies and concepts such as parallel processing, grid computing, unknown virus behavior judgment, and obtains the Internet Trojan, The latest information of the malicious program, pushed to the server side for automated analysis and processing, and then the virus and Trojan solution distributed to each client.
future anti-virus software will not be able to effectively handle the increasing number of malicious programs. The main threat from the Internet is from computer viruses to malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time. The entire internet is a huge "anti-virus software", the more participants, the more secure each participant, the entire Internet will be more secure.
Cloud Security Concept proposed, it's development like a gust of wind, rising, trends, Kaspersky, MCAFEE, SYMANTEC, Jiangmin technology, PANDA, Jinshan, 360 security guards, card card Internet Security Assistants have launched a cloud security solutions. Rising based on cloud security strategy developed 2009 new, daily interception of millions of Trojan attacks, of which January 8 is more than 7.65 million times. Potential technology cloud security has been set up in the world 5 large data centers, tens of thousands of of online servers. It is reported that the cloud security can support an average of 5.5 billion clicks a day to query, collect analysis of 250 million samples a day, the database first hit rate can reach 99%. With the help of cloud security, trend technology now blocks up to 10 million infections a day.
cloud security behind the dangerous who know
with the increasing number of household and personal Internet users in recent years, the demand for information security is getting higher, since mid-2008, security solutions based on the "cloud security" architecture have begun to enter the general public. After last year's major manufacturers to do a full concept, this year, cloud security will enter a comprehensive product and promotion phase. But in the cloud security "noisy" under the surface, it is inevitable to hide a bit sinister.
Two cloud security models are superior to each other
the current cloud security implementation principle can be divided into two types: one is the "Securecloud" by trend technology, the cloud Client security architecture based on Web reputation Service (WRS), mail reputation Service (ERS) and File Reputation Service (FRS), Save the virus signature file to the Internet Cloud database to keep the minimum number of points at the endpoint for verification. Its core is two points: (1) The interception of the compound attack. By checking the extension properties of the suspected virus component, the threat degree was judged and (2) the thin client. A large number of virus signatures are stored in the cloud database. In short, the trend technology cloud security technology, based on its large server cluster and parallel processing capabilities, has built up a large black and white list server group for client queries that intercept web threats before they reach end users or corporate networks.
another is raised by the domestic security manufacturer rising, and the trend of technology server group "cloud", Rising "cloud" is based on the vast number of Internet users. Through the User Client installation software monitoring network software behavior Anomaly, will find suspected Trojan, malicious program of the latest information pushed to the rising server for automatic analysis and processing, and then the virus and Trojan solution distributed to each client.
According to expert analysis, the above two concepts of cloud security adopt two completely different patterns. Trend technology emphasizes the prevention of external threats, the base is a large server group; Rising emphasizes the perception of unknown threats already existing on the user's computer, based on the need to have a large number of client users. Although the model is different, there are some defects. Trend technology ignores the threat of local collection, and rising cloud security can only be passive defense, not in the unknown threat into the computer before the interception. On the other hand, today's information security companies have not built tens of thousands of Google server groups and very sophisticated parallel processing technology, but also need to strengthen the basic hardware input and upgrade, or increase the collaboration with Third-party cloud computing service providers.
On the impact of cloud security on traditional antivirus mode, Gao, a product manager at Kaspersky Company in Beijing, said the change would not be completed overnight. Because, so far, although the traditional virus prevention model has certain limitations, but the advantages are very prominent, that is, accuracy and quality of treatment are very high. For limitations, many security vendors have also been upgraded by adding other security modules, such as heuristic analysis, active defense, IDP system (intrusion detection& prevention system, intrusion detection and defense systems). Therefore, for the moment, "cloud security" is still not enough and there is no need to make security products completely out of the traditional model, because traditional patterns are evolving to meet the growing needs of users.
in response, on the one hand, anti-virus software manufacturers need to vigorously promote cloud security technology, the use of the latest protection technology based on active defense, such as the central database of online access to applications, download software to restrict access rights, security update management system and list of trusted programs and other measures, These methods can effectively enhance the traditional anti-virus protection effect based on the signature method.
and on the other hand, most users are not fully aware of the current web security threats and risks to the impact of information security, many users unknowingly tolerate a variety of spyware, puppet programs, Keylogger Software, adware running in the host, Poses a huge security risk to personal computers and corporate information security. Especially for enterprises, strengthening the terminal security protection and gateway construction, as well as improve the internal data security management work has no delay.
Cloud security is really "secure"
Cloud computing and cloud security continue to drive the development of data and online applications, a revolutionary push to the periphery of traditional network security. and enterprise users need to use a number of new mobile devices to access data through the wireless network. Some creative attackers are always inventing new ways to steal data from businesses so they can sell on the black market. Internet security has been lagging behind security forms.
It's not easy to keep up with the evolving security forms, but the answer may be in cloud computing and cloud security. Security experts know that they need to extend perimeter-safe control to endpoint devices. One way is to install a security agent on a personal computer, which is risky and costly. Another option is to take advantage of emerging web-based security service providers, such as Purewire.purewire, to implement Web security by forwarding Web traffic directly through an agent system. This service is between the user and the Web. It makes security decisions about what users can generate on the web. Its sandbox technology can be a poor browser, according to different circumstances to allow users to browse which pages of the decision.
in cloud security, remote users who need access to resources stored in the cloud first need to double-check a security service provider. Cloud security services for malicious software and spam account for a certain amount of market share. Other security services are rapidly turning to cloud security, such as vulnerability scans, denial of service protection and authentication and data disclosure services.
based on cloud security has many advantages over the security agent on a portable computer. For example, some end users may disable the proxy for endpoint installation, while the vendor can completely control the agent it is in charge of. Also, security agents installed on individual devices are expensive and difficult to manage. A leading traditional security control company recently discovered the unpleasant fact that it analyzed nearly 8,000 PCs and found that 3000 of them (most of them mobile laptops) had zombie clients installed.
from the technical development trend, the endpoint security agent is misleading. For example, the iphone, users can't install their own security software on the iphone because it doesn't exist.
most small and medium-sized businesses are taking a wait-and-see approach. Many managers believe that cloud security has many factors that can result in loss of value to the enterprise. While cloud computing is pushing network access to edge devices, the fact is that many small and midsize enterprises have not given their IT architecture and computing needs to the cloud.
(Responsible editor: The good of the Legacy)