Cloud Security sets a new safety benchmark

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security
Absrtact: Many industry manufacturers have launched the "Cloud Computing" program, although these "cloud computing" the focus is different, but the use of Internet ideas to reduce costs, improve efficiency, but is one of the common ground. So what should the security industry's "cloud computing" look like? The answer is: cloud security. Recommended White paper: Yan-Shen convinced wide-area network acceleration Equipment Report web World Evaluation Laboratory using the leading test method rigorous testing deeply convinced wide-area network acceleration Equipment M5100-Q, it will have any amazing performance? To destroy the defenses of antivirus software, virus makers have resorted to "viral quantification", which is to create a large number of virus variants that make traditional anti-virus software more manageable. The changes in the virus prompted antivirus vendors to adopt a new model to prevent malicious threats, cloud security emerged. Security industry upgrades to cloud security cloud security from the birth to the present, there have been two kinds of technology development routes. One is to rely on the mass server, based on search engine technology, "cloud architecture" system, the other is to rely on the Internet in every corner of the user to build a "cloud security" system. The idea of "cloud architecture" is that since users are exposed to security threats from the Internet, the basic limit is limited to three ways of Web pages, mail, and Internet files. Then, put the three things on the Internet security level, using web crawler to search the Web page, found that malicious code is not safe, if the user attempts to access this page, return the result block. Similarly, doing so for messages and files can theoretically block all attacks on the network. At the user terminal, you only need to install an antivirus engine, do not need to update the virus code, which avoids a large amount of resource consumption. At present, foreign manufacturers seem to prefer to adopt this model. Unlike the "cloud architecture" approach, the idea of "cloud security" is to rely on users in every corner of the Internet to connect all users, and if one user is attacked, the server receives its uploaded information and returns the results to all endpoints on the network. In this way, no matter how many kinds of network threats, as long as the initial attack of the client timely reporting information, after the analysis of the server processing, return results, the entire network can be in the shortest between the immune ability to get the attack. Now, cloud security has evolved from 1.0 to 2.0. Rising cloud Security version 2.0 features: Not only can upload the virus code at any time, but also upload the user-side detection of the Hanging horse site, which greatly expanded the security of the cloud protection range. And the trend of technology in the cloud Security 1.0 emphasis on the basis of the Web virus killing, in the cloud Security 2.0 increased the file reputation technology and the application of Multi-Protocol Association analysis technology, so that the file reputation technology and web reputation technology, mail reputation technology to achieve relevance and interaction. As an important part of the Cloud Security 2.0 program, Trend technology has launched a threat discovery system installed at the gateway to address this challenge, which can pinpoint-tds terminals. In this way, "cloud Security" 2.0 formed "terminal to Gateway", "terminal to Cloud", "Gateway to the Cloud "multilayer defense system. Although rising and trend technology "cloud security" of the beginning of the technical route is different, but the same direction is moving towards the same goal: the terminal more and more "thin", cloud virus library and anti-virus ability is more and more strong. Trend technology has realized the terminal "0" Virus code storage, the end of the resources completely released, and rising also said that through the "cloud Security" system data analysis, rising experts can make the maximum anti-virus software optimization, so that its ability to kill more powerful, consumes less resources. Cloud security energy saving and low carbon economy is the inevitable choice for the whole society to realize economic development and resource environmental protection. In the IT field, the concept of green, energy saving and consumption reduction has been deeply rooted. Cloud security has also dramatically increased the level of energy efficiency and consumption in the antivirus industry. Through the analysis of cloud security system data, security experts can optimize the anti-virus software to make the killing ability stronger and consume less resources. After analyzing the virus trends of system data, horse Web site behavior, security engineers can be for a large number of similar viruses to make "general killing code", and sometimes an optimized virus code can kill hundreds of thousands of similar Trojan virus, so not only can greatly reduce the volume of virus, so that anti-virus software running faster, can also be killing many unknown new viruses. Since the implementation of the cloud Security program, some anti-virus software virus database volume has been reduced by more than 60%. In addition, due to the use of the "Server + client" logic structure, anti-virus software has become less manslaughter. Similar to Google Docs, many of the anti-virus software features are placed on the cloud security server side, such as the virtual machine status of the virus analysis, the traditional anti-virus software will be put to the client, but will consume a lot of resources, so that the machine runs slowly, and easy to manslaughter, false positives. And put on the server side, antivirus software as long as the connection to the server can obtain the results of analysis, do not consume any resources, and will never manslaughter. "Editorial recommendations" accurate and efficient low-cost-cloud security technology topics Security mainstream development of the major "cloud security" technical details on the cloud security definition of the six ideas "responsible editor: Faya TEL: (010) 68476606" Original: Cloud Security set a new safety benchmark return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.