Cloud security allows cloud computing to have a new security management model on the Internet

Source: Internet
Author: User
Keywords Security cloud computing cloud security are

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; in the era of cloud computing, the integration of a number of emerging security technology," cloud security "concept of the wind water. The Internet is a safe companion to cloud security. The use of the Internet increasingly complex and diverse, new security is not uncommon. In the cloud security property chain, manufacturers and their value-added partners to actively change the marketing and business model, will be the end of the establishment of a prudent relationship between the user.

Some people say that cloud computing is a new concept abroad, and the concept of cloud security is authentic domestic, foreign it vendors prefer to talk about the security of cloud computing. Manufacturers have fun is to open a web-based security platform, to provide users with safe e-mail, chat, microblogging, blog, entertainment, such as the platform to do things, this is the security sector of the "cloud" security hotspot. Around the use of the cloud, someone has done this scene description abstractly. In the morning, when you drive to work, this time your car GPS, DAO timely message system for your affairs, and this office use my Computer room for you; 9 point you to the company, the big department and you work people also to the company, at this time, the core of the computing core from 100% of the utilization, into 10% But at this time, the equipment is still using electricity. 10 o'clock, you go into the office and start taking advantage of the company's IT systems, which have been running through the night tonight to look forward to your reuse. You go to dinner in the middle of the night and the ordering system in the chain restaurant becomes very busy. After work and colleagues entertainment, rest a day of song system is in the evening 9 o'clock officially sent to use the peak. At 11 o'clock, you are drunk, ask for driving, driving the company's customer service booking system, after all, is at midnight 11 o'clock sent the first customer ...

Let's just imagine, everyday life, there is a natural difference between the time required to use computing power and the use of their address, and if these peak-time, completely different enterprise use is put into a cloud computing core, is not in the peak period of computing can be divided into other industries to do business, computing efficiency will be greatly improved, Not only environmental protection, but also can bring profits to enterprises.

And how ineffective to achieve the cloud "that need to use" is efficient, convenient, low-cost, cloud security is to achieve cloud computing this mode of the link.

According to the professional analysis, under the concept of cloud computing, the computer is no longer a separate machine, but a collection of nodes, and the collection itself will become a computer. This kind of computing mission to the global operation of the collection, is providing all kinds of convenience at the same time, the inevitable reality is the need to provide more detailed personal information in order to get better business; In the past, the use of the Internet, the operators of the IT staff can easily read as well as user data, which highlights the security is the main cloud.

Cloud security, security cloud. This is the new security mode brought by cloud computing. The world is emerging cloud security, users do not need to establish a security system, manufacturers or operators to take the manufacturers, supply cloud security value-added business.

This corresponds to the so-called cloud computing is to make the best of the truth. Users pay for the general it handling and security costs, but can get the security and work. Users do not want to pay the high-spirited cost to ask the best security experts, but also want to get good security services, the cloud computing core deal with this contradiction between supply and demand.

To be able to say, a security issue is a public concern for cloud computing, and most of the cloud computing vendors do not have a complete and integrated approach to security.

A security value-added provider proposes to address security issues from the architecture, giving priority to the architectural approach rather than the single point of security, which is to process people from the architecture rather than the equipment. This is the best way to achieve cloud computing.

For cloud security value-added operators, they will not only help cloud computing core to complete the concept of security architecture, security system support and audit evaluation work; More important, their security for cloud computing core is not limited to conservative collection security, especially to provide business continuity solutions Need to be sla98.5% above the general level of service and complete a variety of security.

Cloud Security as a new mode of work, its secondary feature is actually to create Low-cost security system for users, the passive defense virus to automatically from the source of attack, the safety of the collapse is in the final stage. This makes the establishment of intelligent cloud security system a link.

For the definition of cloud security, industry experts told reporters, the so-called "cloud security" is the collection of information security category of the era of parallel disposal, grid computing, unknown virus behavior and other emerging technologies and concepts, through the network of a large number of clients in the collection of software behavior very monitoring, access to the Internet Trojan, The latest malicious French news, sent to the server for dynamic analysis and disposal, and then the virus and Trojan processing scheme Diablo 3 agent distributed to each client.

"Cloud security is not only a craft can deal with, but need the linkage of various elements, is a system engineering." "said Wu Xiyuan, president of Symantec Greater China. For security vendors, the introduction of cloud computing can greatly promote their ability to collect virus samples and reduce response time. In this regard, Wu Xiyuan, he believes that cloud computing has changed the security companies before the United States to serve the network only sell products license marketing model, so that the mode of operation is possible, through the cloud to push security to the end user.

Now people talk about "cloud security", must first talk about cloud computing. Cloud computing technology is actually a combination of various types of virtualization technology, for the business, is the mode of the IT equipment is a transfer of "sell" for rent. According to the introduction, at present, the group Cypress Data Private cloud processing scheme includes the Checkpoint VSX virtual firewall, RSA dynamic authentication take the Diary elucidation processing plan, the Xceedium bunker from the service battle Net machine processing plan, the CyberArk password life cycle processing plan, As well as Citrix's XenApp use the isolation processing scheme. Websense Triton security Architecture, and so on.

For users, the security component of cloud computing is secrecy. Not only is the system itself the technical warfare network needs to be reliable security, absolute logic isolation, but also to the operation of the absolute control and ensure that the core of the operation of the cloud staff must not touch the customer secret message. And this needs to rely on the self-discipline of personnel, to strengthen the technical means to cooperate to achieve.

(Responsible editor: Liu Fen)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.