Operators open up cloud security business Operation mode face challenge

Source: Internet
Author: User
Keywords Cloud security security operator
Tags analysis anti- anti-virus anti-virus software application based business business model

With the cloud computing in various areas of the attempt and landing, cloud based security services have been from the conceptual phase of the transition to the completion and promotion phase. In this situation, the three major operators in China to carry out cloud security practice. China Mobile's "big Cloud", the Chinese telecom's DDoS attack defense business platform and the safe fast lane business, are the cloud computing and the cloud security beneficial practice, has opened up the new business model. China Unicom also began the practice of cloud computing since 2009, and research on cloud security has been deepening.

Cloud security technology makes the internet safer

Cloud security, which is commonly discussed today, mostly refers to the application of cloud computing technology in the security field. Cloud security through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the server for automatic analysis and processing, and then the virus and Trojan solution distributed to each client. The entire internet, has become a super big "antivirus software".

Cloud security technology is the result of hybrid development and natural evolution of Peer-to-peer technology, grid technology, cloud computing technology and other distributed computing technologies. The concept of cloud security has been raised for a wide range of controversies, and many people consider it a pseudo proposition. But the facts speak louder than words, the development of cloud security "like a gust of wind," Rising, Trends, Kaspersky, McAfee, Symantec, Jiangmin Technology, Jinshan, 360 security guards have launched a cloud security solutions.

Future anti-virus software will not be able to effectively handle the increasing number of malicious programs. The main threat from the Internet is from computer viruses to malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time. The entire internet is a huge "anti-virus software", the more participants, the more secure each participant, the entire Internet will be more secure.

Cloud computing, cloud security development faces many challenges

However, the security threats faced by enterprises in cloud computing are very numerous, including the following four aspects. First of all, a large number of rapidly emerging web security vulnerabilities, compared with the traditional C/s system security vulnerabilities, multiple customers, virtualization, dynamic, business logic services Complex, user participation, such as the characteristics of these cloud services to network security means a great challenge, or even disaster. The second is denial of service attack DDoS. In the technology environment of cloud services, the key core data, services in the enterprise leave the Enterprise network, migrate to the Cloud service center, more application and integration business begin to rely on the Internet, the consequence and destruction of denial of service will obviously surpass the traditional enterprise network environment. Again internal data leaks and abuses. Enterprise's important data and business applications in the cloud service provider's IT system, how to ensure that the cloud provider's own internal security management, how to avoid the cloud computing environment in the potential risk of multiple customer coexistence, these are the cloud computing environment users of the most serious security concerns or challenges. Finally, potential contract disputes and legal proceedings. Cloud services contracts, service providers ' SLAs and it processes, security policies, event handling, and analysis may be imperfect; In addition, the uncertainty of physical location and the complexity of international laws and regulations caused by virtualization make potential contract disputes and legal lawsuits become the major challenges of exploiting cloud services.

In other ways, for telecom operators operating cloud security, there are two very real problems and challenges: how to enter into an appropriate and reasonable SLA agreement with the customer; the second is how to avoid the price war, which is not only a business model (business model) of the problem, Regardless of the type of billing model (pay per use or pay/month), there is a challenge to the forward payoff-users tend to be more inexpensive. How to persuade users to buy a better rather than cheaper service is something that telecom operators must think about.

The carrier plans cloud security strategy in two aspects

At present, the three major domestic operators have started cloud security business practice. For example, China Telecom has established a large capacity DDoS attack defense service platform based on cloud computing architecture, which is based on cloud computing architecture, adopts the processing mechanism of "whole network unified dispatching, parallel processing and source cleaning", which greatly improves the defense capability on the basis of statistical multiplexing of resources.

Overall, the telecom operators for the development of cloud security business planning and imagination, on the one hand, to achieve the cloud of security services, the second is to cloud security infrastructure and cloud security services in two aspects of the platform at the same time overall consideration and construction.

The cloud security infrastructure can be managed and implemented through SOC Operation management platform, which needs to meet two requirements, one is network security operation and maintenance, and the other is to provide cloud security service for telecom customers. While the construction of cloud security platform, operators should pay attention to the use of Third-party cloud security platform, such as the introduction of some security manufacturers to provide anti-virus platform, and so on, fully integrate internal and external resources, the use of resource pooling effect, enhance the overall information security infrastructure and service delivery capabilities.

From a technical standpoint, we believe that cloud security services should implement End-to-end solutions, mainly includes these aspects of security: first, virtualization security, such as virtual machine monitoring, virtual machine isolation, mirrored security storage, virtual machine security migration, the second is the operation of security, such as static code analysis, internal and external attack protection, program operation Security Third, interface security, such as avoiding policy evasion, avoid malicious interface calls, interface call authentication, four is data security, such as data encryption, security access, content security, data backup and extinction.

For operators cloud security future development, we think that we should consider from three perspectives: first, cloud computing providers should consider the guarantee of service quality, and the second is that users need to consider the issue of information protection; third, managers need to consider some regulatory issues, such as the development of security systems, policies, cloud computing security standards, The service provider should also be monitored and supervised.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.