Hillstone Assist Cloud IDC Virtual host leasing business security

Source: Internet
Author: User
Keywords Security nbsp;
Tags access application applications based business business security change cloud

Recently, in order to cope with the opportunity and challenge brought by the development of cloud computing technology to IDC, hillstone the network change and its network security challenge after the virtualization of the cloud IDC, put forward the security solution of using the physical firewall to solve the new network security problem which is introduced by the system virtualization.

Hillstone that cloud computing represents the development trend of network applications, that is, multi-user sharing infrastructure, user on-demand services, user resources with scalability, extensive network service access and measurable SLAs, cloud computing has three different types of technology evolution process, One is the development of technology based on system virtualization, the second is the development of multi-integration technology based on distributed parallel computing, and the third is the Application software Leasing service which is evolved by ASP.

In addition, Hillstone also believes that the traditional IDC provides host-based, rack-based leasing or hosting business. In the era of cloud computing, IDC is a typical public cloud of infrastructure. As the first step of the evolution of IDC's cloud process, the virtual host leasing business is realized by using the system virtualization technology. Before virtualization, there are many problems in the data center, including low hardware utilization, limited room size can not meet the increasing business needs and the cost of energy expenditure alarming and many other shortcomings.

The adoption of virtualization technologies in data centers can bring a number of immediate benefits. For example, you can make physical server consolidation, reduce the number of servers, save hardware procurement costs, and the use of supporting hardware virtualization platform can improve the overall efficiency of hardware, while facilitating the simplification of the process and time to create a disaster recovery server, and the integration of many physical servers can save space and power and cooling costs, It is particularly important that virtualization can provide customers with 24x7 and uninterrupted hosting for a significant increase in reliability.

When the server is virtualized, there are multiple VM VMS within the physical server, each hosting a different application. Also, inside the physical server, also because of virtualization introduced a new virtual network layer, specifically a virtual switch, the same physical server within the different virtual machine traffic can be directly through the internal virtual Switch communication, no longer through the external physical firewall, it will lead to the original security protection mechanism failure, And can not realize the communication between monitoring applications, so new security measures must be adopted to ensure data center security. Therefore, the core SW scheme of core firewall with data center level is proposed by Hillstone.


Through this program, Hillstone high-performance Data Center firewall can replace the traditional firewall integration, to help users save security equipment investment, Hillstone high-performance Data Center Firewall has comprehensive reliability, over the software firewall and the common hardware firewall, In particular, scalable features can achieve the firewall performance on-demand expansion, fully protect the user's investment, but also through the general interface integrated into the IDC pipeline platform.

Hillstone high-performance Data Center Firewall in addition to providing firewall, intrusion prevention, based on the application of security management functions, but also with high-performance, high reliability, high scalability and other features, to meet the cloud IDC data center of the growing data security needs, It can provide the overall security protection for the data Center Server area, evade the data Center Server area security threat, enhance the business continuance, realize the overall security management function, and ensure the IDC Data Center system security.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.