Pepper Map Technology released "Cloud lock" cloud security No "lock" is not in

Source: Internet
Author: User
Keywords Cloud
Tags access control based cloud cloud security information information security internet internet +

Pepper Map Technology Today (August 30) held in Beijing 2014 product launches, officially released based on the operating system kernel reinforcement technology free server, Web site security products-Yun Yu. Mr. Ni, a researcher of Chinese Academy of Sciences, academician of China Engineering Academy, Technical advisor of the National Security Bureau, director of the Information Security Technology Engineering Center of Chinese Academy of Sciences, Kinshan teacher, director of Network Security Laboratory of the Academy of Sciences, director of Zhongguancun Network Security laboratory Liu Baoxu, and well-known internet since media people Lou, Dingdao, Lou, Zhu Yi, Wang Jiwei and so on were invited and attended the conference.

The popularization of new technologies, such as cloud computing, large data and Internet of things, is driving the IT industry into a new computing age. Hot Pepper Technology Chairman Chen Ming said in his speech: "Pepper map technology has been focused on operating system security technology research and product promotion, will continue to focus on the safety of cutting-edge technology and hotspot areas, experience the Internet to bring the leap-type development."

Chen Ming, Chairman of Chili Technology

It is understood that cloud lock is the first C/s architecture of the free server security software, through the PC side can be implemented on the server side of the security management and monitoring. Cloud lock Cross-platform Support Windows/linux dual operating system, with operating system kernel hardening technology and Web Access control technology as the core defense system, the function covers system protection, website protection, traffic protection, security optimization, security monitoring, security log six modules, can help users effectively resist CC attacks, SQL injection, XSS cross-site attack, vulnerability attack, virus, Trojan, backdoor and other hacker behavior.

Cloud Lock product manager Wang said at the press conference: "There are a lot of security software on the market, but most of them are based on the network layer and application layer of protection, for the server system layer protection of security software is very few, but the user for this demand is really strong." ' Cloud Lock ' can be truly simple, reliable and free. Pepper Map Technology has more than 10 years of system security technology research and accumulation, as a kernel-level protection product, cloud locks can penetrate into the underlying kernel of the operating system, introducing the kernel-level mandatory access control model to Web site protection, which is a pioneering work of cloud locks, and this model can also be used to protect other applications against being bypassed by attackers. ”

The conference site also on the "Site security status quo and the future" this issue of in-depth analysis and discussion, Speed road network, deputy director of the Ding, Speed Institute executive Dean said, he himself is from the webmaster to the media, the release of the cloud lock for the webmaster Circle is of great significance.

Safe Mode officially started

As the saying goes, "Three people line, must have my division", adhering to the "with the user to define products" concept, will be invited to well-known since the media Dingdao division, Lou, called T, Zhu Yi, Wang Jiwei as a cloud lock product honorary consultant, and issued an appointment for five respectively. The cloud lock team has been expanding the size of its honorary advisors, hoping that more people will be involved in the design and improvement of the cloud lock product.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.