Scholar Security Cloud to enter the domestic market Enterprise cloud Disk + private cloud

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

At just the beginning of the curtain of ISC China Internet Security Conference, the scholar security cloud fully open the server, to the road master to launch a challenge. In the competition, the scholar company will simulate the safety environment to the most extreme situation, after the notary uploads files to the server, the server management password is released to the challenger. In front of the 100,000 grand Prize, the Challenger is eager, however, after a day of "attack and defense war", still no one has successfully invaded to get the document plaintext. We know that the common method of data security vendors is to protect the server and prevent hackers from invading cloud storage servers. However, under the premise that the hacker obtains the password, the scholar security cloud can still guarantee the data security, what is the mystery?

Scholar Cloud Security Challenge

Scholar Security Cloud CTO Youbing said: "Network security, system security can only prevent outside, and the user's data in the service provider's data center, but also need to defend." To achieve the absolute security of the data, it is necessary to encrypt the whole, both inside and outside. ”

Truprivacy Cloud Data security technology is the only technology in the world that can provide complete cloud service function on the premise of server-side without key, including uploading, downloading, previewing, searching, sharing and password recovery. Truprivacy technology ensures that users ' documents are accessible only to themselves, even by system developers and internal administrators. Security encryption is linked to the whole, not only in the cloud does not save the data plaintext, even the key is encrypted to save, so even if the server and source code are open to hackers, the scholar is not worried about data leakage.

Scholar will store the initiative of security into the hands of the user, six copies of the file, layer of protection, from the source of the total elimination of data security risks. Scholar Security Cloud Chairman Wang Donglin said that the scholar security cloud has found a new breakthrough, creating a seamless and closed security ring. Scholar Security Cloud will all the encryption and decryption operations from the server side to the client, the security key is only one person holding, even the system administrator can not touch. To prevent anyone else from seeing the data is our philosophy.

Scholar security Cloud to the domestic market

Look at today's cloud storage areas and find that there are Google, Amazon, Apple, Microsoft and other it bosses, domestic bat, Huawei, Lenovo and other industry giants, whether it is to do hardware or software, whether traditional companies or internet companies, have launched their own cloud storage services. Storing data information in the cloud without expensive onsite storage system costs is quite tempting for businesses that want to reduce their IT budget capital expenditures. However, despite the bright future, companies are still wary of using cloud storage today, with less than 1% of traditional large enterprises storing their files in the cloud. Security, availability, and performance are obstacles to an enterprise's overall embrace of cloud storage.

The scholar security Cloud began providing secure cloud storage services in 2012, breaking 10 million of its global users in less than 2 years. Scholar Security Cloud inherited the scholar Group for many years accumulated technology essence, by virtue of truprivacy cloud security technology, Surcloud cloud storage infrastructure and Visidoc cloud document technology three major innovation technology, in the global increasingly saturated cloud storage market has made its own territory.

Wang said that the former scholar security cloud business mainly in the United States and Europe, China is mainly responsible for technology research and development. However, with the growing development of the domestic cloud market, the scholar security cloud has shifted the focus of business to the home.

In the Chinese market, the scholar company provides the enterprise cloud disk and the private cloud two kinds of service. For SME users, scholars to provide enterprises cloud disk. At present, the scholar has reached a deep cooperation with 360, the scholar is responsible for product development, 360 is responsible for sales and promotion, the cloud has entered the test phase. For large enterprise users, the scholar provides private cloud services. "We also help large enterprises do private cloud construction. Many of the customers we are talking about are very big customers, "said Wang Dong-lin."

When talking about the relationship with 360, Youbing pointed out that the scholar and 360 do not have a competitive relationship, "security is divided into many levels, 360 is responsible for the network and operating system level of security, the scholar security cloud is based on these two layers, to provide data security." In other words, when the network and system are breached, the scholar security cloud encryption technology, can still protect the user's data is not leaked. 360 is our very close partner, we are the upstream and downstream relationship. They are the first lock, the lock outside, we do is another lock, two aspects are complementary relationship. ”

Wang Dong Lin pointed out that the scholar is a technology company, therefore, in the marketing aspect, the scholar will choose some has the good user basis the company to cooperate. "We are now in partnership with the century Interconnection, the promotion of our products, we have several other large partners, has formed a cooperative intention, they are basically listed companies." ”

At present, the scholar security cloud has become the global partner of Oracle and other well-known enterprises. At present, the scholar security cloud obtained the "Cloud Storage Excellence Award" issued by the US "cloud computing" magazine, and passed the American Hippa medical Information Security authentication, the United States FIPS federal information security authentication.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.