Take you to know cloud computing, cloud security, Cloud Security 2.0

Source: Internet
Author: User
Keywords Cloud
At present, cloud security has become a hot topic in the information security world. With the development of the security situation, the connotation of cloud security has been evolving, and new technologies and schemes have been integrated clouds the concept of security. For enterprise users, with the entire new generation of cloud Security 2.0 of the technology system gradually surfaced, the user's own security defense deployment also followed by a new change: the use of cloud technology to promote terminal security defense has become a brand-new experience.


  


when it comes to cloud Security 2.0, insiders understand that the emergence of any new technology is not an overnight occurrence. For security deployments, the current Cloud Security 2.0 system is upgraded from the traditional cloud security solution, through the addition of cloud client file reputation technology, threat discovery management technology, terminal security management technology, the new Cloud Security 2.0 technology system to the enterprise user's terminal security and response more in place.


  


aspect One: Cloud Client file Reputation technology


  


previous trend technology China general manager Oscar in an exclusive interview with this newspaper that the cloud client file reputation represents the popular anti-malware processing technology in the past 25 years a fundamental change. In the final analysis, the root cause of this technology is to deal with the new and malicious threats, which are massive threats.


  


Ping, general manager of Barracuda China, said a massive threat is a new type of threat characterized by exponential growth in numbers, which needs to be identified and handled by Anti-malware Protection solutions to ensure that users are protected without affecting normal business activities.


  


according to IDC statistics, as of the beginning of 2009, the world will add about 850 new malicious software per hour. This number is expected to continue to rise by 2015, with 26,000 new malware per hour.


  


"In view of this, enterprise users urgently need a new anti-malware protection infrastructure, which can successfully deal with the emergence of a large amount of threats, to avoid damage to their own, and to minimize the impact of this malware on business operations." In other words, the cloud client file reputation technology has emerged. Oscar said.


  


The reporter's view is that the current cloud client file reputation also belongs to a type of file reputation, or called blacklist interception mechanism. This technology uses traditional Anti-malware protection and defines anti-malware in the cloud to reduce the impact of overlapping and increased transmission patterns on customer networks.


  


In fact, cloud client file reputation technology separates files from client scans, ensuring that scanning services can be looked up through the network so that local cloud scanning services, or scanning services across the Internet, can work as much as possible. This also solves the problem of extending the number of information updates to a large number of terminal systems in the network. Once the new content is updated on the scan server, all enterprise users can be protected immediately through the scan server.


  


in general, the mainstream security vendors will have many types of file reputation technology, the different products of the file reputation technology is not the same, but the technology fully utilizes the cloud security based threat protection storage information and efficient client intelligent filtering, So all the file reputation technology belongs to Cloud Security 2.0 category


123 Next

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.