Telecom operators extended Cloud security practice
Source: Internet
Author: User
KeywordsCloud security practice telecom operators
As cloud computing tries and lands in various fields, cloud based security services have transitioned from the conceptual phase to the perfect and the promotion phase. In this situation, the three major operators in China to carry out cloud security practice. China Mobile's "big Cloud", the Chinese telecom's DDoS attack defense business platform and the safe fast lane business, are the cloud computing and the cloud security beneficial practice, has opened up the new business model. China Unicom also began the practice of cloud computing since 2009, and research on cloud security has been deepening.
Cloud Security technology makes the Internet more secure
The cloud security generally discussed now is mostly about the application of cloud computing technology in the security field. Cloud security through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the server for automatic analysis and processing, and then the virus and Trojan solution distributed to each client. The entire internet, has become a super big "antivirus software".
Cloud Security technology is the result of hybrid development and natural evolution of Peer-to-peer technology, grid technology, cloud computing technology and other distributed computing technologies. The concept of cloud security has been raised for a wide range of controversies, and many people consider it a pseudo proposition. But the facts speak louder than words, the development of cloud security "like a gust of wind," Rising, Trends, Kaspersky, McAfee, Symantec, Jiangmin Technology, Jinshan, 360 security guards have launched a cloud security solutions.
Future Antivirus software will not effectively handle the growing number of malicious programs. The main threat from the Internet is from computer viruses to malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time. The entire internet is a huge "anti-virus software", the more participants, the more secure each participant, the entire Internet will be more secure.
Cloud computing, cloud Security development challenges
However, there are a number of security threats to cloud computing in the enterprise, including the following four areas. First of all, a large number of rapidly emerging web security vulnerabilities, compared with the traditional C/s system security vulnerabilities, multiple customers, virtualization, dynamic, business logic services Complex, user participation, such as the characteristics of these cloud services to network security means a great challenge, or even disaster. The second is denial of service attack DDoS. In the technology environment of cloud services, the key core data, services in the enterprise leave the Enterprise network, migrate to the Cloud service center, more application and integration business begin to rely on the Internet, the consequence and destruction of denial of service will obviously surpass the traditional enterprise network environment. Again internal data leaks and abuses. Enterprise's important data and business applications in the cloud service provider's IT system, how to ensure that the cloud services themselves within the securityFull management, how to avoid the potential risks of multiple customer coexistence in a cloud computing environment, is one of the most serious security concerns or challenges for users in a cloud computing environment. Finally, potential contract disputes and legal proceedings. Cloud services contracts, service providers ' SLAs and it processes, security policies, event handling, and analysis may be imperfect; In addition, the uncertainty of physical location and the complexity of international laws and regulations caused by virtualization make potential contract disputes and legal lawsuits become the major challenges of exploiting cloud services.
to put it another way, for telecom operators carrying out cloud security, there are two very real problems and challenges: how to enter into an appropriate and reasonable SLA agreement with the customer; the second is how to avoid forward to the price war, this is not just a business model (business model , regardless of the type of billing model (pay per use or pay/month), there is a challenge to the forward benefit--the user prefers a cheaper service. How to persuade users to buy a better rather than cheaper service is something that telecom operators must think about.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.