Telecom operators extended Cloud security practice

Source: Internet
Author: User
Keywords Cloud security practice telecom operators cloud security practice telecom operators
With the cloud computing in various areas of the attempt and landing, cloud based security services have been from the conceptual phase of the transition to the completion and promotion phase. In this situation, the three major operators in China to carry out cloud security practice. China Mobile's "big Cloud", the Chinese telecom's DDoS attack defense business platform and the safe fast lane business, are the cloud computing and the cloud security beneficial practice, has opened up the new business model. China Unicom also began the practice of cloud computing since 2009, and research on cloud security has been deepening.





Cloud security technology makes the Internet more secure





now generally discussed cloud security mostly refers to the application of cloud computing technology in the security field. Cloud security through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the server for automatic analysis and processing, and then the virus and Trojan solution distributed to each client. The entire internet, has become a super big "antivirus software".





Cloud Security technology is the result of hybrid development and natural evolution of Peer-to-peer technology, grid technology, cloud computing technology and other distributed computing technologies. The concept of cloud security has been raised for a wide range of controversies, and many people consider it a pseudo proposition. But the facts speak louder than words, the development of cloud security "like a gust of wind," Rising, Trends, Kaspersky, McAfee, Symantec, Jiangmin Technology, Jinshan, 360 security guards have launched a cloud security solutions.





future anti-virus software will not be able to effectively handle the increasing number of malicious programs. The main threat from the Internet is from computer viruses to malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time. The entire internet is a huge "anti-virus software", the more participants, the more secure each participant, the entire Internet will be more secure.





Cloud computing, cloud security development faces many challenges





However, the security threats faced by enterprises in cloud computing are very numerous, including the following four aspects. First of all, a large number of rapidly emerging web security vulnerabilities, compared with the traditional C/s system security vulnerabilities, multiple customers, virtualization, dynamic, business logic services Complex, user participation, such as the characteristics of these cloud services to network security means a great challenge, or even disaster. The second is denial of service attack DDoS. In the technology environment of cloud services, the key core data, services in the enterprise leave the Enterprise network, migrate to the Cloud service center, more application and integration business begin to rely on the Internet, the consequence and destruction of denial of service will obviously surpass the traditional enterprise network environment. Again internal data leaks and abuses. Enterprise's important data and business applications in the cloud service provider's IT system, how to ensure that the cloud provider's own internal security management, how to avoid the cloud computing environment in the potential risk of multiple customer coexistence, these are the cloud computing environment users of the most serious security concerns or challenges. Finally, potential contract disputes and legal proceedings. Cloud services contracts, service providers ' SLAs and it processes, security policies, event handling, and analysis may be imperfect; In addition, the uncertainty of physical location and the complexity of international laws and regulations caused by virtualization make potential contract disputes and legal lawsuits become the major challenges of exploiting cloud services.





another angle, for telecom operators operating cloud security, there are two very real problems and challenges: how to enter into an appropriate and reasonable SLA agreement with the customer; the second is how to avoid the price war, which is not only a business model (business model) problem , regardless of the type of billing model (pay per use or pay/month), there is a challenge to the forward benefits-users are more likely to be less expensive services. How to persuade users to buy a better rather than cheaper service is something that telecom operators must think about.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.