Trend Technology Cloud Security Network protection solution

Source: Internet
Author: User
Keywords nbsp Trend Technology
Tags access analysis analysis technology automatic based behavior block client
Traditional protection methods Obsolete

Reading:
I. Web threats are rampant and traditional methods of protection are far from enough
Ii. Signature based solutions-traditional approaches are obsolete
Iii. New way--trend technology secure cloud Cloud security Network protection solution
Iv. How is our cloud security different from other security vendors?
V. Free to try cloud security services? Internet worry-free electronic eye web Threat Defense Tool free download

Ⅰweb threat is rampant, traditional protection methods are far from enough

The popularity of Web 2.0 and the growing use of exploitable vulnerabilities, limitless networks and a mobile workforce have exacerbated the web threat.


The findings of this observation are confirmed by the discovery of TrendLabs, a global network of trend technology research, services and support centers. From 2005 to the first two quarters of 2008, TrendLabs reported a 1,731 increase in web threats. TrendLabs predicts that if the number of threats continues to grow at the current rate, there will be 233 million unique threats in 2015. Each hour endpoint system needs to detect more than 26,598 new types of threats. These figures amply demonstrate that traditional methods of tracking the daily threat incidence and then releasing timely security updates are far from enough.

Ⅱ. Signature based solutions-traditional approaches are obsolete

The work involved in the traditional protection of evil pieces involves the collection of bad samples, the development of signatures and the rapid release of these signatures to the user. Since many network threats are targeted joint attacks, it is almost impossible to collect samples. Moreover, a growing number of variants use delivery tools (such as spam, instant messaging, and network threats) to make standard sample collection, signature creation, and deployment no longer fully effective.

The fundamental differences between viruses and evolving network threats also pose challenges to traditional virus detection processes. At first the virus was designed to spread as fast as possible, so it was easy to find. With the advent of cyber threats, the evil pieces have evolved from burst patterns to covert "sleep-type" infections, making traditional protection techniques more difficult to detect.

Ⅲ. New way--trend technology secure cloud Cloud security Network protection solution

Because traditional security solutions are no longer adequately protected against growing web threats, users need a new approach. Trend Technology secure cloud Cloud Security Network protection solution is such a way to emerge.
Trend Technology secure cloud Cloud Security Network protection solution is a next-generation cloud-client content security infrastructure that, in contrast to traditional approaches, can be used to intercept new threats before they reach the user's computer or corporate network, making security more intelligent.
The core of this technology architecture is beyond the traditional approach of intercepting web threats, the Cloud Client security architecture built on Web reputation Services (WRS), mail reputation Service (ERS), and File Reputation service (FRS). By saving most signature files to an Internet cloud database and keeping them at the bottom of the endpoint, trend technology can intercept web threats before they reach the end user or corporate network. This new approach lowers the bandwidth consumption of customer networks and endpoints, providing faster and more comprehensive, timely protection. Trend Technology Cloud Security leverages the company's 20-year-old in-house products and managed solutions that have effectively protected millions of of customers, bringing the anti-virus war into the cloud.
At present, the trend of technology "cloud Security (Securecloud)" Quality:
 Global 5 data centers, tens of thousands of online servers
99.9999%+ Operation Guarantee
 5 billion strokes per day
 collect and analyze 250 million samples per day
 first hit 99% on the database
 handle more than 1.2TB data per day
 Block 8 million-10 million infections per day
 more than 1000 security experts worldwide

Trend Technology secure cloud cloud Security Network protection solutions include the following 6 great killer:
Web Reputation Services
e-mail Reputation service
File Reputation Service
Behavioral Correlation Analysis Technology
Automatic feedback mechanism
Threat Information Rollup

Web Reputation Services

Web reputation service is a key component of the trend technology secure cloud Cloud Security Network protection solution, defending it against a Web or user's computer before it threatens the network. Web reputation Service assigns a relative credit score to a web domain as well as a page within a domain, scoring according to a variety of factors, including web pages, historical address changes, and other factors that may reveal suspicious behavior. The technique then makes a progress assessment through the behavior analysis of the bad parts, supervises the network traffic and identifies any evil activities from the domain. Trend Technology web Reputation service also performs web site content crawling and scanning, complementing analysis of known malicious or infected networks. Then, according to the network domain reputation score to block access to malicious Web pages. To reduce false positives and improve accuracy, trend-tech web-reputation services specify credibility for specific Web pages or links rather than the entire site, because sometimes only part of the legitimate Web site is compromised.


e-mail Reputation service
e-mail reputation technology is an extra layer of protection that can intercept up to 80% of e-mail threats, including emails containing links to dangerous web sites, to prevent these threats from reaching a network or user's computer. By the sender's IP address, the malicious e-mail message will be intercepted in the cloud, preventing the threat from reaching the network or user's computer. The credibility of the situation will be constantly updated to ensure that after the removal of infected zombies to restore good reputation and legitimate e-mail received.

File Reputation Service

In addition to network and email reputation Services, the trend technology secure cloud Cloud Security Network protection solution will also take full advantage of file reputation services. Cyber criminals often move a single file containing malicious content from one Web site to another to avoid the discovery of the file, making the document reputation check a critical factor in the Web 2.0 world.

Behavioral Correlation Analysis Technology

Trend Science and technology cloud security using the "relevance technology" of behavioral analysis, the threat activities are combined to determine whether they belong to malicious behavior. A single activity on the Web threat does not seem to hurt, but if you do multiple activities at the same time, it can lead to malicious results. It is therefore necessary to determine whether there is a real threat in terms of heuristics, and to examine potential threats to the interrelationships between different components. By associating different parts of the threat and constantly updating its threat database, trend technology has a prominent advantage of being able to respond in real time and provide timely and automatic protection for e-mail and web threats.

Automatic feedback mechanism

Trend technology Another important component of cloud security is the automatic feedback mechanism, which enables continuous communication between trend technology products and the company's 24x7 Threat Research center and technology in a two-way update stream. By examining the routing reputation of individual customers to identify new threats, the trend-wide global automated feedback mechanism functions much like the "neighbourhood-supervised" approach adopted by many communities today, and the realization of real-time detection and timely "common intelligence" protection will help to establish a comprehensive and up-to-date threat index. Each new threat found by a single customer's regular credit check automatically updates trend technology's global threat database, preventing future customers from encountering a threat that has been identified.
Because the threat data will be collected according to the credibility of the communication source rather than the specific communication content, there is no problem of latency, and the privacy of the customer's personal or business information is protected.

Threat Information Rollup
Researchers from the United States, the Philippines, Japan, France, Germany and China will supplement the feedback and submissions of trend technology. In the trend technology antivirus research and Support Center trendlabs, staff in various languages will provide real-time response, 24/7 of all-weather threat monitoring and attack defense to detect, prevent and eliminate attacks.
Trend technology combines various technologies and data collection methods-including "honeypot", web crawlers, customer and partner content submissions, feedback loops, and trendlabs threat research-to get information on the latest threats. Threat data is analyzed through the malware database in trend technology cloud security and the TrendLabs research, service and Support Center.

Ⅳ How is our cloud security different from other vendors?

Compared to other vendors ' cloud security

Domestic manufacturers have issued a "cloud security" program is actually a use of terminal products to do the client's malicious program collection and automated analysis system, it is similar to the trend of technology hosted discovery service, but it does not provide a service commitment, is a kind of free service, it compared with our securecloud, Has the following characteristics:
1, still does not break through the code compared to the traditional technology, can not effectively solve the dynamic proliferation of security threats;
2, response speed is still limited by the process of code production problems;
3, not in the threat to arrive before the source to be stopped, is still close to hand-to-hand combat;
4, just code production process optimization.
Trend Science and technology Securecloud Cloud security is to use a variety of ways to collect data information to dynamically analyze malicious threats, generate a dynamic reputation library, and through behavioral correlation analysis technology, establish a variety of reputation Library Association, when the user access to target information, can quickly from the reputation of the library to obtain security access suggestions, Block the intrusion of the risk from the source side. At the same time, Securecolud provides the system automatic feedback mechanism, lets the ordinary user on one hand become the service to enjoy, on the other hand becomes the service contributor.

Trend technology in the credibility of services provided by the most comprehensive, not only the Web reputation, mail reputation and file reputation services, and based on the behavior of the association analysis, security subsystem and our cloud security platform has a feedback mechanism to help all users to prevent the latest security threats.
Other security vendors, due to the late start, in the credibility of the service has not yet established a complete system, is still in the stage of perfecting the architecture.



Ⅴ Free to try cloud security services? Internet worry-free electronic eye web Threat Defense Tool free download
To help defend against the ever-changing web attacks, trend technology provides your innovative web threat Defense tool--the internet-free electronic eye, which is free to download and use regardless of whether you are a trend-tech enterprise or an individual user. The tool builds web reputation services (WRS) that can be installed to intercept malicious links, effectively and completely against zero-error web attacks, and also provides and zombie program monitoring capabilities

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.