Trend technology "cloud security" 2.0 national tour launch

Source: Internet
Author: User
Keywords Trend technology Cloud Security 2.0
Tags analysis analysis technology channel cloud cloud security cloud security 2.0 content content security
Recently, as the global Internet content security leader trend of science and technology launched the Cloud Security 2.0 national tour activities. It is reported that the event in Guiyang on July 29 kicked off, will last 1 months, in the country to hold a number of topics for "Rethink your Terminal Security" Cloud Security 2.0 seminar, the exhibition will be for enterprise users, channel partners will cover Beijing, Shanghai, Tianjin, Shenzhen, Chengdu, Kunming, Nanjing and other 16 cities.





It is understood that the exhibition on the 09 network security threats of new trends, the trend of technology cloud Security 1.0 to 2.0, from the gateway to the end of the new and old two generations of security protection technology advantages and user value detailed. The exhibition will also launch a comprehensive multi-Protocol association analysis technology and file reputation Technology Cloud Security 2 multi-level terminal security solutions, and at the event site to invite old customers to share experience, targeted to help enterprises in the financial crisis environment to reduce network security risks and management costs, enhance ROI.




As the most basic component node of the enterprise network,
is the target of hackers and virus makers because it stores a lot of sensitive data. Trend Technology visited the global 1000 CIO, and its corporate network terminals for security checks, found that the terminal is not only the network threat attacks, but also because of its internal staff, so in security protection, management has become difficult, resulting in the enterprise network is the most vulnerable. According to the trend of science and technology global Anti-Virus research and Technical Support Center statistics:


today, network threats increase at a rate of 1 new viruses every two seconds;


Enterprise Terminal Memory will therefore be occupied at a 3mb/-month rate to store constantly updated virus codes;

The
each virus code deploys to 1000 terminals to need at least 4 hours, during this period, the terminal cannot obtain the timely protection.





according to the U.S. Osterman study, "Cloud Client Enterprise Security Impact Assessment Report," In today's threat environment, a company with 5,000 employees, in the case of traditional terminal protection has been deployed, 2/3 of the end of a year will still be infected, The company will lose 2503200 yuan of the cost of the threat to clean up and pay staff productivity. At the same time, because the threat can not locate the source of infection, the virus will continue to repeat the infection in the corporate network, resulting in the loss of enterprises are constantly magnified!





This allows enterprise users to rethink their own terminal security!





Oscar, Global senior vice president of trend technology and general manager of Greater China, said: "Cloud Security 2.0 has increased the application of file reputation technology and multi-protocol correlation analysis technology, so that the file reputation technology (FRT) and the Web reputation Technology (WRT), mail reputation Technology (ERT) to achieve relevance and interaction, To provide customers with a more secure and effective protection shield, which is absolutely a major change in the management of Terminal system security and resource release. ”





Trend Technology Anti-Virus Wall network version OfficeScan 10 as a trend of the classic products, the success of Cloud Security 2.0 in the File Reputation technology (FRT), with Cloud Security 1.0 web reputation Technology (WRT) integration. File reputation technology relies on the huge cloud threat database, users to access the file before accessing the credibility of the file to prevent malicious files download access. 34000 Server Cloud to complete the query in milliseconds, to help enterprises achieve 0 jet lag virus update, 0 time virus code deployment, 0 resources occupy the growth of three "0" Protection!





Cloud Security 2.0 Multi-Protocol association analysis technology can be used in nearly hundred common protocols for intelligent analysis, by monitoring the enterprise network of various abnormal behavior, tracking the threat initiator, locate the threat of infection source. Based on the trend of the technology development, the device TDA, using threat correlation analysis, multi-protocol correlation analysis to locate the infection source quickly, discover the unknown threat or security management problem in the Enterprise network, and provide management service for the enterprise network through the interaction with the trend Science and Technology Monitoring Center (MOC). Thus, a complete set of threat Discovery System (TDS) is formed to provide the first time for enterprise users to respond to the strategy.





trend technology with 3.5 of the time for cloud security research and development, a total of more than 400 million U.S. dollars to build 34000 servers to form a huge cloud. Now, including the country's largest banking institutions, the world's largest manufacturers of notebook hinges and China's important government departments have begun to enjoy the trend technology cloud security technology to bring convenience. Trend technology from Cloud Security 1.0 to Cloud Security 2.0 perfect upgrade, not only realized from the "terminal → Gateway", "terminal → Cloud", "Gateway → Cloud" multi-layer defense system, and simplified the application and management of the difficulty, so difficult to control the security management becomes simple and controllable, gateway to the terminal multi-layer Network security defense system, For the enterprise to build a seamless network security defense system.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.