Trend Technology Cloud security 3.0– Cloud security, security cloud

Source: Internet
Author: User
Keywords Trend Technology cloud security through or
Trend Technology Cloud security 3.0– Cloud security, security cloud for a variety of cloud computing platform, Enterprise Data Center, Application service system to provide comprehensive protection

With the development of information technology, various types of cloud computing and cloud service platforms have become more and more widely seen in recent years, such as mail, search, maps, online transactions, social networking sites and so on. These cloud computing and cloud services are increasingly being used as a result of their own advantages such as convenience, extensibility, and savings.
But at the same time these "clouds" are also beginning to be the target of hackers or various malicious organizations and individuals for some kind of benefit. such as the use of large-scale botnet denial-of-service attacks (DDoS), the use of the operating system or the application of Service protocol vulnerabilities in the vulnerability attacks, or for the "cloud" of user privacy information malicious attacks, theft, illegal use, etc., a wide range of means. In addition, the composition of the "cloud" of various systems and applications are still facing the traditional stand-alone or intranet environment in the face of the various viruses, Trojans and other malicious software threats.

It is in order to effectively protect the various applications that constitute the cloud, the platform and Environment, as well as the sensitive and private data that users store in the cloud, are not compromised by threats such as infection, attack, theft, and illegal exploitation, and trend technology launched a new cloud Security 3.0 solution based on the core of trend technology cloud security technology in 2010.
Trend Technology Cloud Security 3.0 mainly from two aspects to the "cloud" protection. On the one hand, the "cloud shield" technology to protect all kinds of enterprise data Center/application system or cloud platform itself from viruses, attacks, system vulnerabilities and other threats, on the other hand, through the "cloud safe" technology to protect users in the cloud of privacy and data is not illegally stolen and exploited.

The Shield of the cloud

Comprehensive protection of simple systems from a single physical server or virtual server through integrated firewalls, intrusion prevention, application service protection, System integrity protection, virtual patches, malware, and dynamic integration with virtual environments (VMware, Ctrix, Hyper-V, etc.) To the enterprise's server cluster, data center, or various application service systems (such as Web, database, mail server, etc.), to a variety of cloud applications/cloud services platforms composed of multiple systems, multiple platforms, multiple applications, and a physical virtual hybrid environment.

The safe in the cloud

Through the advanced trend technology cloud Key management mechanism, the enterprise store in the cloud data encryption protection, so that enterprises can safely use the cloud platform to store or exchange data,

The core advantages of Cloud Shield technology

Unified management of Mixed platforms – comprehensive protection of more than 22 platforms and environments, including traditional operating systems such as Windows, Unix, Linux, and many other virtual environments, such as Vmware,microsoft Hyper-V, to fully protect from physical machines, virtual machines, to data centers, Cloud Center and other environments, for the enterprise IT construction of the gradual development of each stage to provide comprehensive protection at the same time, greatly reduced due to different stages of different protection management measures brought about by the high management costs. Service Application Protection Management – through intelligent active depth packet filtering, system integrity protection, intrusion protection and other technologies to protect more than 56 kinds of services and applications, such as Web, database, mail server and other services, as well as browsers, various media players, mail clients and other applications, free from viruses, trojans, zombie networks, The dangers of various threats such as hacker attacks. For enterprises from a variety of intranet applications, to form the data center of the various service systems to provide three-dimensional, comprehensive protection. Virtual patch technology-through advanced network layer virtual patch technology from the network layer to block and prevent attacks against vulnerabilities, provides a unified, first-release, immediate protection for a variety of operating systems, service systems, and application vulnerabilities to protect the enterprise against any security risks arising from the absence of a corresponding patch or failure to implement patches in a timely manner, This reduces the cost and risk of patch management and implementation while enabling the enterprise to be protected against various attacks and threats. Dynamic integration of virtual platform-through dynamic integration with virtual platform (such as VMware Vsphere/vmsafe), it can dynamically perceive the changes of virtual environment in virtual platform, such as new, Hibernate, migration, Therefore, it is effective to prevent the protection gap arising from the change of virtual environment and the protection weak point caused by the change of the periphery protection condition. At the same time, the optimal resource scheduling method is used to avoid the excessive occupancy of the virtual environment by traditional protection mode, so as to maximize the input-output ratio of virtual environment. Convenient Compliance management platform – through improved integration, the cloud's Shield technology organically integrates intelligent firewalls, intrusion prevention, active depth pack detection, and system integrity protection.   With the flexible policy management and rich log and report functions provided by trend technology products (such as deepsecurity), it is convenient for customers to achieve various compliance (Compliance) management.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.