Trend Technology Oscar: How Data Center security evolves

Source: Internet
Author: User
Keywords Mobile Internet Yahoo private cloud Cloud Oracle day-run facility Yahoo
Tags access anti- anti-virus business business innovation change cloud cloud base

December 12, the world's first large-scale conference to explore the industry Internet, 2014 CVW. The industry Internet conference was held in Beijing and was synchronized through the big screen of New York Times Square. The conference was made by the Asia Letter Group, the cloud base and the Chuang-Zhuang economic and Technological Development zone jointly hosted more than 5,000 global it and traditional industry leaders and elites who are concerned about the development of Internet and traditional industries, and explored the evolution of "Internet access to traditional industries", "traditional industry internet" and the technological model and business innovation of industrial Internet.

In the afternoon's "Network security @ Internet" Theme Forum, trend technology global research and development Greater China CEO Oscar brought the "evolving Data center Security" keynote speech.

The following is the full text of his speech:

Oscar: Good afternoon, everyone. I did security for a few years, the trend early to do anti-virus, then find a virus difficult. Because the virus sometimes has a regional, then for a virus to run to Mexico. I remember when people most often said, what kind of virus? People say that a person, more than 20 years old, no girlfriend, is silly, then did not think the world will become like this. This 20 I feel very deeply, never thought of a network security problem, I now speak of data center security.

Data center, over the years the entire data center, some people like to use cloud computing some people do not like, I feel indifferent. I think this is the evolution of the entire data center, from the beginning, especially in the past few years, the biggest problem is the concept of so-called virtualization, so that the whole IT environment is changing, the trend of this company is special, this year is the 26th year. 26 years after many different twists and turns, the so-called it change. The 95 internet age, to this day, we talk about the cloud era. In fact, every it change has a new point of contact, new contact points for people with new benefits. These new benefits will also be exploited by the bad guys. But so the whole process of change, is always a manufacturer or customer, this change is not to bring bad use? You say, yes, bring a new interest. Many times it is easier to think of new benefits, and today we see the concept of traditional physical machines and virtual machines. If you say, do not virtualize this thing. But because I didn't follow the architecture, you said I'm having a hard time with virtual machines, just seconds. But I pretended to be a anti-virus, but it was safe to drag me down.

Your virtual confidential extension, anti-virus, sometimes becomes very slow. Sometimes you can expand a lot, we use the virtual machine for a big reason, is that one day you say I use the public cloud, because you do not want to buy so many machines. In this process you have to consider the environment, so there are some times in your protection you have to pay attention to it, we think of course, we generally look at the industry. We think we're talking about the entire data center today, and we think the whole change over the years, and of course the last step probably hasn't come up yet, and I think some people should be taking the first step now. The first step is virtualization, as long as we have a machine, all the servers are only used 15%,85% there is no use, in order to save energy and reduce emissions we use 90%, generally we can not use 90%, but 80% is possible. So at first we found that the physical server was over there, and of course someone did the virtual desktop, but I didn't think the virtual desktop was as direct as the data desktop. I am a personnel and research and development department, I mix together. Because now the network situation has changed, I build a data center in every place, I can concentrate, let it share. This sharing process began to appear in the so-called multi-tenant, is this person I know? Research and Development department said you put my information with the administration of the together, this is wrong, my code is very important. This time will appear the so-called multi-tenant, and finally use the software method to solve.

This time, the discovery of virtual networks, virtual storage, this path does not seem to block, and finally become the software definition of the data center. All hardware is done with the most standard hard drive, such as X86, so cost is a big consideration. In terms of trends, what you call a data center in research and development, you have to think about how you can see safe technology and core technology change in the course of this time. Of course the second to match, because from security, do security inside the customer generally will talk about your cost, I was attacked when I pay the price is? The second cost, I manage the cost of earlier anti-virus, this software deployment, I let the customer a one installed, sometimes the customer did not update, later management costs become a lot. Now if we say that there are three changes from the data center, how does the security product fit in with the management? At this point the trend presents four concepts, which we call four.

The first is efficiency, and traditional safety products include our own products. In fact, the new concept is like this, we came across a very simple concept, I want to say, we have the machine virtualization. You can have 10 servers, now use only one to 10 operation, you do not use 10 units. At this time, someone asked, since I have 10 units, there is no only installed a set of anti-virus software, because the traditional method to install 10 sets. Do firewalls need to be installed, or do you want to do a path detection? There is nothing in this concept. But at first everyone asked, is there a way? The trend was the first to ask this question, and we met a virtualization vendor who was willing to work with us. We turned out to be saying, is there a way? The industry later had a name called agentless security. I am now 10 physics machines, I just want to install a set. Its biggest advantage, it itself for memory for the hard drive, you want to install 20 anti-virus, 20 sets of virus library, now as long as a set, from the virtual machine density aspect, your scan will also be faster, speed will also become faster. The most important network update, you may 20 sets to update 20 sets, now become you just update a set can be solved, this is the concept of agentless.

Actually this concept now, you do virtualization security, this is the only standard, this concept is really good. The second thing you need to perceive, because we used to do anti-virus, often encountered a problem, early no agentless concept. Often encountered a problem, our customers with virtualization, customer poisoning we help him check. Suddenly found, the machine suddenly disappeared. In fact, there is a big problem, you are missing, at that time may be the machine has been turned off. Because the virtual machine can also be closed, at that time is an outsourced staff. You do a good job of data center security, itself with your system, basically if your machine, for example, when the machine is gone, safety to follow. This is automatically followed, you do a safe solution, it itself with the system to connect, the main you do not need to spend too much time to deploy.

The following is the software, the virtual machine in the process of hardware basically, because the virtual inside a new security. Between the basic network, you consider the mutual attack between the virtual, the hardware itself maintenance cost is not very high, I think it's elasticity will be weaker. The more important point is that to consider your own safe solution, it is a software. Because it is better, the first general software now, the equivalent of his X86 can be, the basic relative maintenance cost is lower. When it comes to SDN, the SOFTWARE is in SDN and he will automatically help you configure it. Data center management costs are high and are now the most annoying thing for customers. In the tradition above, I tell you that security is very wide, security itself is a very wide, but security inside a lot of problems need to be coordinated by various vendors, but it is difficult. Many people are speaking, because our industry has a product called Siem, our company for so long, anti-virus just understand a little. Many people say you speak the path, I said the path is completely ignorant. It's not easy for you to know everything. If there is a good platform, at least let these security products on the above can do some interaction.

This is VMware's SDN platform, called the NSX, is a management platform that allows safe product simplification. But more importantly, we can get the security products inside, and we all work together. I think collaboration is a very important concept, if each product can collaborate, still have its value. Efficiency, perception, software and the last platform, trend technology we are a product, the original design of this product, we have been doing from the physical machine, the public cloud private cloud can use the same product. We do firewall is not the same, our firewall is the host system firewall, so basically relatively simple. We worked with VMware at that time, and the VMware platform was the first to be made in the world. What do you do besides VMware? We also do Huawei, we are probably all over the world. Huawei is absolutely hundred agent, we also with some public cloud, I just said that product directly bought, you have been using the public cloud no problem. We have cooperation with Ali and Tencent. This is a market positioning, we now have a lot of customers in the country. Because buy this thing, many of my customers buy, at different stages to buy, I have a customer is the operator, he started for the physical machine to buy, but about 90% customers, most of them because of our virtualization began to slowly use this product. I'll talk about it today, thank you.

(Responsible editor: Mengyishan)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.