Trend technology releases new enterprise threat management strategy
Source: Internet
Author: User
KeywordsCloud computing Trend technology
"51cto.com comprehensive report" trend technology in its hosting the "cloud computing security, high-end CIO Summit" and 2011 Enterprise Cloud Computing and Virtualization Security Strategy Conference, officially released a new enterprise threat management strategy, by threat warning, threat blocking, Threat protection and threat governance are composed of four threat management solutions. Based on this framework, trend science and technology threat Discovery equipment TDA Series products, network anti-virus wall NVW product series, web security Gateway IWSA product series, as well as the trend of science and technology experts on duty service EOG, to provide enterprises with visible, controllable and operable enterprise network and information threat management leading technical support and administration services, Reduce the threat generated information leakage and ensure the normal operation of the business. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height= ' 219 ' alt= ' "src=" http://images.51cto.com/ Files/uploadimg/20111011/1503520.jpg "width=" 351 "border=" 0 "/> Figure: Trend science and technology life cycle of enterprise threat management strategy framework for the new enterprise threat management strategy is the trend of science and technology in the depth of large and medium-sized enterprises in the first line of business, comprehensive analysis of the latest threat trends based on the integration of Trend Technology award-winning multi-level solutions and professional services of the security system, is the most advanced cloud era, Three-dimensional enterprise data Center network security management strategy. The strategy comprehensively addresses the three main issues and challenges faced by the Enterprise data Center in the cloud computing era: including the increasing speed of virus production, affecting the efficiency of core business response, and the high level of persistent threats (Advanced persistent threat,apt). Increase the likelihood of business data leaks, and the flow of virus within the enterprise from ubiquitous data access, providing a comprehensive and highly manageable information security solution. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height= ' 343 ' alt= ' "src=" http://images.51cto.com/ Files/uploadimg/20111011/1503521.jpg "width=" 610 "border=" 0 "/> Map: Trend Science and technology enterprise threat management strategy general topology as a cloud ERA enterprise threat management strategy, Trend technology defines the primary goal of security defense strategy to help enterprises realize the visibility, controllability and operability of the threat, through a series of advanced cloud security technology and management means to protect the enterprise data centerIn the complex and changeable cloud ERA information network environment, so as to help enterprises calmly and safely into the cloud, more focused on the cloud computing platform for the enterprise's core business benefits and opportunities. First, in the visibility and controllability of the threat, through the deployment of trend technology threat discovery System TDA, can help enterprises across security defense technology and management barriers, timely response to the proliferation of volatile network threat challenges and complex enterprise network management task requirements, in-depth discovery, specifically positioning network security threat events. With the latest "threat warning map function" provided by trend technology, enterprises will be able to pinpoint the exact location of threat events, display detailed data of the threat events and quickly discover the source and destination of the attack in the large intranet and branch offices. According to the "threat Early warning map" in different colors of the legend shows that the enterprise engineers can intuitively understand the current level of risk detection, at the same time, through the cloud linkage mechanism, in the trend of technology, such as anti-virus wall control products set block strategy to prevent the spread of the threat. In particular, the trend technology designed for the virtual environment of the flagship enterprise-class safety products deep security, can effectively avoid the "virus scanning storm", so as to ensure the security of the Enterprise Data center, to obtain the best return on investment. In the key security threat protection response and governance services, such as operational links, trend of science and technology through IWSA, IMSA and other anti-virus gateway, the threat will be eliminated outside the corporate network; On the other hand, through the effective management of terminals, can help enterprise customers to establish multi-level unified control of the protection. In addition to this complete set of threat management strategies, trend technology has also introduced specialist technical services, including "prior" safety and health inspection, operation and maintenance personnel training; 7x24-hour phone response support (MOC), virus event response processing, and "ex post facto" Improvement recommendations and improve the threat monitoring response process. This series of protective measures ultimately allows enterprise customers to obtain the most complete security protection capabilities of the cloud era. Trend Technology Cloud computing security provides from physical machines, virtual machine to the cloud infrastructure the current, trend technology, the latest "cloud Security 5.0" Overall solution can fully protect the data assets of more than 22 platforms and environments, its based on trend technology lifecycle Enterprise threat management strategy, can effectively protect from the physical machine, Virtual machines to cloud infrastructure, cloud data, cloud applications, and mobile devices and smartphones in mobile internet environments. Trend Technology 6 years of continuous investment in the establishment of the world's leading cloud computing security technology platform, will help enterprise users to accelerate into the cloud, more easily grasp the cloud computing wave of valuable business opportunities, while promoting the local cloud computing industry and the rapid development of the global synchronization. "Responsible editor: Watch Happiness TEL: (010) 68476606" Original: Trend technology release new enterprise threat management strategy return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.