Trend Technology secure cloud Cloud Security Network protection Solution White Paper

Source: Internet
Author: User
Keywords Trend Technology reputation service
Tags access analysis analysis technology automatic behavior block client cloud
The web threat is rampant, the traditional protection method is far from enough

The popularity of Web 2.0 and the growing use of exploitable vulnerabilities, limitless networks and a mobile workforce have exacerbated the web threat.

The findings of this observation are confirmed by the discovery of TrendLabs, a global network of trend technology research, services and support centers. From 2005 to the first two quarters of 2008, TrendLabs reported a 1,731 increase in web threats. TrendLabs predicts that if the number of threats continues to grow at the current rate, there will be 233 million unique threats in 2015. Each hour endpoint system needs to detect more than 26,598 new types of threats. These figures amply demonstrate that traditional methods of tracking the daily threat incidence and then releasing timely security updates are far from enough.

Figure

Signature based solutions-traditional approaches are obsolete

The work involved in the traditional protection of evil pieces involves the collection of bad samples, the development of signatures and the rapid release of these signatures to the user. Since many network threats are targeted joint attacks, it is almost impossible to collect samples. Moreover, a growing number of variants use delivery tools (such as spam, instant messaging, and network threats) to make standard sample collection, signature creation, and deployment no longer fully effective.

The fundamental differences between viruses and evolving network threats also pose challenges to traditional virus detection processes. At first the virus was designed to spread as fast as possible, so it was easy to find. With the advent of cyber threats, the evil pieces have evolved from burst patterns to covert "sleep-type" infections, making traditional protection techniques more difficult to detect.

New way--trend technology secure cloud Cloud security Network protection solution

Figure

Because traditional security solutions are no longer adequately protected against growing web threats, users need a new approach. Trend Technology secure cloud Cloud Security Network protection solution is such a way to emerge.

Trend Technology secure cloud Cloud Security Network protection solution is a next-generation cloud-client content security infrastructure that, in contrast to traditional approaches, can be used to intercept new threats before they reach the user's computer or corporate network, making security more intelligent.

The core of this technology architecture is beyond the traditional approach of intercepting web threats, the Cloud Client security architecture built on Web reputation Services (WRS), mail reputation Service (ERS), and File Reputation service (FRS). By saving most signature files to an Internet cloud database and keeping them at the bottom of the endpoint, trend technology can intercept web threats before they reach the end user or corporate network. This new approach lowers the bandwidth consumption of customer networks and endpoints, providing faster and more comprehensive, timely protection. Trend Technology Cloud Security leverages the company's 20-year-old in-house products and managed solutions that have effectively protected millions of of customers, bringing the anti-virus war into the cloud.

At present, the trend of technology "cloud Security (Securecloud)" Quality:

Global 5 data centers, tens of thousands of online servers

99.9999%+ Operation Guarantee

Average 5 billion strokes per day

Collect and analyze 250 million samples per day

Database first hit 99%

Handle more than 1.2TB data per day

Block 8 million-10 million infections every day

More than 1000 security experts worldwide

Trend Technology secure cloud cloud Security Network protection solutions include the following 6 great killer:

Web Reputation Services

e-mail Reputation service

File Reputation Service

Behavioral Correlation Analysis Technology

Automatic feedback mechanism

Threat Information Rollup

Figure

Web Reputation Services

Web reputation service is a key component of the trend technology secure cloud Cloud Security Network protection solution, defending it against a Web or user's computer before it threatens the network. Web reputation Service assigns a relative credit score to a web domain as well as a page within a domain, scoring according to a variety of factors, including web pages, historical address changes, and other factors that may reveal suspicious behavior. The technique then makes a progress assessment through the behavior analysis of the bad parts, supervises the network traffic and identifies any evil activities from the domain. Trend Technology web Reputation service also performs web site content crawling and scanning, complementing analysis of known malicious or infected networks. Then, according to the network domain reputation score to block access to malicious Web pages. To reduce false positives and improve accuracy, trend-tech web-reputation services specify credibility for specific Web pages or links rather than the entire site, because sometimes only part of the legitimate Web site is compromised.

Figure

Figure

e-mail Reputation service

e-mail reputation technology is an extra layer of protection that can intercept up to 80% of e-mail threats, including emails containing links to dangerous web sites, to prevent these threats from reaching a network or user's computer. By the sender's IP address, the malicious e-mail message will be intercepted in the cloud, preventing the threat from reaching the network or user's computer. The credibility of the situation will be constantly updated to ensure that after the removal of infected zombies to restore good reputation and legitimate e-mail received.

File Reputation Service

In addition to network and email reputation Services, the trend technology secure cloud Cloud Security Network protection solution will also take full advantage of file reputation services. Cyber criminals often move a single file containing malicious content from one Web site to another to avoid the discovery of the file, making the document reputation check a critical factor in the Web 2.0 world.

Behavioral Correlation Analysis Technology

Trend Science and technology cloud security using the "relevance technology" of behavioral analysis, the threat activities are combined to determine whether they belong to malicious behavior. A single activity on the Web threat does not seem to hurt, but if you do multiple activities at the same time, it can lead to malicious results. It is therefore necessary to determine whether there is a real threat in terms of heuristics, and to examine potential threats to the interrelationships between different components. By associating different parts of the threat and constantly updating its threat database, trend technology has a prominent advantage of being able to respond in real time and provide timely and automatic protection for e-mail and web threats.

Automatic feedback mechanism

Trend technology Another important component of cloud security is the automatic feedback mechanism, which enables continuous communication between trend technology products and the company's 24x7 Threat Research center and technology in a two-way update stream. By examining the routing reputation of individual customers to identify new threats, the trend-wide global automated feedback mechanism functions much like the "neighbourhood-supervised" approach adopted by many communities today, and the realization of real-time detection and timely "common intelligence" protection will help to establish a comprehensive and up-to-date threat index. Each new threat found by a single customer's regular credit check automatically updates trend technology's global threat database, preventing future customers from encountering a threat that has been identified.

Because the threat data will be collected according to the credibility of the communication source rather than the specific communication content, there is no problem of latency, and the privacy of the customer's personal or business information is protected.

Threat Information Rollup

Researchers from the United States, the Philippines, Japan, France, Germany and China will supplement the feedback and submissions of trend technology. In the trend technology antivirus research and Support Center trendlabs, staff in various languages will provide real-time response, 24/7 of all-weather threat monitoring and attack defense to detect, prevent and eliminate attacks.

Trend technology combines various technologies and data collection methods-including "honeypot", web crawlers, customer and partner content submissions, feedback loops, and trendlabs threat research-to get information on the latest threats. Threat data is analyzed through the malware database in trend technology cloud security and the TrendLabs research, service and Support Center.

How is cloud security different from other vendors?

Compared to other vendors ' cloud security

Domestic manufacturers have issued a "cloud security" program is actually a use of terminal products to do the client's malicious program collection and automated analysis system, it is similar to the trend of technology hosted discovery service, but it does not provide a service commitment, is a kind of free service, it compared with our securecloud, Has the following characteristics:

1, still does not break through the code compared to the traditional technology, can not effectively solve the dynamic proliferation of security threats;

2, response speed is still limited by the process of code production problems;

3, not in the threat to arrive before the source to be stopped, is still close to hand-to-hand combat;

4, just code production process optimization.

Trend Science and technology Securecloud Cloud security is to use a variety of ways to collect data information to dynamically analyze malicious threats, generate a dynamic reputation library, and through behavioral correlation analysis technology, establish a variety of reputation Library Association, when the user access to target information, can quickly from the reputation of the library to obtain security access suggestions, Block the intrusion of the risk from the source side. At the same time, Securecolud provides the system automatic feedback mechanism, lets the ordinary user on one hand become the service to enjoy, on the other hand becomes the service contributor.

Trend technology in the credibility of services provided by the most comprehensive, not only the Web reputation, mail reputation and file reputation services, and based on the behavior of the association analysis, security subsystem and our cloud security platform has a feedback mechanism to help all users to prevent the latest security threats.

Other security vendors, due to the late start, in the credibility of the service has not yet established a complete system, is still in the stage of perfecting the architecture.

Figure

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.