Uncovering the secret veil of security technology "0" distance face the clouds behind the halo security

Source: Internet
Author: User
Keywords Cloud security Cloud computing
Tags anti- anti-virus antivirus market application applications based beginning business



picture 1: Rising engineer Tao





Picture 2: Trend Technology Global Senior Vice president and Greater China general manager Oscar





Photo 3:websense technical Advisor Chen Shi


Core tip: From 2008 to 2009, the security market for "cloud security" in pursuit of the culmination. A variety of concepts of "cloud security" from the sky, and then from the concept of rapid evolution into products, "cloud security" market process seems to have surpassed any previous it technology. However, the "cloud" of the aura instead of the security technology itself put on too many mysterious veil, "cloud security" in the end is what? Is it really ripe? What business opportunities does it bring?

       from 08 to 09, the information security market was the culmination of a "cloud security" pursuit. All kinds of saying "cloud security" from the sky, and then from the concept of rapid evolution into various products, "cloud security" market process seems to have surpassed any previous it technology. However, the "cloud" of the aura instead of the security technology itself put on too many mysterious veil, "cloud security" in the end is what? Is it really ripe? What business opportunities does it bring? Let us fade its aura, look at the gimmick, hype behind the real "cloud security."

Why does the term "cloud computing" become an unprecedented and consistent development direction for the entire IT industry overnight after it has gone out of the book? This is certainly not an accident, in fact, the "cloud computing" we already have today, before its birth, all kinds of "cloud" technology reserves and market reserves in the IT industry have started, but some are "kept in the purdah unknown", and more of them are dubbed different names or have not been refined by the system. As Oscar, vice president of trend technology greater China, once said, until the concept of "cloud computing" was put forward, they found that the technology reserves that the trend had been doing for several years could be called "cloud security".

The old technology for new clothes

2008, because of rising, trend technology two companies almost at the same time to launch their new anti-virus products and "cloud security" together, "cloud security" and thus began to quickly become a "new brand" in the antivirus market.

In fact, this so-called new signboard for most of the current "cloud security" products of the antivirus manufacturers, but is a true "old technology." Rising technology experts Tao told reporters, as early as the 2003 rising card products, distributed computing, network acquisition technology has begun to be applied to new products, and today it seems that these technologies are today's "cloud security." As early as a few years ago, almost all the vendors involved in "cloud security" technology had the same consensus on the bottleneck of traditional anti-virus technology through distributed computing, and became an important reserve for their participation in market competition.

The most important technical feature of cloud security is the power of its partial operations and the streamlining of client-side security configuration, the thin client trends that users often talk about. This is true for enterprise users with significant security improvements and reduced client maintenance advantages. The cloud security technology itself also provides an assessment of unknown threats and a defensive push, so there is no doubt that progress is evident at the level of security defense. "The idea that Fortinet, the technical director of China, Li Hongkei once raised, is still the information security Community's common understanding of" cloud security "technology itself.

Visible, "YunAll "is not mysterious, it is not what is new technology. Just because the concept of "cloud computing" has emerged as a proper interpretation of distributed computing, the security architecture and defense technologies that have already begun to be applied in the enterprise market, based on distributed computing, have also found a more appropriate way to interpret them. And these security technologies do not appear to be anything special until they are renamed, and even many of the security vendors, including trend technology and fortinet, are already developing, applying, or stockpiling such technologies to enhance their competitiveness in enterprise-class market products.

Why cloud safety standards are so changeable





since the "cloud security" concept was proposed, various and "cloud security" products are quickly flooded the market, and "cloud security" has been the definition of a variety of versions. So far, the industry on the true "cloud security" of the war of words is even continuing.





But if you look hard, at present, the "cloud security" standard of change is mainly the result of market interest-driven: on the one hand, under all kinds of hype, "cloud security" has almost become a security manufacturer can keep up with the situation of the symbol, driven by various market interests, "cloud security" inevitably "change tone", Just as everyone in the software industry is SaaS, "cloud security" has come to this day, and has started to be mentioned in every corner of the security field, and it will naturally form a situation where "the public is right, the woman says she is reasonable". On the other hand, "cloud security" is more than just technology, since it has entered the market, it is necessary to consider the problem of input-output ratio, when it to face different levels of market users, the past set of high-end market for the standardization of the concept of how to maintain, so in its market-oriented process, "cloud security" The changing standards seem to be a necessity.





in Tao View, the current "cloud security" concept of the unity is the inevitable result of its marketization. Different manufacturers have different market advantages, and the different nature of the user will have different applications, no matter how this security technology is defined, it is ultimately based on the user's application characteristics to expand, so in different markets, the cloud security of the understanding and investment approach will inevitably produce different views. "Some manufacturers of market advantages in enterprise-class users, such users of the network application characteristics and individual users of the network application characteristics of natural is completely different, different applications of the corresponding effective security technology is completely different, so the cloud security is a rigid definition is worthless." Whatever the security technology, the customer is looking at the effect, not what technology you are using. In addition, pragmatic business behavior is not to consider public opinion, but also to consider cost-effective, the need for rational input. For different markets, such input will naturally not be the same. At the same time, he said, as far as the market for individual users is concerned, while "cloud security" seems to be at the moment, the mainstream firms are actually moving along the same trajectory.





At present, "cloud security" technology is only in the initial stage, we might as well consider it as a new security service model, itself different product defense category definition is not the same, so a variety of "cloud security" products of the actual defensive effect and the user's experience is naturally different. Regardless of the current "cloud security" definition of how the illusion, a "cloud security" is how gorgeous packaging, it must eventually accept the market evaluation. Of course, it will be in the process of marketization gradually achieve standardization.





is undervalued by the market





in the lively hype, channels and users instead of "cloud security" increasingly numb, many channels have reacted, feeling "cloud security" more and more conceptualization, its market value does not seem to be prominent. So, behind the concept, how much is the real value of cloud security?





from a technical point of view, "cloud security" is high, mainly because the technology itself together in two areas: cloud computing and network-based threat defense. But over the past two years, the antivirus market has not talked about "cloud security," much more because cloud computing can address the threat of explosive growth, and shift the huge defensive pressure that used to be on the client to the network. For the antivirus market, the application of "cloud" technology is of great significance, it is not only the best way to solve the bottleneck of traditional technology, but also the actual experience of applying "cloud" technology to the users has changed greatly. But as one technical expert in the industry says, this change in the channel or user level may not be easy to understand, because after all, "cloud" technology application is still limited to the previous security system, and embodied in a product above, most users can only just feel the virus or Trojan seems to have become less. Therefore, the current "cloud security" value by the market underestimated also inevitable.





So, in the current market, "cloud security" does not really release its energy, but from the beginning of this year some changes in the market, "cloud security" situation may be expected to change. Since the second half of 09, there has been a lot of change in the heat of cloud computing in the enterprise market. Compared with previous years, cloud computing began to reap some of the development of the client, even IBM's cloud computing platform has been in the petrochemical, government and other industries have made a real breakthrough. And VMware's Greater China president Song has said that from its 2009 exposure to users of virtualization and cloud computing acceptance and application model, 2010 will be the cloud computing burst. Another notable change is the reversal of the use of virtualization, which has been slightly weaker in the market in previous years. For the security market, this technology, which is seen as the foundation of cloud computing architecture, is emerging as a new security issue, and its further expansion is the security of the "cloud computing" system, a more meaningful "cloud security" opportunity that has been consistently favored by most people in the industry.





Market Energy is being released





from this concept by the market attention to its real market, "cloud security" in more than a year to complete the process. Moreover, from the current market reaction, most of the products in the introduction of "cloud security" technology manufacturers have begun to gain market returns. This seems to indicate that the user and channel feedback confusion, probably mostly from the market for the "cloud security" concept of excessive preaching, and "cloud security" product itself has been recognized by the market.





learned that since 2008, the "Cloud security" strategy, trend technology last year, 60% of sales are derived from their cloud security products, Oscar told reporters, most channels and users are looking at the effect of security products, so they may not be so attached to the technology behind the product, so with "cloud security" Related products in such a short period of time by the customer recognition of the reasons: one is the cost, one is the effect.





In addition, in the trend of science and technology this year's channel conference, he also admitted that the "cloud security" strategy has been the implementation of the trend of science and technology has saved a lot of core channels, and in the absence of "cloud security" concept, the channel loss in the anti-virus market is much higher than the current "There are some industry channels that have left the trend, after we put forward the ' cloud security ' strategy, and then find back, hope and trends continue to work together." and the root cause of the return of these channels, it is they see around the distribution of ' cloud security ' products, other channels, are making money, and the performance is getting bigger the better. ”





He stressed that, especially after the trend of the Cloud Security 3.0 strategy, the trend for the channel to open a door to the virtualization market, now not only have new high-end market partners are and trends in contact with the channel of business, also in this area synchronized progress.





also has a huge market development because of the "cloud security" technology, as well as vendors like Websense, who have been focused on web security and content security.





Websense Technical Advisor Chen Shi said that because "cloud security" technology is completely different from the traditional software and hardware solutions, so the Websense "cloud security" products in the market, the product's ease of use and cloud characteristics, has made the Websense market partners have changed the new, As some new types of partners continue to join. Websense's influence in the tertiary city has begun to grow as the "cloud-safe" offerings are on the market.





In addition, WEBSENSE2009 's success with SaaS has proven the success of the cloud security strategy. Not only has it harvested millions of active end-users, but its SaaS services have also risen rapidly in the near future, with Websense growing at the top of the top six providers of the Web security SaaS market.




The market thrust of
"cloud security" comes from the advantage of "cloud" technology itself. At present, the industry is optimistic about the reasons for the cloud security model, but also because it for users to achieve convenience, low cost of operation, but can have these two benefits at the same time, get a better experience. In the rapidly changing technology, the competition is also unusually fierce security market, the current "cloud security" products for the channel to enhance user trust and expand business opportunities for the energy is being released.


manufacturers start to avoid virtual





may have seen the adverse effects of "cloud security" in the market, and a lot of positive changes have taken place in the 2010 "Cloud security" market. A year, many security companies have clearly shown the "cloud security" to avoid virtual attitude, the intention to change the "cloud security" is too unreal market impression.





According to Tao, rising in the 2010 version of the application of the new virtual machine technology, and the past virtual machine technology, there is a huge breakthrough, or rising also dare not to claim that it is the world's fastest professional anti-virus virtual machine, and this also condensed the rising of four or five years of technology accumulation. Therefore, in its 2010 version of the "cloud security" product launch, rising on its background technology publicity has apparently covered the "cloud security."





Websense's attitude towards "cloud security" has also begun to be pragmatic. Their view is that the process of "cloud security" is more critical in the process of getting involved in the "cloud security" market. Chen Shi told reporters that the "cloud security" technology application must be based on the full consideration of customer needs on the basis of not illusory. Therefore, in the face of the needs of large and medium customers, Websense is beginning to provide customers with the integration of border protection "cloud security" products, so that users of the "cloud security" technology applications become more convenient. He said that at present, Websense customers can even integrate the management of cloud security with the existing Websense product management of enterprise boundaries, so that management strategies, alarms, reports can be unified implementation. "We value future customers with a new choice when they enjoy websense web security, one with the same effect and less." Websense is doing, not to preach the concept of cloud security, but to let channels and customers to further understand the traditional software, hardware products and solutions and ' cloud security ' products, such as their protective effects, implementation costs, maintenance costs, so that channels and customers can make a simpler choice. ”





In addition, the trend of science and technology in the "cloud security" field of investment in the scale and investment is not "virtual." When its cloud Security 2.0 strategy was released in 09, the total investment in "cloud security" had reached more than 400 million dollars, and it was the first security vendor in the industry to put together a huge cloud of 34000 servers.





This shows that some manufacturers have realized that the "cloud security" gimmick in the process of operating the market has become less important, whether to maintain its "cloud security" competitiveness, and ultimately depends on the accumulation of technology and investment in these more weight.





Enterprise market enters the transformation period





According to a survey by authorities, the demand for enterprise-class markets for cloud computing and virtualization will show a significant growth trend in 2010, while the "cloud" security issue has become the second-highest market focus. Can these changes in the enterprise-level market make a new turn for the application of cloud security technology?





in fact, some industry manufacturers do believe that the "cloud security" real market time has come, and has accelerated their pace of action. At the beginning of the new year, trend technology proposed the "Cloud Security 3.0" strategy, stating that its "cloud security" technology has begun to focus on the security of the virtualization system, EMC's security services RSA has announced its many core security technology embedded in the virtualization system.





Oscar believes that the wide application of virtualization technology means that "cloud security" technology can move into a more promising space for development. "For a long time, security products are in the old security system to stack up, although the trend of cloud Security 1.0 and 2.0, in the back of the good technology in support, but can reflect the effect of the limitations." And the advent of virtualization and cloud computing brings a chance to rebuild a new security system. This is the chance to make the ' cloud safe ' energy explode. ”





and Arthur W. Covelo, the global president of EMC's Information Security division, has a similar view, and in his view virtualization technology provides a new starting point for "cloud security." The significance of "cloud security" at the market level, mainly for users to save the cost of security, and now because virtualization technology is still in a growing period, its security system has not really formed, so if the "implementation and birth of the same time", the security Policy management framework embedded in the virtual operating system, The cost and efficiency of the security that users can feel will be completely different from the current, and the market value of "cloud security" will change. "Our embedded integration with VMware virtual mechanisms has started, not only with the existing Control node security technologies, but also the implementation framework for security policies, and our Siem Security information and event management technologies that have been integrated with VMware's virtualization offerings." ”





As one expert in the industry said: "Whoever enters the cloud market first will have more say in the future." In the global market, "cloud computing" is still only in a start-up phase, and virtualization technology in the domestic market is only just out of the market incubation period, but this for all to join in the "cloud security" of the security vendors, but may become a rewrite of the pattern of opportunity. Because the real "cloud security" debate, will inevitably be in the virtualization of the battlefield.





channel "cloud Security"





in the "cloud security" products just enter the market, the channel level of the response is not strong. Many people have doubts about this concept, especially in the enterprise-level market, many channels are not too willing to take their users to the "new technology" test water. Many manufacturers reacted, at that time, some of the technical capacity and relatively far-sighted channels, to the "cloud security" products into the market has indeed played a key role. Of course, these channels are naturally the first to taste the "cloud security" product sweetness.





"Users don't really value the idea behind your product or what kind of new technology you're using, because you just need to test on the line to see if the effect is higher who is lower." At that time, we just used the ' cloud security ' technology to send the device to test, and the user looked at the actual virus log, immediately understand the effect of cloud security technology. "A channel from Heilongjiang told reporters that if you go and users emphasize the advanced concept of products, users will only put you" block outside the door. " For the product that the customer still does not understand, there is no marketing means to let him go to actual experience better.





thinking by the company general Manager Xu Yu also hold the same view, but with some channels, he was very early bullish two concepts: one is cloud computing; one is virtualization. He believes that although "cloud security" is the extension of cloud computing, but the early hype in the "cloud security", but also just stay on the software, such products will be too conceptual, and if "cloud security" in the hardware, can reflect the value of its products.





of course, although the first to eat crabs, but to open up the market can also be a prudent principle. The idea by the first "cloud security" project deliberately selected an old user to test. Xu Yu admits: "At the beginning of the engineer in the heart also have no bottom, afraid of the impact of network speed, not the ' cloud security ' feature turned on, and later found that this concern is completely redundant, open ' cloud security ' function after the speed is faster, because the Web reputation calculation on the ' cloud ' side, greatly saving the local network overhead. ”





Many channels are actually with the user, through hands-on experience to realize the "cloud security" value. Therefore, Oscar also said that every time the "cloud security" strategy upgrade, it is true that the channel to the application of new technology again confusion, this is the "cloud security" technology rapid development of the inevitable, but each upgrade brings the same is also a new market opportunities. For example, its 3.0 strategy for virtualization system security layout, will be its channel market into a broader area, occupy the future "cloud computing" market opportunities. Of course, channel input is also essential.





in the "cloud security" market growth stage, "cloud security" for the channel brought by the business opportunities are not only limited to some more effective software and hardware security products, it may also be more cooperative mode, more access to some high-end industry market opportunities. Of course, in the "cloud security" era, the channel also needs to have a certain degree of boldness and courage, because "there is input to have output" will become the "cloud security" channel of the rule of the plate. And for the current market on the "cloud security" products, channel operators in the choice of partners to eyes, the operation of the effect of any advanced concept.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.