The FT reported that an average of 20 seconds of hacking into a computer network has occurred, with more than 1/3 of the Internet firewalls being breached at times! At the rate of growth that the current network threatens, It is expected that by 2015 the global Internet will have 233 million malicious programs, users will have 26,000 new viruses per hour to deal with! streaking, and then NB experts are also difficult to deal with, not to mention ordinary Internet users, and the traditional killing soft firewall software is obviously difficult to cope with this attack.
Inspired by Google's cloud computing, "cloud security" is becoming the focus of the 2009 major security vendors scramble to study.
What is cloud security? Plainly is dripping into the river, will be the Internet security monitoring work to share a single anti-virus software users, each user is cloud security this cloud of small water droplets. The whole process is "to launch the user's power"--> "parallel"--> "active Kill", of course, by the cloud Security server unified coordination, looks like and look for extraterrestrial civilizations of the SETI program is similar. Of course, the advantage is that the emergence of cloud security will be the traditional stand-alone anti-virus mode into the network of active anti-virus, from the past passive to focus on anti-virus, hindsight into a prophet!
But judging from the "cloud security" platform launched by the current mainstream kill software manufacturers, most are also based on a sample of a computer that collects a poisoned individual in an Internet user group, then through system analysis, and then proactively push updates such as signatures or other rules to prevent other computers in cloud security from infecting the virus. But the computer that provided the sample is still poisoned, and also free to be a volunteer! In fact, it is quite unkind.
July, in the cloud security has ERS core technology trend technology issued a formal trend technology Cloud Security 2.0, in the industry caused by a lot of comments, compared to the previous release of cloud Security 1.0, "Cloud Security 2.0" the biggest innovation is to upgrade the antivirus to three-dimensional, all-round protection mode.
It is said that the trend is a total of 34000 servers composed of clouds, can be completed in milliseconds query, to help enterprises achieve 0 jet lag virus code update, 0 time virus code deployment, 0 resources occupy the growth of three "0" Protection! And in nearly hundred kinds of common protocols for intelligent analysis, by monitoring the enterprise network of various abnormal behavior, Tracking the threat initiator, locating the source of the infection, a large number of anti-virus functions from the terminal migration to the cloud, the formation of "terminal → Gateway", "terminal → Cloud", "Gateway → Cloud" multi-layer defense system, in the large compression protection of the window period, simplifying the application and management difficulties, improve the efficiency of the entire information system.
The author thinks, as a new technological revolution, cloud security is not a few of the blind booing, but the computer and Internet technology development inevitable product. I think that the core value of cloud security should be a new layer of protection defense, anytime and anywhere the overall security, so as to achieve 0 contact, 0 infection protection value.
Faced with the increasingly serious security crisis, enterprises in the network security construction more and more attention to the realization of enterprise terminal data assets and network equipment security details and means of implementation. Regardless of the integration or subdivision of gateways and terminals, it is necessary to consider that each individual in the network is trustworthy, This is also the Cloud Security 2.0 provided to the current cloud security manufacturers of the most direct thinking, only to provide customers with a more secure and effective protection shield, emergent cloud security core value, can bring to the terminal system security management and the release of resources, to achieve efficient and practical purposes.