Li Yongwei: The current situation of cloud computing network security

July 4, the 2012 China Computer Network Security Annual Meeting held in Xian today, Cisco Cloud Computing Architecture Security Senior Consultant engineer Li Yongwei published the topic "Cloud Network Security" speech.   Cisco Cloud Computing Architecture Security Senior Consultant engineer Li Yong's transcript: Hello, my report on the topic is "cloud computing network security."   Today, the main content is three parts, one is the cloud data Center security strategy, the second is the Cloud Center security architecture; The third is the Cloud Center security Virtual Service point. First to introduce ...

Cloud computing Downtime Warning record

When it comes to cloud computing, users and vendors are still exploring uncharted territory when they adopt the new infrastructure. Failure problems and unexpected downtime will inevitably occur. Even the biggest and best cloud makers are in vain before their services are occasionally "stopped". So what went wrong in the event of a cloud outage? What can IT managers and users learn from every event? To help readers better run their services, some downtime events are sorted according to the severity of the downtime incident. Microsoft is even testing ...

Side effects of security: advantages and disadvantages of cloud computing security

Computer security was an easy job decades ago, and computers in that era were placed in a tightly guarded room. The head of the engine room will take your punch card in front of the window, and as long as the card that holds the code is not folded, damaged or truncated, it will be read by the Hollerith reader and executed on the computer. Only one program can be executed at a time. Of course, if your program is wrong, it will be a few hours or a few days after the supervisor returned to request debugging. (in the age of the FWIW card rule, careful design, architecture and desk checks are routine;

Sheng to the loss of user data the road to domestic cloud computing is still very long

August 6, Sheng was damaged by a physical disk, causing user data loss. After the incident, Sheng issued a statement on his official microblog. The following picture: In the statement, Sheng expressed the apology to the user. But also caused by netizens and industry professionals questioned. Have Netizen Blunt, Sheng host like is 5 years ago already eliminated host virtualization technology. Some netizens also pointed out that physical disk damage is unavoidable, but the service providers know that it is difficult to avoid also caused accidental losses, the blame. In general, the sound of questioning is mainly focused on "in order to avoid your accidental loss ...

Cloud computing security is fundamental to the virtualization technology of the Agency

The UNDP virtualization technology requires effective security tools and best practice scenarios. As new technologies and solutions evolve and are widely used by enterprises, it is imperative for IT staff to maintain information security. In the past, the information chief or other decision makers could store confidential information on a single entity server, and then restrict access rights. But with the advent of virtualization technology, today's security issues have become more complex, according to Joe Baguley of SC Magazine. Global Enterprise Server Virtualization market will be 3 per year ...

Please do the cloud computing service error Preparation

Cloud services will inevitably fail. Some of the failures are temporary and others may be much more serious. It is important that you prepare for it. All services run smoothly in the cloud until a certain moment of failure occurs. Consider Microsoft's so-called "leap Year" (leapyear) software bug, which caused the company's Azure cloud computing services to collapse last month. Billlaing, vice president of Microsoft's server and cloud computing department, described the system failure in post, claiming that Microsoft would improve disaster recovery and other aspects of the business in a comprehensive way ...

Analytics: Cloud computing Security protection applications

Event playback In recent months, many consumers to the media complaints into the "broadband discount" scam, and the situation has become increasingly fierce. Scam by means of buying a mobile phone network can enjoy a "lifetime discount", to buy high-definition player can reduce the monthly broadband fee, and then to add money can do a wide variety of broadband speed, and so on. Of course, the pretext of perfection is not likely to deceive the consumers fully believe that there are supporting measures. Consumer's address, broadband account number, ID card numbers and other information readily available, there is no omission. The beginning of the scam stems from a disguise.

Cloud computing realizes single sign-on upgrade convenience at the expense of security?

Managing a single cloud service is challenging for service providers, not to mention multiple cloud services. But many companies are working on multiple cloud strategies that seem to conflict with the customer's uncomplicated and bulletproof security strategy. The customer requires single sign-on (SSO) functionality, but the provider and customer must ask themselves whether the convenience of cloud SSO is worthwhile for their potential security letter. Cloud providers say they now face a daunting challenge: they must push end users and IT managers to use multiple sign-on to maintain security, or they must find out how to secure a federated cloud ...

Cloud computing era needs to provide integrated security cloud services

The internet has changed our lives, and cloud computing is changing the Internet. In the future, only need a notebook or a mobile phone, you can through the network services to achieve everything we need. But, the great convenience, also contains the great danger, whether cloud computing will provide a newer and bigger "stage" for the network hacker? Does its open posture open up the Dora box and run out of countless demons from inside? In the face of these puzzles, how do we build a "security cloud" environment? In this regard, Fei TA (China) Technical director Li Hongkei that the key in the information security framework on how to protect the "public ...

Three hidden risks of cloud computing

While cloud computing is attractive in terms of both management and efficiency, it also poses a variety of known and unknown risks, according to a recent cloud computing risk report from Cornell University Labs. The well-known risk topics of cloud computing include information security risks, internal attacks, and cloud downtime. The Cornell University report says there are three hidden risks to cloud computing: as third-party cloud services increasingly take multiple hardware pools, unpredictable interactions between load balancing and various loosely-dispersed cloud services can lead to "cloud downtime". Two...

Cloud computing focuses on virtualization security

Cloud computing Globalization in the wave of development, cloud computing from the original concept of the various applications to the landing, its advantages gradually revealed. The world's leading companies are also starting to chase the pace of cloud computing. In this situation, the domestic "cloud" footprint is not to be outdone, all over the cloud data center has been planning and construction.   And the important challenge that restricts the popularization of "cloud computing" is still the security issue.  Virtualization security is the focus of cloud security technology is mostly focused on virtualization security, the security technology for cloud applications is not much involved. ...

McAfee deploys four centers of gravity in cloud computing security market

Last year the US announced its support for cloud computing and the green economy, hoping to compress government spending and support environmental protection. This March, French police said the 25-year-old French hacker "Hackercroll" was arrested for hacking into Obama's Twitter account.   Given that Obama's accounts can be hacked, can the data security of cloud computing users be guaranteed? Market research reports show that 87.5% of users currently believe that "security issues" is the main obstacle to their use of cloud-related services, and "Enterprise intelligence Research" results also show that the safety of ...

Virtualization and cloud computing security divide security experts and it

Does migrating to virtualization and cloud computing simplify network security or complicate it? When it comes to the problem of 2,100 it elites from 27 countries, their reactions are mixed, which suggests that there are different approaches to security within the enterprise. Nearly one-third of companies see virtualization and cloud computing as adding to security difficulties, while another one-third think the difference is small and the remaining one-third means simplifying security maintenance, according to a report on the 2010 Corporate Security Survey-global data. The telephone survey was last month by Applie ...

Disaster recovery capability is an important factor for users to consider cloud computing

Considering using cloud computing? Then you are not alone. Almost every IT organization is considering the cloud as a way to boost services, save overhead, or shift workloads. There are good reasons to consider using cloud computing. Although the cloud may not be for everyone, the cloud has a huge advantage for a understaffed IT organization that can provide the private sector and multinational companies with millions of of employees the same level of service as within the enterprise, and can save a lot of budget. However, when the enterprise migrates services to external providers, regardless of whether the service is running properly, they are ...

Password Gate event, a wake-up call to China's cloud computing

CSDN Web site was exposed more than 6 million users after the leak, 51CTO, CNZZ, enet, U-uu9, yy voice, Lily Nets, happy net (micro-bo), Renren, the United States and space network, precious nets and many other well-known websites have been plunged into the user data leakage.      The total number of leaked accounts is estimated to be over 200 million, and may indirectly affect the information security of a total of 500 million accounts because users use the same registration name, mailbox, and password on other sites that are not compromised. As the current Internet applications are used to communicate or publish information, users stored in the operator's private data relative and ...

Shen: Building a cloud computing center cannot ignore information security

Xinhua Beijing, December 27 (reporter Chishen, Kangaka) academician of Chinese Academy of Engineering Shen held the sixth annual government Industry Information Conference on 27th, said that at present, many cities in China started the Cloud Computing center construction, but the information security problem did not cause enough attention, it is necessary to strengthen the information security system construction. Shen said that at present, the construction of cloud computing Center as a major industrial project, many places set the value of Bai, but there is a general lack of attention to information security issues. In cloud computing mode, users don't need to know how to manage the basics of supporting cloud computing ...

Security into cloud computing development important premise innovation and technology to promote industrial development

"' security ' is an important area of cloud computing development, and must not be overlooked. Must be ' cloud security ' as the premise of cloud computing development, for the cloud computing industry to pay high attention to ' cloud security ', if there is no ' cloud security ' protection, our cloud computing development, will let everyone lose confidence. "Dong Baoqing, deputy director of the Ministry of Industry and Information technology, said at a recent" cloud computing security, high-end CIO Summit "and 2011 Corporate Cloud Computing and Virtualization Security Strategy Conference. This conference by the global server security, virtualization and cloud computing security leading manufacturers---...

McAfee improves cloud computing security to new heights

The global leader in cloud computing security, McAfee, today announced enhancements to its McAfee Cloud secure Platform. As the industry's only content-aware platform, McAfee Cloud security Platform protects businesses and the cloud from all major information transfer channels, such as e-mail, Web, and authentication, helping organizations secure and efficiently leverage cloud-based services and solutions. This platform can be on-premis with the client.

New perspective to solve the new environmental security problems of cloud computing

Evolving business models, far-reaching technological innovations and a changing workforce bring business growth opportunities, while also implying a significant increase in security threats. Threats are becoming more complex and costly. Executives pay close attention to security issues, but do not always ensure that their companies can manage risk effectively. Traditionally, corporate security has been an afterthought, and many companies are subject to fragmented security products and disorderly processes. From a maintenance point of view, this is obviously problematic. Worse, new network threats attack vulnerabilities between single points of production and gaps between processes ...

NET Cloud and Sky Cloud technology to reach a strategic partnership for computing security

With cloud computing surging, in order to cloud computing landed, better do cloud computing, the industry's leading enterprises in various fields are carrying out a series of cooperation. Recently, Beijing network Royal Nebula Information Technology Co., Ltd. and Beijing Sky Cloud Technology Co., Ltd. on cloud computing security in the area of close cooperation reached a strategic agreement. Beijing Network Royal Nebula Information Technology Co., Ltd. by Lenovo Network Imperial Technology (Beijing) Co., Ltd. renamed, its predecessor is Lenovo Group Information Security Division. The net nebula locates in the specialized information security technology, the product, the service and the solution Solution Provider, has the independent intellectual property product, and in ...

Total Pages: 418 1 .... 35 36 37 38 39 .... 418 Go to: GO
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.