It is also an event in the field of information security, and every year RSA conference always brings to the participants a lot of thinking. This year, security experts and academics from around the world have become more realistic about cloud computing after the security issues of cloud computing last year caused widespread concern in the industry. How to solve the problem of identity authentication, how to avoid security risk, how to balance performance and ease of use, how to implement business cloud migration, how to plan private cloud and public cloud, how to strengthen the virtualization technology of cloud, how to ensure the exit mechanism is effective when users are increasing the demand of cloud computing technology? In the forest general ...
As the most basic component node of the enterprise network, the terminal is the target of hackers and virus makers because it stores a large amount of sensitive data, meanwhile, because the terminal faces the internal staffs of the enterprise directly, the management is difficult, which leads to the weakest link in the Enterprise network. This allows enterprise users to rethink their own terminal security! Coincidentally, July 24, a theme for "Rethink Your Terminal Security" cloud Security 2.0 meeting, trend technology company in theatre form to deduce the current terminal virus complex situation, and to enterprise users launched Cloud Security 2 multi-level terminal Ann ...
Recently, the domestic first-line security manufacturers Lenovo Network Royal officially approved to join the global "Cloud Security alliance" CSA (Cloud Alliance). As a member of the Alliance, Lenovo will work with the front-line mainstream cloud security manufacturers at home and abroad to promote cloud security and cloud computing related information and knowledge exchange, in the cloud computing environment for consumers and suppliers to provide the best security solutions. Cloud Security Alliance is the 2009 RSA Conference established by the Organization, once proposed that the industry widely recognized, is a cross-sectoral, cross-regional international exchange and cooperation platform. Join the league threshold ...
Since the new technology concept of cloud technology has been put forward, network security has been shuffled by cloud computing security. Major product safety manufacturers have dabbled in cloud computing security, Beijing time September 1 morning news, according to foreign media reports, computer software enterprise CA Technologies (hereinafter referred to as CA) has signed an agreement to 200 million U.S. dollars to acquire cloud computing security vendors Arcot Bae. The CA expects the deal to end at the end of the second quarter of fiscal year 2011, possibly reducing its earnings in accordance with General Accounting Standards (GAAP), but making non-general accounting accurate ...
At the RSA conference in 2009, the security of cloud computing was the subject of anxiety and discussion among many manufacturers and academics, with a stark contrast between optimism in cloud computing and pessimism about cloud security. "Swamp Computing"-----RSA founder Ronald Rivest A word that profoundly reflects this sentiment. It should be said that the information security community has not yet been prepared to recognize, participate in and help cloud computing, even the basic framework for security protection under cloud computing. However, at the RSA convention in 2010, cloud Security became a well-deserved star. Whether RSA total ...
Recently, the panda released the "cloud Security hundred city thousands of award-winning experience", which is the panda safe re-enter the Chinese market after the latest release of large-scale user experience program. From now until July 31, users can choose to apply for a one-month test panda Safety Gateway through the Panda's safe channel partner, or test the "Panda safety Gateway +pcop" deadline. During this period, all users participating in the experience will receive a set of panda cloud antivirus software (Panda Cloud Antivirus). Within 3 months after experiencing the purchase of the Panda security gateway users, ...
Cloud security technology as a new generation of technology concepts, making the Internet security field has been a comprehensive impact, a wave of technology updates followed. More and more enterprises try and use cloud security technology, making Internet users form a powerful alliance of offense and defense. Faced with the network security revolution brought by cloud security technology, many manufacturers and experts have disputed the development and pros and cons of it. However, according to the survey, cloud security technology has begun to bear fruit. In the first half of 2010, the global Internet security environment has been comprehensively improved, which is an important milestone in the anti-virus industry. According to Rising "2010 first half of each other ...
According to foreign reports, a joint survey by Symantec and Ponemon agencies shows that most companies lack three basic elements-programs, systems, and tools-to ensure that sensitive information stored in the mainframe is still safe from the cloud. "Cloud computing is a good tool for providing a lot of basic business services, but our survey found that companies are concerned about cloud security when it comes to sensitive corporate and personal information, and this trend is becoming increasingly apparent." Dr. Larry Ponemon, founder of the Ponemon agency, said. To do ...
Recently, rising company formally joined the "Cloud Security Alliance (Cloud)", became the "Cloud Security Alliance Member" qualified Asia's first anti-virus manufacturer. Previously, including Microsoft, Intel, Cisco, Symantec, Trend technology and other heavyweight manufacturers have joined the organization, they will work together with the rising cloud security and cloud computing in various fields of application, for consumers and suppliers to provide the best security solutions. 498) this.width=498 ' OnMouseWheel = ' javasc ...
September 2, 2010 afternoon, CSA Cloud Security Alliance China Branch was announced in Beijing today. NSFocus as host, will be well-known domestic and foreign operators, friends, users gathered in a hall. An innovative technical discussion conference was opened. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border=0 alt= ' "src=" http://images ....
According to the IDG Group's Computerworld website, security experts say companies that choose cloud computing may be familiar with the concepts of multiple leases (multi-tenancy, where multiple companies host their data and business processes in the same server group of SaaS Services) and virtualization, But that does not mean they fully understand the security of cloud computing. Cloud Security Alliance (CSA) executive Director Jim Reavis believes that cloud computing is actually a combination of technologies to create an application with a unique management system. This is the new computer age ...
September 2, NSFocus held a summit of Cloud Security Alliance (CSA) Forum and China division in Beijing. The conference to "Communication and sharing, cooperation and mutual benefit" as the theme, the spirit of "introduction, go Out" the spiritual, explore the essence of cloud security and development trends, the exchange of cloud computing and cloud security at home and abroad the latest research results, to share the practical experience of cloud security applications. Dave Cullinane, president of the International Cloud Security Alliance, was invited to attend the summit and make keynote speeches. Dave Cullinane In his speech about the achievements of the Cloud Security alliance, Yunan ...
While cloud computing's performance in saving resources and improving efficiency has been praised, its innate security problems have become a major obstacle on the way forward, a problem that has aroused the attention of many people. "Maybe our name ' cloud computing ' is a mistake, because it's easy to feel interesting and safe," he said. But in fact, the network is full of threats and sinister, if we call it "swamp computing" may be more to let people have a correct understanding of it. "At the recent RSA2010 security conference, the famous information security expert RONALDL ...
When I read various blogs, IT industry analytics, and media coverage, I found many conflicting points of view. Some authors consider cloud computing to be safer, while others emphasize new security challenges in particular. As the concept of "cloud" is still in its infancy, there are many plausible arguments everywhere. Here are the five cloud computing blind spots I hear most often: blind 1 infrastructure services (Infrastructure-as-a-service, IaaS) providers of virtual private "cloud" like the Enterprise Internal data Center security virtual Private ...
Cloud computing has become a trend in the IT field, but as more security vulnerabilities are exposed, the future of cloud computing is fraught with anxiety and unease. Cloud computing services have freed companies from the shackles of hardware and software and infrastructure, and more and more companies are choosing to work online and store data online, and they have to face the grim fact that cyber attacks will also be centered on cloud computing within the next five years. 498) this.width=498 ' OnMouseWheel = ' javascript:return big ...
Recently, the international authoritative software testing agency Opswat announced a new phase of oesis OK certification, in the international major anti-virus test to maintain the leading position of the Golden Hill antivirus software, with the latest product poison PA 2011--The world's first application of "Trusted Cloud Kill" anti-virus software, again to get the anti-virus class Oesis OK authentication. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' src= ' http ...
July 22, Trend Technology officially announced the introduction of the trend technology cloud security technology core New Cloud Security 3.0 solution. Since the beginning of 2008, the trend of technology in the cloud security step has basically maintained a year to upgrade. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border=0 alt= ' "src=" http://images.51 ...
At present, more and more market data are dispelling doubts about the "cloud" concept, and a growing number of successful deployment cases show that cloud computing is no longer a disembodied vapor floating overhead. Cloud-Based security services (cloud-based) are emerging, with more and more enterprise users becoming beneficiaries of cloud security services. Then, the domestic telecom operators in the cloud computing and cloud security, what unique insights and views, and what practice? This article is based on operator expert in CSA 2010 Cloud Security ...
May 5, 2010--Warisin (VeriSign), a network infrastructure vendor, has announced an industry collaboration to build a trusted online identity solution that is a key requirement for cloud computing and the wide application of software as a service (SaaS) solution. The industry initiative will combine technology and best practices from industry-leading companies such as conformity, Ping Identity, Tricipher, Qualys, and Warisin (VeriSign). To achieve the identity of the parties to the certification and protection ...
"51cto.com exclusive feature" Beijing Time July 22, the trend of technology officially announced the launch of a new cloud security technology based on the core of the 3.0 solution. From early use of cloud computing to improve the effectiveness of protection, to protect cloud computing itself, trend technology Cloud Security 3.0 is for the cloud environment, enterprise-critical information platform and data assets two core elements to provide security protection: on the one hand, "cloud shield" technology to protect the "cloud" platform itself high availability, so that a variety of enterprise data centers /Application System or cloud environment from viruses, attacks, system vulnerabilities and other threats ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.