ZDNet Security channel March 05 Comprehensive News: The leader of the enterprise security industry Blue Coat BAE was awarded the 2014 Reader Selection award by Information Security™ Magazine and searchsecurity.com™. Blue Coat Cloud Services won the best Cloud Security award, while Webpulse was rated as the best threat IntelliSense industry leading product. The 2014 Reader Selection Award was passed on to Informati ...
2015 cloud computing development Trend 1, cloud computing intelligent Alibaba Group and Tianjin signed strategic cooperation, Tianjin municipal government to the cloud computing large data industry to the height of strategic development. Thus, the new generation of information technology represented by cloud computing is the driving force for the formation and development of intelligent cities, which has been a very good opportunity for the development of cloud computing. 2, increase the security of cloud computing efforts in the mobile internet era, no one is not concerned about security issues, such as 12306 events. As we all know, cloud computing is actually a lack of security. Cloud computing Ann ...
The embarrassing situation of private cloud security in general, the transition from the existing IT management system to the private cloud platform requires several steps: Large data centralization, business system integration, virtualization of IT resources, management platform cloud, and cloud service delivery. (Many people think that the private cloud is the construction of the information center, in fact, the virtual transformation of the information Center is generally the last two phases merged into the Information Center unified operation and maintenance management platform, but does not necessarily provide cloud services, therefore, can not be called the strict sense of private cloud.) In this process, the resource virtualization is the key, because only the resources are virtualized management, can talk about ...
IBM's acquisition of cloud security Service provider Lighthouse Price unknown "techweb report" August 12, IBM announced that it has acquired cloud Security Service provider Lighthouse (Lighthouse Group, LLC). IBM did not disclose details of acquisitions. Lighthouse Security Group (hereinafter referred to as lighthouse) is headquartered in Lincoln City, Rhode Island, Rhode Island, USA.
April 29 News, the Network Qin officially won a new round of 20 million U.S. dollars VC injection, which is the global mobile phone security services industry to obtain the largest investment, so far, the Net Qin has accumulated 35 million U.S. dollars. Net Qin CEO Lin Yu to TechWeb revealed that far in 2007, a number of world-renowned investment institutions have been very optimistic about mobile phone security industry, the financing of the success of the Network Qin will further expand the mobile phone security business, and focus on creating mobile phone "cloud security" platform for mobile phone users to provide more advanced anti-virus, Anti-harassment and privacy protection and other security services, with ...
Trend technology as the global Internet Content Security Service industry leader brand, from the inception of the first is the globalization route, its headquarters in Tokyo, has been for many Japanese large electronic enterprises to provide services. Among them, the world's top 500 companies in Japan Matsushita Electric Industry Co., Ltd. more than 10 years has been with the trend of science and technology has formed a very wide range of in-depth information security cooperative relations. At present, including 4 research and development centers, Panasonic investment in China to establish 60 joint ventures, wholly-owned enterprises are using trend technology provided by the server, mail systems and terminal threat of a full range of security solutions. Prevent ...
Sun Yali McAfee recently announced the launch of the Maikfeil security platform, an innovative solution designed to help organizations safely and efficiently enjoy cloud computing resources, ensuring the security of all content and data traffic, including e-mail, Web, and identity information, between these organizations and the cloud. "Security is very important for most organizations," said Mark Ollison, McAfee Senior vice president and general manager of content and cloud security. By first ensuring that data and traffic are secure before sending information to the cloud or through the cloud, we can help the enterprise to ...
With the rapid development of Internet, information security issues are facing a new challenge. Tens of thousands of malicious addresses and strangling Trojan virus, the serious threat to the power system security, stability and high quality operation, affecting the "digital power system" of the implementation process. Recently, trend technology has successfully used the unique cloud security technology to effectively curb virus outbreaks worldwide. In the long-term exploration of the power industry's network security management needs, the trend of technology will be the cloud security products in the Web Security Gateway (IWSA) technology is constantly updated, many of the power companies due to network access special ...
September 2 Afternoon News, the International Cloud Security Alliance China Branch was announced in Beijing today. The Alliance is committed to addressing the primary security concerns arising from the increasingly widespread use of cloud computing. It is reported that the International Cloud Security Alliance (CSA) originated from the United States, in 2009 RSA Conference announced the establishment, is a non-profit organization. After the establishment of ISACA, owasp and other industry organizations established a cooperative relationship. Domestic network security Manufacturers NSFocus in December 2009 to become CSA in the Asia-Pacific region's first enterprise members. NSFocus Vice President Wu Yunkun that the cloud is safe ...
Xinhua Beijing, June 22 (reporter Gu Honghong) recently, rising "cloud security" system has intercepted a number of new infections virus, these viruses have strong infection ability, can release a number of Trojan programs, can escape the majority of anti-virus software killing and monitoring, mutation speed and so on. Online for some popular MP3, EXE, flash and other files often with such viruses, users can infect the computer after running the other files. According to the rising safety experts, Win32.virut, WIN32.BMW and Worm.Win32.viking are ...
Recently, the trend of science and technology for the pharmaceutical industry to provide a comprehensive information security solutions and a large number of successful cases, its cloud security core components of one of the threat Discovery equipment (TDA), to become a pharmaceutical enterprise network efficient operation of the "Watchmen." At present, many pharmaceutical enterprises have recognized that network security is related to the enterprise productivity of the important work, and has actively applied anti-virus software, network isolation, firewall and other basic measures. Although the overall security slightly improved, but did not fundamentally solve the problem of passive defense. Malicious code in a large number of Web pages will change the terminal without knowing ...
Washington (Yang Chunlin) trend Technology recently announced the introduction of the trend technology cloud security technology based on the core of the new Cloud Security 3.0 solution, to become the global protection of "cloud computing" security of the first network security vendors. According to the introduction, trend Technology Cloud Security 3.0 is for the cloud environment, enterprise-critical information platform and data assets two core elements provide security protection: on the one hand, "cloud shield" technology to protect the "cloud" platform itself high availability, so that a variety of enterprise data Center/Application system or cloud environment from viruses, attacks, System vulnerabilities, etc., on the other hand, through ...
Blue Coat Systems has announced a new data center for the blue Coat webpulse Cloud Security Service in Hong Kong to enhance user performance in the region. The move will also provide more robust application visibility and protection for more than 54 million users worldwide. As new data centers are established, users of Blue Coat Webfilter, Proxycliend, and K9 Web homeowner will automatically benefit from a richer, more distributed world, including eight data and content rating centers ...
At the beginning of 2011, Jinshan Poison PA and 360 on "whether to disclose the user's privacy" just erupted a war of words, in this respect, 360 security expert Dr. Shi Xiaohong explained the technology of "cloud security", said, "360 did not disclose user privacy, but cloud security, cloud computing, the new technology system may put individual Login Vulnerability ' site leaked user privacy collection. If you want to fundamentally eliminate this situation, not only the safety manufacturers should pay attention to the proper handling of user information, Internet stations also need to actively repair the vulnerability. "Does not involve on-line bank, the network payment and so on account number 360 Ann ...
Zhou in the scene demonstrated the traditional anti-virus mode and "cloud killing" mode difference, Qihoo 360 Chairman Zhou According to 360 Security Center released data in Friday, as at the end of May 2010, 360 free anti-virus market coverage of more than 51%. In just 8 months, the total number of users exceeded the 200 million mark. This seems to have verified that the free anti-virus has become the mainstream of personal user market, and rewrote the old pattern of China's antivirus industry, and in the EM Tech Technology Summit, Qihoo 360 Chairman Zhou, but also caused the guests hot discussion of "cloud security", especially the terminal Ann ...
December 6, the "It times", the IT Business News Network co-sponsored the "Seventh annual CEO meeting" in Beijing grandly. The annual meeting gathered dozens of well-known IT industry ceo/cio/cto and experts, academics, government officials, together to discuss the hot topics such as cloud computing. Including Intel (micro-blog) company Global vice president and China Regional President Yang, IBM Global Vice President Wang, Microsoft (Weibo) Greater China Region Chairman and CEO Leung, Motorola (micro-BO) mobile technology company Greater China Region President Mengpo, Dell Global vice president of Greater China region.
Sina Science and technology news September 22 afternoon, security Butler "mobile Cloud Security Center" today in Beijing Wanda Sofitel Hotel start-up, Security Butler CEO Zhao, Sina Vice President Wang Gaofei, 3G Portal President Zhang, excellent as technology Vice President Chen Shi, Tencent Wireless deputy general manager Hu Zhendong, Bao Soft network president Wu Zipeng, Start the mobile cloud Security Center together. Security Butler is one of the first companies engaged in mobile internet security, in September 2009 released the first edition of the Security Butler, its functions include Trojan killing, internet management, IP dialing, privacy Center, anti-theft guard, System optimization ...
(reporter Gu Xiaoyu) China's largest mobile phone security manufacturers Network Qin announced yesterday, with "Net Qin Mobile Antivirus 4.0" release, the Network Qin built the largest mobile phone cloud security platform. According to the Network Qin CEO Lin Yu, the Network Qin mobile phone cloud security platform has covered more than 200 countries and regions in the world more than 51.5 million users, can make NetQin in the largest range of the first time to collect and analyze mobile phone on the latest security threats, weekly can collect and analysis of more than 4,000 suspicious samples. At the same time, a wide range of cloud platform so that the Network Qin's response time to the new virus from 48 hours reduced to 6 small ...
These days icloud loopholes lead to a number of female photos of the uproar, although the specific reasons have not yet been determined, but now the biggest possibility is that hackers use the GitHub published a script program, the user account for brute force. The leak is now fixed and Apple said it would investigate further. But after this incident, we also have a better understanding of cloud service security. Violence to crack this incident is likely to take advantage of Apple Find My iphone service a loophole, the launch of the attack program is called Ibrute, to the account password can be violent ...
Sina Science and technology news Beijing time of May 4 night, cloud security company Zscaler announced in Wednesday, has appointed trend technology former senior executive Leine Baise (Lane Bess) for the company's new chief Operating Officer (COO). "Bass has extensive experience in running fast-growing start-ups, building business partnerships and managing operations," Zscaler said in a statement. "Bass has been the CEO of Palo Alto NX, a network security firm, and the executive vice president of trend technology responsible for global sales, in addition to ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.