The world's leading check Point Software Technology Co., Ltd. has recently launched a new security Gateway Virtual edition™ (VE) at the VMworld 2010 conference, which integrates Vmsafe, Use the industry's most advanced firewall to provide security to the cloud environment to help protect the dynamic virtual environment against internal and external security threats. The new security Gateway VE uses the Software blade architecture of Check Point to make the enterprise ...
Recently, the panda released the "cloud Security hundred city thousands of award-winning experience", which is the panda safe re-enter the Chinese market after the latest release of large-scale user experience program. From now until July 31, users can choose to apply for a one-month test panda Safety Gateway through the Panda's safe channel partner, or test the "Panda safety Gateway +pcop" deadline. During this time, each user completes the test and satisfies the relevant terms. Both the general generation, channel operators and users will receive the corresponding reward coupons, the voucher effective time until December 31, and the bonus coupons are cumulative. By the ...
The article is about cloud security can not be ignored, security is the service will grow? I saw the previous two days in the relevant web site cloud security can not be ignored, security is the growth of information services will be very good, to take out for everyone to share, the following is the details of the article introduced, hope you learn from. When you ask IT pros whether they are using cloud computing or software as a service, most people will say "no" at first, but when you ask a few questions, you will find that most people will use some kind of SaaS application. In the area of security, this role is more pronounced, and companies do not consider them to be using security as a service or ...
The two-day RSA 2010 conference ended in Beijing, but many in the industry and Internet security enthusiasts are still feeling the meaning of the end. So, 51CTO as a guest media, the General Assembly of the relevant reports. Here we'll tidy up the wonderful speeches in the conference. The following is a lecture by Assistant professor Haibo of the Institute of Parallel Processing, Fudan University, on the subject of the application of the trustworthy structure in the privacy and security of cloud computing services. See the RSA 2010 Information Security International Forum feature for more details. Haibo: Good afternoon! I am Chen from Fudan University.
Recently, a name "Bohu HD av" Trojan plug-ins make many antivirus manufacturers formidable. It is reported that the plug-in bundled with a special destruction anti-virus software "cloud security" function of the "hurricane" Trojan, not only shielding antivirus manufacturer Cloud security server, but also interference anti-virus software network communication and upgrades, so that users can not clear the Trojan horse. Antivirus manufacturers have exclaimed that more than 120,000 computers have been infected by this type of Trojan. As the earliest launch of the "cloud Killing engine" cloud security software, 3 ...
In the early days of the RSA 2010 conference, we listened to a number of speakers. 51CTO as a special media, the General Assembly of the relevant reports. See the RSA 2010 Information Security International Forum feature for more details. So, for some of the speeches that are involved in the conference, here's a summary. Now, let's review the "private Cloud Security Architecture Overview" brought by Zhang Zhenlen, the Greater China technology director of VMware. Zhang Zhenlen: Good afternoon! Today I am very happy to have such an opportunity to share with you ...
October 21, 2010-22nd RSA 2010 Congress is over, but at the conference, many of the speeches were superb. 51CTO as a special media, the General Assembly of the relevant reports. This time, we will summarize the speech content of Zheng Hongqing, director of the Global Enterprise Product development Department of Trend Science and technology. So, here's what he's talking about: Security and compliance challenges & Cloud security solutions for the cloud era (see the RSA 2010 Information Security International Forum feature for more). Zheng Hongqing: Dear friends ...
Today, the threat of viruses and Trojans to the internet has changed a lot, traditional artificial analysis is not enough to support the large number of virus samples. In this case, cloud security technology was born. It will be the original manual analysis of the traditional process of the virus into the server-side automatic processing process, which is a huge innovation in the security sector, but also Trojan makers are the most headache protection mode. Cisco's President Chambers has said that cloud computing will be a safe disaster, and this has sparked a big stir in the industry. Indeed, it is not sensational, data protection, terminal protection, virtual environment ...
Recently, NSFocus was invited to attend the "Five annual meeting of China Financial CIO" and make keynote speeches. This annual meeting with "cloud computing era Technology application innovation" as the theme, attracted by the ICBC, Agricultural Bank, Bank of China, Construction Bank, Citic Bank, Everbright Bank, China Securities Industry Association, Galaxy Securities, China Reinsurance Company, China Life, Taikang life and other dozens of units of several senior information experts and leadership. At the meeting, NSFocus financial industry sales director Shang Donglin to "financial site cloud Security monitoring ...
The concept of "cloud security" is controversial from the time it was proposed. Today I'm going to dissect cloud security in detail. To this end we need to understand how the traditional killing soft works. The traditional characteristic code kills the soft process generally as follows: The collection stage: A few users specifically reported, the manufacturer's reptile program, Miguan program--> analysis stage: Virus analyst, machine analysis--> feedback stage: The definition update of the hour once. From this we can see that the whole process is entirely the responsibility of the manufacturer. At the same time can also see such a process has a great flaw: 1, the cycle is too long. So so...
In recent years, with the development of information technology and Internet, all kinds of malicious programs such as viruses, trojans and worms show explosive growth, and the defense response system of traditional security software relying on malicious object database can not adapt to the fast changing network environment. The emergence of "cloud computing" technology has created an opportunity to solve this problem, so many security software vendors are moving the database to the cloud (server side) storage and sharing, to improve the accuracy of analysis and judgment. But this way still does not give full play to "cloud computing" advantage, because ...
Cloud computing's next key direction for IT development has been largely confirmed as the number of questions about cloud computing has become less and weaker. Cloud computing is so efficient, it is changing the entire IT industry, but security issues have always plagued the cloud. Cloud computing services own security risks with the application of the deepening gradually exposed. John Pescatore, chief security analyst at Gartner Consulting, said the cloud computing approach did not initially consider security design. This is tantamount to saying that cloud computing is inherently unsafe. Is the security of cloud computing really ...
"51cto.com Exclusive Report" Beijing time November 17 McAfee (McAfee) announced the launch of the McAfee Cloud Security program. The program helps software, a service (SaaS) vendor, improve security for its cloud-safe deployment. That is, you can provide protection for cloud computing vendors. The two leading actors in Beijing were the McAfee Asia Pacific Vice president Marc Olesen and McAfee Asia Pacific Chief technology officer Michael Sentonas. These two "M" heroes are very characteristic, Marc Olesen ...
March 9, 2011: In Beijing, McAfee today announced the official launch of a new cloud data center, the 5th Cloud Data Center to be launched in a year. The data center is located in London, UK, and its launch further expands McAfee's global cloud security layout. Several other data centers are located in Amsterdam, the Netherlands, Sydney, Japan, Tokyo and North America. McAfee's other data centre in Hong Kong is expected to be launched in the coming weeks. The rapid deployment of the cloud data center fully demonstrates McAfee's confidence and ability to meet the world's industry-leading power ...
McAfee's vice president and Asia Pacific chief executive Michael Sentonas briefed us on the threat posture of the new era in a media communication conference on cloud Security Program November 17, 2010. According to Michael Sentonas, the number of malware that occurred in the year 09 exceeded the total of malware over the years, and the trend is now exploding. This is a huge challenge for each of us. According to McAfee, about 100,000 new malware can be found every day. About 5,500 of them ...
March 9 News, the well-known security enterprise Jinshan network and commercial Wi-Fi service provider Michael reached strategic cooperation for more than 6,000 businesses in Beijing to provide cloud security Internet services. This cooperation makes the Jinshan poisonous cloud safe and open system let Beijing establish to become the national largest free safe internet area. According to the introduction, including Island Coffee, Burger King, Haagen-Dazs, Yonghe king, COSTA, Brown Plantronics, Barbera, red card coffee, etc., Beijing's most well-known business and leisure venues of the Wi-Fi internet access to the Golden Hill poison PA Cloud security system, where the Internet will not be affected by Trojans, viruses and so on ...
November 30, 2010, global leader in the world of Internet content security software and services, trend technology announced that in order to make Chinese customers better and faster cloud security protection, trend technology in Nanjing set up a special service for Chinese customers Web reputation query server. After testing, located in Nanjing, the new Web Reputation query server application, Web reputation query speed compared to the previous maximum can speed up more than 50 times times! Trend Technology says that in November 2010, by applying Global load Balancing Technology (GSLB), all of China's ...
March 11 News, Chris Thomas, head of the west Coast laboratory in Beijing, said the cloud security has become the mainstream of anti-virus software technology, while congratulating Jinshan poison fighter to become the world's first through the cloud security test antivirus software, he said: "Through the cloud security test also does show that Jinshan in the antivirus industry occupies a leading position." Yesterday afternoon, Thomas made a special visit to Jinshan Network, to Jinshan Poison PA issued the organization's first cloud security test certification, and congratulate Jinshan won, including Trojans, viruses and other tests, including seven "almighty" certification. At present all domestic anti ...
Chris Thomas, head of the west Coast laboratory in Beijing, said March 11, cloud Security has become the mainstream of anti-virus software technology, has become an important part of the anti-virus industry. As an international authority responsible for anti-virus software certification, he believes that for an antivirus software, cloud security testing has become indispensable. Yesterday afternoon, Thomas made a special visit to Jinshan Network, to Jinshan Poison PA issued the organization's first cloud security test certification, and congratulate Jinshan won, including anti-Trojan, virus and other tests, including seven "almighty" certification. At present all domestic anti ...
For cloud-safe services, WAF and DDoS attack prevention. Today there are a number of security offerings based on cloud services, including web and mail filtering, network traffic access control and monitoring, and tagging for payment card services. An important difference between security services is "in the cloud" or "for the Cloud," which is the security service that is integrated into the cloud environment as a virtual device for user and control. Security is the service (SaaS) that is designed to ensure that other cloud service providers transmit traffic and data through. In this article, we will focus on cloud-based web application filtering and monitoring to ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.