360 security Guardian "Download Cloud security": Safe download not afraid of poison

The most indispensable on the network is gossip, and a variety of hot information is exactly the breeding grounds for Trojans. Weibo "caught the door", Hunan satellite TV "water Door", Beast Beast "Turn the Door" and other popular events and video successive, countless curious netizens in search, download, sharing in the Trojan virus attack. According to the 360 Security Center, "2010 first half of the Internet Security Report," The network download has become the main route of transmission of Trojan virus, the proportion of up to 55%, the domestic daily about 1.45 million internet users because of downloading to the virus files and was attacked by Trojans, so that the computer system was damaged, account and

"Smart" cloud security won't be free

A lot of information security companies have just entered China and are generally taking a free strategy, especially since Qihoo announced the release of 360 antivirus software that is permanently free. Panda safety is not possible free panda safety China's CEO Jin Yu said in an interview, the Panda safe return to the Chinese market is a protracted war, the biggest problem is brand awareness, panda security to do is to ensure 100% compatibility and user experience. About the charge or free, Jin Yu that the "free" behind must pay the price, may later pay the maintenance cost than the antivirus software price is higher, ...

Check Point new Security Gateway Virtual version simplifies cloud security

The world's leading check Point Software Technology Co., Ltd. has recently launched a new security Gateway Virtual edition™ (VE) at the VMworld 2010 conference, which integrates Vmsafe, Use the industry's most advanced firewall to provide security to the cloud environment to help protect the dynamic virtual environment against internal and external security threats. The new security Gateway VE uses the Software blade architecture of Check Point to make the enterprise ...

Panda safely launches thousands of lottery experiences in hundred cities

Recently, the panda released the "cloud Security hundred city thousands of award-winning experience", which is the panda safe re-enter the Chinese market after the latest release of large-scale user experience program. From now until July 31, users can choose to apply for a one-month test panda Safety Gateway through the Panda's safe channel partner, or test the "Panda safety Gateway +pcop" deadline. During this time, each user completes the test and satisfies the relevant terms. Both the general generation, channel operators and users will receive the corresponding reward coupons, the voucher effective time until December 31, and the bonus coupons are cumulative. By the ...

Cloud security ignores the security that services will grow?

The article is about cloud security can not be ignored, security is the service will grow? I saw the previous two days in the relevant web site cloud security can not be ignored, security is the growth of information services will be very good, to take out for everyone to share, the following is the details of the article introduced, hope you learn from. When you ask IT pros whether they are using cloud computing or software as a service, most people will say "no" at first, but when you ask a few questions, you will find that most people will use some kind of SaaS application. In the area of security, this role is more pronounced, and companies do not consider them to be using security as a service or ...

RSA China Conference Haibo: The application of the trusted structure in the security of Cloud (1)

The two-day RSA 2010 conference ended in Beijing, but many in the industry and Internet security enthusiasts are still feeling the meaning of the end. So, 51CTO as a guest media, the General Assembly of the relevant reports. Here we'll tidy up the wonderful speeches in the conference. The following is a lecture by Assistant professor Haibo of the Institute of Parallel Processing, Fudan University, on the subject of the application of the trustworthy structure in the privacy and security of cloud computing services. See the RSA 2010 Information Security International Forum feature for more details. Haibo: Good afternoon! I am Chen from Fudan University.

"Hurricane" Trojan Storm cloud security antivirus manufacturer formidable

Recently, a name "Bohu HD av" Trojan plug-ins make many antivirus manufacturers formidable. It is reported that the plug-in bundled with a special destruction anti-virus software "cloud security" function of the "hurricane" Trojan, not only shielding antivirus manufacturer Cloud security server, but also interference anti-virus software network communication and upgrades, so that users can not clear the Trojan horse. Antivirus manufacturers have exclaimed that more than 120,000 computers have been infected by this type of Trojan. As the earliest launch of the "cloud Killing engine" cloud security software, 3 ...

RSA China Convention Zhang Zhenlen: Overview of Private Cloud Security Architecture (1)

In the early days of the RSA 2010 conference, we listened to a number of speakers. 51CTO as a special media, the General Assembly of the relevant reports. See the RSA 2010 Information Security International Forum feature for more details. So, for some of the speeches that are involved in the conference, here's a summary. Now, let's review the "private Cloud Security Architecture Overview" brought by Zhang Zhenlen, the Greater China technology director of VMware. Zhang Zhenlen: Good afternoon! Today I am very happy to have such an opportunity to share with you ...

Trend Technology Zheng Hongqing: Cloud Security and Compliance challenges & Solutions (1)

October 21, 2010-22nd RSA 2010 Congress is over, but at the conference, many of the speeches were superb. 51CTO as a special media, the General Assembly of the relevant reports. This time, we will summarize the speech content of Zheng Hongqing, director of the Global Enterprise Product development Department of Trend Science and technology. So, here's what he's talking about: Security and compliance challenges & Cloud security solutions for the cloud era (see the RSA 2010 Information Security International Forum feature for more). Zheng Hongqing: Dear friends ...

The Trojan that specializes in domestic cloud security appears to be the best way to deal with the active defense

Today, the threat of viruses and Trojans to the internet has changed a lot, traditional artificial analysis is not enough to support the large number of virus samples. In this case, cloud security technology was born. It will be the original manual analysis of the traditional process of the virus into the server-side automatic processing process, which is a huge innovation in the security sector, but also Trojan makers are the most headache protection mode. Cisco's President Chambers has said that cloud computing will be a safe disaster, and this has sparked a big stir in the industry. Indeed, it is not sensational, data protection, terminal protection, virtual environment ...

Cloud security monitoring and security of financial website

Recently, NSFocus was invited to attend the "Five annual meeting of China Financial CIO" and make keynote speeches. This annual meeting with "cloud computing era Technology application innovation" as the theme, attracted by the ICBC, Agricultural Bank, Bank of China, Construction Bank, Citic Bank, Everbright Bank, China Securities Industry Association, Galaxy Securities, China Reinsurance Company, China Life, Taikang life and other dozens of units of several senior information experts and leadership. At the meeting, NSFocus financial industry sales director Shang Donglin to "financial site cloud Security monitoring ...

Analyze cloud security Hype or utility (1)

The concept of "cloud security" is controversial from the time it was proposed. Today I'm going to dissect cloud security in detail. To this end we need to understand how the traditional killing soft works. The traditional characteristic code kills the soft process generally as follows: The collection stage: A few users specifically reported, the manufacturer's reptile program, Miguan program--> analysis stage: Virus analyst, machine analysis--> feedback stage: The definition update of the hour once. From this we can see that the whole process is entirely the responsibility of the manufacturer. At the same time can also see such a process has a great flaw: 1, the cycle is too long. So so...

Kaspersky Cloud Security upgrades start using file Reputation technology

In recent years, with the development of information technology and Internet, all kinds of malicious programs such as viruses, trojans and worms show explosive growth, and the defense response system of traditional security software relying on malicious object database can not adapt to the fast changing network environment. The emergence of "cloud computing" technology has created an opportunity to solve this problem, so many security software vendors are moving the database to the cloud (server side) storage and sharing, to improve the accuracy of analysis and judgment. But this way still does not give full play to "cloud computing" advantage, because ...

Cloud security problem can crack firewall not foolproof

Cloud computing's next key direction for IT development has been largely confirmed as the number of questions about cloud computing has become less and weaker. Cloud computing is so efficient, it is changing the entire IT industry, but security issues have always plagued the cloud. Cloud computing services own security risks with the application of the deepening gradually exposed. John Pescatore, chief security analyst at Gartner Consulting, said the cloud computing approach did not initially consider security design. This is tantamount to saying that cloud computing is inherently unsafe. Is the security of cloud computing really ...

Interview McAfee "M duo" to feel McAfee Cloud security confidence

"51cto.com Exclusive Report" Beijing time November 17 McAfee (McAfee) announced the launch of the McAfee Cloud Security program. The program helps software, a service (SaaS) vendor, improve security for its cloud-safe deployment. That is, you can provide protection for cloud computing vendors. The two leading actors in Beijing were the McAfee Asia Pacific Vice president Marc Olesen and McAfee Asia Pacific Chief technology officer Michael Sentonas. These two "M" heroes are very characteristic, Marc Olesen ...

Maikfeil security layout expands five times times

March 9, 2011: In Beijing, McAfee today announced the official launch of a new cloud data center, the 5th Cloud Data Center to be launched in a year. The data center is located in London, UK, and its launch further expands McAfee's global cloud security layout. Several other data centers are located in Amsterdam, the Netherlands, Sydney, Japan, Tokyo and North America. McAfee's other data centre in Hong Kong is expected to be launched in the coming weeks. The rapid deployment of the cloud data center fully demonstrates McAfee's confidence and ability to meet the world's industry-leading power ...

The threat trend of the new era cloud security imperative

McAfee's vice president and Asia Pacific chief executive Michael Sentonas briefed us on the threat posture of the new era in a media communication conference on cloud Security Program November 17, 2010. According to Michael Sentonas, the number of malware that occurred in the year 09 exceeded the total of malware over the years, and the trend is now exploding. This is a huge challenge for each of us. According to McAfee, about 100,000 new malware can be found every day. About 5,500 of them ...

6,000 free Wi-Fi hotspot access cloud security to create the largest area of safe internet access

March 9 News, the well-known security enterprise Jinshan network and commercial Wi-Fi service provider Michael reached strategic cooperation for more than 6,000 businesses in Beijing to provide cloud security Internet services. This cooperation makes the Jinshan poisonous cloud safe and open system let Beijing establish to become the national largest free safe internet area. According to the introduction, including Island Coffee, Burger King, Haagen-Dazs, Yonghe king, COSTA, Brown Plantronics, Barbera, red card coffee, etc., Beijing's most well-known business and leisure venues of the Wi-Fi internet access to the Golden Hill poison PA Cloud security system, where the Internet will not be affected by Trojans, viruses and so on ...

Set up Web reputation query server for domestic "cloud security" speed up 50 times times

November 30, 2010, global leader in the world of Internet content security software and services, trend technology announced that in order to make Chinese customers better and faster cloud security protection, trend technology in Nanjing set up a special service for Chinese customers Web reputation query server. After testing, located in Nanjing, the new Web Reputation query server application, Web reputation query speed compared to the previous maximum can speed up more than 50 times times! Trend Technology says that in November 2010, by applying Global load Balancing Technology (GSLB), all of China's ...

International authoritative Antivirus evaluation organization: Jinshan Poison PA won the world's first cloud security certification

March 11 News, Chris Thomas, head of the west Coast laboratory in Beijing, said the cloud security has become the mainstream of anti-virus software technology, while congratulating Jinshan poison fighter to become the world's first through the cloud security test antivirus software, he said: "Through the cloud security test also does show that Jinshan in the antivirus industry occupies a leading position." Yesterday afternoon, Thomas made a special visit to Jinshan Network, to Jinshan Poison PA issued the organization's first cloud security test certification, and congratulate Jinshan won, including Trojans, viruses and other tests, including seven "almighty" certification. At present all domestic anti ...

Total Pages: 17 1 .... 7 8 9 10 11 .... 17 Go to: GO
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.