Domestic well-known security manufacturers rising in Beijing recently unveiled the first comprehensive use of "cloud security" system of the annual new "rising Full functional Security software 2010" (three edition). The product is based on the world's leading "cloud security" system, the use of Internet technology, 150 million of users of the computer cloud security data dynamic analysis, with "total interception", "thorough killing" and "speed response" and other technical features. In particular, it is worth mentioning that the new virus response to the rapid increase of 10 times times, killing speed increased by 40%-60%. 498) this.width=498; ' ...
Since 2007, the trend in malicious code has been much different than it was before: the new threat is for profit, and the number is dramatic, trying to overwhelm the defenses of antivirus software in huge numbers. To the hacker's mind, a massive amount of malicious code has spawned a security-sector revolution, have long wanted to get rid of the "attacked-defense" passive situation of the anti-virus software manufacturers to change, the introduction of "cloud security" system to counter the malicious threat, and in the security industry triggered a cloud security "prairie fire." Oscar, general manager of the three-mode trend technology China, told reporters: "Cloud safety ...
Handle 1.5 billion end-user needs per day, check out 250,000 security attacks missed by traditional security vendors every month to fully guarantee Websense SaaS users security in China. Beijing, September 2009 – The world's leading web security, Data security and messaging security solutions provider Websense announces that the Websense SaaS Web and messaging security solution spans another important milestone. In August 2009, the solution can handle the security requirements of 1.5 billion end-user users within 24 hours. At the same time, websense every ...
Microsoft unveiled a security policy for its cloud services, and what will eventually develop into industry standards to ensure these services? Microsoft's approach has led to security. Microsoft's file, "Securing Microsoft's Cloud infrastructure," gives a high profile of what Microsoft will do to protect its infrastructure and its users ' data and applications. In a broad sense, these practices rely on risk assessment and defense-in-depth, as well as the risk reassessment of cyclical cycles and the development of appropriate new countermeasures to ensure that they are in a position to be ahead of the threat development. Microsoft also monitors laws on data confidentiality and integrity ...
There is no doubt that cloud security technology is a practical technology for the landing of cloud computing concepts. Each vendor has a different understanding of cloud security and begins to implement its own understanding into the product. To rising company, 360 companies, such as representatives of manufacturers, cloud security is interpreted as the use of terminals to collect viruses, trojans, and processing in the cloud, in turn, the virus library for more user services; With the trend of technology as the representative of the manufacturers, the cloud security rose to the Internet files, mail, Web pages for the credibility of the evaluation , in the cloud to establish a reputation mechanism on the Internet, using the reputation of the network with ...
In a test conducted by Cascadia Labs, an independent testing agency, Trend technology defeated four other Web Gateway security solutions to continue to play a leading role in the field. Trend Technology Beijing News-as the Cascadia Lab reported in the 3rd quarter of 2009, independent testers at Cascadia Laboratories have confirmed that trend technology's URL filtering and WEB-security technologies have overcome other similar market-leading products. Trend technology to prove to the industry again, trend technology? Cloud Security Intelligent Protection Network ...
Due to the expensive maintenance of hardware and software within the enterprise, it is logical to give the enterprise IT architecture to cloud computing. The main advantages include: when it architecture is offered to you as an Internet service, you no longer need to have the expertise or control, you just have to give everything to cloud computing, and the price is very affordable. But as with all new technologies, too many people are deploying cloud computing solutions that have not yet been able to consider security issues. Here are the views of six IT security professionals on the definition of cloud computing and how to protect the security of cloud computing. Ford Motor Company's Ann ...
Every day the new malicious code and malicious Web pages on the Internet are in the magnitude of hundreds of thousands of, which seriously threatens the security of users ' Internet access. These malicious code, and once rage shock wave and other traditional viruses, more varieties, newer and faster, completely economic interest-oriented, more in the form of a Web page to carry out a large area of transmission. "So the traditional malicious code signature-oriented defense technology has been muscle, the major security vendors have tried new ideas and technology in the security field, in the field of network security also appeared a new noun-cloud security." But cloud security is just an infrastructure, it is important to provide users with more ...
At the end of the year, the domestic anti-virus software manufacturers have released new products, in the process of investing heavily, "cloud security" has become the most recent industry's most popular vocabulary. For users and non-professionals, in the "cloud security" success after Dizzy, still not clear what new ideas, resources occupy small? Has the function been increased? Or is the security improved? Let's take a look at a manufacturer's explanation of "cloud security", "cloud security" incorporates parallel processing, grid computing, Unknown virus behavior judgment and other emerging technologies and concepts, through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to ...
The Cloud Security Alliance (CSA) released its second edition of the Security Application Guide for cloud computing Services in Thursday. The nonprofit alliance was formally established in April to promote best practices in cloud computing security. They released their first edition of the Guide at the 2009 RSA Conference, the most authoritative annual summit in the global Information security arena. Jim Reavis, co-founder and executive director of the Cloud Security Alliance, said the new version of the key area of cloud computing's focus Guide-version 2.1, provides more specific information in some areas and offers more practical advice. He also said that this ...
Absrtact: Many industry manufacturers have launched the "Cloud Computing" program, although these "cloud computing" the focus is different, but the use of Internet ideas to reduce costs, improve efficiency, but is one of the common ground. So what should the security industry's "cloud computing" look like? The answer is: cloud security. Recommended White paper: Yan-Shen convinced wide-area network acceleration Equipment Report web World Evaluation Laboratory using the leading test method rigorous testing deeply convinced wide-area network acceleration Equipment M5100-Q, it will have any amazing performance? To destroy the defenses of antivirus software, the virus maker resorted to the virus ...
Cyber-crime may use the same attack technology for a long time, but in an age of information explosion today, a lot of it makes it easier for them to attack specific users and implement more complex social engineering strategies. Chirstian Christiansen, vice-captain president and industry analyst at IDC Security products and services, said the target attack exploited browser vulnerabilities and then tried to find vulnerabilities in Web applications and cleverly achieved the goal of deceiving end users and infiltrating corporate networks. From recent attacks on Google and nearly 20 other companies ...
Sun Microsystems today unveiled innovative, open source cloud computing security tools and announced support for the latest security specification for the Cloud Computing Security Alliance (Cloud). The move is part of Sun's strategy to help customers and partners create an open, interoperable public cloud and private cloud. Sun is committed to providing the best technology and practice to help users escort key data in the enterprise and cloud. The release of Sun's cloud-safe structured modules will be used for ...
Data security has been a source of concern since 2005, when Bank of America encrypted tapes were lost, resulting in a large disclosure of customer data. Before that, some of the bank's system administrators thought that tape encryption devices were too expensive, and some administrators thought that data encryption was like insurance, not the first thing to do, and that some administrators ran aground because they didn't know whether to buy backup software or buy security software. The US bank leaked customer data in violation of local law, but the Specter-leahy Law stipulates safe data and passenger ...
If the 2009-year information security industry hot spots, there is no doubt that "cloud security" technology deserved. According to the reporter observes, whether is new technology or the newly application, the industry many mainstream security manufacturers all are moving toward "the cloud" to move closer. Interestingly, as cloud security applications become increasingly important, protection technologies for cloud server groups are emerging. It can be said that the current "cloud" more and more flavor. Puzzle One: Understanding "cloud security" technology before you understand the "cloud security" technology, the reporter should first emphasize that cloud security is not an absolute new technology. In fact, along with the cloud computing technology ...
I took part in Gartner Data Center Conference, held in Las Vegas, USA, in December, hoping to learn more about how corporate IT professionals think about virtualization and cloud computing through this live observation. Although I personally do not like the Las Vegas, but I still stroll around the pinball fans must visit the resort: Pinball Hall of Fame (Pinball Hall of Fame). From the point of view of information security, the attitude of Gartner analysts and attendees to cloud computing gives me a few points ...
2010 3, 2nd, Asia Pacific: WatchGuard Technology, a record two-digit growth in the Asia-Pacific region in the fourth quarter of 2009. Globally, WatchGuard also recorded profitable growth in the fourth quarter of 2009 and throughout the year. WatchGuard attributed this outstanding performance to the increasing global consumer acceptance, the new mid-tier market and corporate customers adopting their innovative functional firewalls, the award-winning remote computer secure access (SSL VPN) devices, and the most cutting-edge threat blocking services. "In the Asia-Pacific region, ...
With the rapid development of information technology, the development of virus technology is not outdated. So the new anti-virus technology comes into being under people's long-awaited--cloud security. See the cloud security is not a few don't think, with some cloud security technology application products appear, cloud security is no longer mysterious. It is shocking to learn recently about a group of numbers on viruses. The number of new viruses per hour in 2005 is 38, the number of new viruses per hour in 2007 is 627, and the number of new viruses produced per hour in 2008 is nearly 2000. With the development of technology, the number of viruses in the future ...
The "51cto.com exclusive translation" Cloud Security Alliance (Cloud) released its first concise report on cloud security risk and a more lengthy "critical regional Security Guide" for the CSA (download address: http:// Cloudsecurityalliance.org/csaguide.pdf, for the biggest threat listed in the report, CSA condensed the 76-page Security Guide to 7 of the most common, most dangerous threats, based on these ...
The hustle and bustle surrounding cloud computing may make you think that there will be a massive adoption of cloud computing tomorrow. However, many studies have shown that security is the biggest obstacle to large-scale adoption of cloud computing. The reality is that cloud computing is just another step in the way of technology evolution along host, client/server, and Web applications, so it has its own security problems, just like all other phases. Of course, security concerns do not prevent the use of these technologies, nor can they prevent the adoption of cloud applications that address the real business needs. To ensure that the cloud ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.