ATM uses cloud computing for security reasons

Miel's electronic security Avinash Kada, in an information weekly, writes that ATM's private cloud computing can help solve problems such as ATM theft, safe cutting, the use of explosives to blow up ATM and Rob cash processing, as this can become a more automated process. Talk of cloud computing and security over the past few years has prompted the cloud to become safer now, according to the Wall Street Journal, where a company seeks protection for data collected by ATM's cloud. Diebold is developing a machine that will use the cloud to remotely store information to reduce the risk of data disruption ...

ZTE Network, "cloud security" to help Beijing e-Government network

With the rapid development and wide application of information technology, information infrastructure has become an important foundation and impetus of economic and social development. As early as 2009, according to the historical stage of Beijing Development and the strategic goal of building the world city, the municipal government proposed the Beijing Informatization Infrastructure Upgrading plan (2009-2012) as an important strategic measure to enhance the comprehensive competitiveness of the city and promote the stable and sustainable development of the capital economy. Through the implementation of the plan, information and industrialization further integration, to meet the development needs of various fields and industries. As an important part of information ...

Cloud Passage launches new cloud security software

A few days ago, Cloud Passage, a manufacturer dedicated to cloud computing and virtual server security products, unveiled security products for virtual servers in a public cloud environment (such as Amazon's cloud services). Cloud Passage spokesman said the product could help users solve all the security problems they encounter when using a public cloud service. "This security product, known as Halo Netsec, is a product with both firewalls and dual authentication capabilities," said Rand Wacker, vice president of Cloud passage products.

Cloud computing security, road at the foot of cloud computing tornado storm

August 9, 2006, Google CEO Eric Schmidt first proposed the "Cloud computing" (Cloud Computing) concept in the search engine conference. Since then, the concept of "cloud computing" has expanded at an extremely rapid pace, and everything in the ICT industry has been tagged with "cloud" and flown into the air. In 2011, Google and Baidu search for "cloud computing" and "cloud computing", respectively, feedback more than 100 million and 4千多万条 results, "cloud computing" the heat can be seen ...

The similarities and differences and challenges of cloud computing security and traditional security

Similarities and differences between cloud computing security and traditional security Why do we say cloud computing is not as safe as traditional security? Now let's look at their similarities and differences. The same point: the first goal is the same, the protection of information, data security and integrity, the second protection object is the same, protection of computing, network, storage resources security; The third technology is similar, such as the traditional encryption and decryption technology, security detection technology. Different points: For example, the security problems caused by cloud computing service model, the technology and management problems caused by virtualization. What are the security threats that cloud computing security faces? Mainly from the technology, management and ...

Analysis of security strategy and risk point of cloud computing data center

At present, cloud computing industry is highly praised by the industry and launched a series of services based on cloud computing platform. But security has been a concern in the already-implemented cloud computing services. Security and privacy issues have become one of the main obstacles to the spread and spread of cloud computing. January 21, 2011, ITGI, a research firm, says many companies are controlling investment in cloud computing, given the security of their data. Half of the 834 CEOs of the 21 companies surveyed said they were delaying the deployment of the cloud for security reasons ...

Security analysis of cloud computing data center

At present, cloud computing is highly praised by industry and launched a series of services based on cloud computing platform. But security has been a concern in the already-implemented cloud computing services.   Security and privacy issues have become one of the main obstacles to the spread and spread of cloud computing. In an IDC survey of "What do you think the challenges and problems of cloud computing model" is, security is at the top of the 74.6% ratio, and the security issue is the biggest concern for cloud computing. January 21, 2011, ITGI from the research company said, considering the security of its own data, ...

The five biggest threats to cloud computing

Cloud computing is the field of the current IT industry's most future trends. It can significantly reduce costs and improve efficiency. However, while large or small businesses are introducing cloud services for software systems and infrastructure, the cloud's application experience is not always perfect. People must understand the serious threat to cloud computing and work out the appropriate response.  Below, the foreign media lists the five major threats facing cloud computing. The five major threats to cloud computing one, service disruption even if SLA service level agreements are implemented, some cloud services may be down. ...

SK Telecom in Korea takes the lead in strengthening cloud security system to provide anti-virus services

January 19, 2012 South Korea's SK Telecom started providing antivirus services in the enterprise-specific cloud services this month 19th, and has begun to further strengthen the ' cloud security ' system. The application of antivirus service is to strengthen the cloud technology by the "terminal, service platform, communication network," the Service Platform security services. Unlike the general computer-specific anti-virus software, the service platform uses anti-virus software primarily for enterprises with servers. Existing service platform with anti-virus software should be on a platform of the annual fee is 50~100 million won around, belong to ...

"Password Gate" event for China cloud computing security sounded the alarm

A few days ago, China's Internet outbreak has been the most widespread, the largest and most harmful leakage incidents, the cumulative leak user password up to 230 million. It is also predicted that because users may use the same registration name, mailbox, password in other sites that are not compromised, the disclosure will indirectly affect the information security of a total of 500 million accounts. Such a serious password leak has once again put the Internet security issue on the cusp. Since China's current Internet applications are used to communicate or publish information, users are still relatively little stored in private data from operators. However, with the widespread popularity of cloud computing, the number ...

Document] Security perspective the Cloud Computing with Survey of the security Issues

Security perspective the Cloud Computing with Survey to security Issues S.thirukumaran M.sanjay Ram A.vijayaraj Abstract:cloud Computing super-delegates elevated IT to newer limits by offering the M ...

[Document] Cloud computing security

Cloud computing security [outline] 1. Cloud computing Concept 2. Cloud computing security 3. Cloud Computing's summary http://bbs.chinacloud.cn/showtopic-10718.aspx

Cloud Security alliance: An important risk list for cloud computing

Some of the most important risk lists for public cloud computing are broad and complex, such as the Cloud Security Alliance's 1.0 edition of the important risks of cloud computing. Most risk lists contain the following items: 1, network security from the point of view of IT managers, this one is still the first to take the lead.      This article also includes some data protection and privacy subcategories, from the physical security and application security of software that is a service provider (SaaS), as well as over advertising leaks. Steve MacLellan is the Boston Fidelity Technology Group ...

Rising "cloud killing" online to solve a number of industry problems

Tencent Science and technology news August 30, recently, rising "cloud killing" new on-line, is integrated in the rising Internet security assistant. It not only solves the past anti-virus software virus library too large, consumes more resources, scanning slow and other difficult problems, but also to avoid the common anti-virus software manslaughter, false positives, and for users to design personalized and accurate local virus library information, so that the killing virus to carry out more efficient. From the current laboratory data, the mainstream 500G hard drive, rising "cloud killing" can be scanned in 20-30 minutes, than the traditional engine killing speed has significantly improved, rising client and "...

Cloud computing era must be safe to escort

Few people will deny that cloud computing is the most important it trend of the era, a few years ago people will ask what is cloud computing, cloud computing is the concept of speculation or the future direction of development? And now there is no doubt that cloud computing is the most important it change of the era. As the trend Technology chairman Zhang Ming said, cloud computing is like playing baseball, a total of nine levels, but we have now reached the second level. At the first level, we ask what is cloud computing, is cloud computing a trend? But now very few people ask this question, now more concerned about cloud applications, how to use to reduce the enterprise ...

Cloud computing needs to make security a priority

Cloud computing is an emerging technology system that also offers new business opportunities, the fourth it revolution following mainframes, PCs and the Internet. There have been more and more discussions about cloud computing in recent years. Cloud preachers tell people that "cloud" means unprecedented convenience and value.      However, in practical applications, the "cloud" of doubt has not been dispelled. To best understand the potential risks and corporate rewards, you should try to find opportunities to strengthen communication and communication with the security team, Forrester Research ...

The last line of defense for the storage security system

We've all seen reports of hacking in the systems of some big companies, generally speaking, the hacker starts from obtains the root access right, once obtains the root access, may say your any file, as long as the intruder wants, they all can take away, this raises two questions: · Should the data path be more secure? · What should we do if the data path should be more secure? Should the data path be more secure? Seems to be a little crazy, people told me that there is no storage security requirements, the need for the network ...

How the cloud solves security problems

Raise a question about cloud security to five different people, and you may get five different views. Cloud phenomena are rapidly evolving and changing so that the rules of security and other related regulations are difficult to keep up with. The concepts applicable to cloud, such as multi-tenant and unified user identification, are forcing security vendors to provide new and better responses. But when they are ready, the cloud may have created a whole new set of security challenges. The standard may be an answer, perhaps not an answer, because the standard has a fixed time to keep up with or predict fast-growing innovations. Therefore, there must be a ...

Trend technology and Dell join hands to pave the path of virtualization security

Global virtualization Security and cloud computing security manufacturers-trend technology company recently announced that it will accelerate with Dell (China) Limited to deepen China's local finance, government, manufacturing and other industry-wide strategic cooperation, the two sides will be through complementary solutions for the customer's virtualization path to provide further security. April 7, 2011, Trend Technology (China) Co., Ltd., Shengli Petroleum Administration of Sinopec, Guangzhou Power supply Bureau of Guangdong Grid Company and Dell (China) Co., Ltd. in 2011 Dell China Technology ...

Gouffouin identity and access security centralized management system escort cloud security

"Surging" to describe the concept of "cloud computing" in today's heat is not too, using "Yunshan" to describe the concept of "cloud computing" in the reality of the state is not too. "Cloud computing" was officially slogan by a young Google engineer in 2006 and has now sparked a "cloud" boom around the world.   "Cloud" further triggered the "clouds security", in the surging behind, "cloud security" problem is more attention. While cloud computing provides value to the enterprise, it also ...

Total Pages: 2156 1 .... 1406 1407 1408 1409 1410 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.