"Cloud security," Is it really safe?

As if overnight, almost all the software manufacturers have sprung up their own "cloud security." The emergence of cloud security as the saviour of the security world has greatly improved the ability of anti-virus software. At present, each family has described its own cloud security is unusually outstanding, although it is the choice of words, but a little attention to their talk can find that the description is almost the same thing.   Below, I show you the anti-virus company "cloud security" before and after the update of the virus library step contrast, we know what "cloud security" is what. Cloud security, as the name suggests, is a ...

Rising experts detailed analysis of the "cloud" of the five major security issues

Since August 2006, when Google began to propose the concept of cloud computing (Cloud Computing), the concept of "cloud" has been hot for five years, has been popular in many areas, especially by the IT industry, the media and users of the hot.   Whether software vendors, hardware manufacturers, mobile phone manufacturers or internet manufacturers are throwing their own "cloud computing" programs. But it is often said that the advantages of "cloud", including access, on demand, at any time to expand, according to the advantages of the use of fees are repeatedly mentioned. But in safety, ...

Hannover Information and Communication Technology Expo focuses on cloud computing

The photo shows the LTE technology high-speed router and modem displayed on the show. The world's largest information technology expo--Germany Hannover Information and Communication Technology Expo March 1 officially launched. More than 4,200 exhibitors from 70 countries will showcase their latest technologies and services on topics such as cloud computing. In the past year, the world's cloud computing revenues were € 53 billion and are expected to soar to € 115 billion in 2014, according to the German Federation of Information Economics, communications and new media. The Expo is to be extended from March 1 to 5th.

The role of cloud computing and virtualization in data center security

Virtualization and cloud with synchronous security provide the ability to manage and automate it mission-critical tasks more effectively.   In an era where it resources are more stressful than ever and the budget is stressful, this is an important opportunity for companies to stay competitive. Over the next 2010 years, the benefits of virtualization and cloud computing will be included in the discussion of the IT infrastructure of most enterprises. Virtualization has proven its value, cost savings, and better utilization of resources through server consolidation. In the server ...

EMC CEO of Greater China: Huawei in 10,000 dollar cloud computing market

EMC Global Senior Vice President, Ye Chenghui, president of Greater China (Tencent Science and Technology map) March 2 News, EMC Greater China Region President Ye Chenghui yesterday in an interview with Tencent Technology, said the company's strategy in China from the private cloud to the mixed cloud, which is a very important reason customers have public cloud demand. Ye Chenghui revealed that the promotion of small and medium-sized enterprises will remain one of the focus of the Chinese market, from this income has accounted for the total income of the landfilled. To this end, EMC has specifically developed a 10,000-dollar entry-level product, with the main competitor being Huawei. The following is an interview with the leaf-hui text ...

The public cloud and the private cloud, who is more secure?

According to Bernard Golden, chief executive of Hyperstratus Consulting, a survey of one after another shows that security is the most worrying issue for potential users of public cloud computing. For example, a April 2010 survey noted that more than 45% of respondents felt the risk of cloud computing outweighed the benefits. A similar concern was found in a survey conducted by CAS and Ponemon Cato. However, they also found that despite these concerns, cloud applications are still being deployed ...

Trend technology to build information security platform

In the process of rapid development of enterprise informatization, the problem of network security has been affecting the efficiency of it usage, especially the problem of theft caused by web threat to the enterprise.   In this respect, the security manufacturers have also begun to make an impact, to build information security platform.   Recently, the trend of science and technology to assist the Jiangsu Taizhou Port Ship Co., Ltd., the use of trend technology to provide a Web security access Control Gateway (IWSA) for the company intranet users with "disinfection" of the network access to exports. It is understood that the Taizhou port ship now has nearly 500 terminals and dozens of servers, including the mail ...

Understanding the cloud security of antivirus software

At the end of the year, the domestic anti-virus software manufacturers have released new products, in the process of investing heavily, "cloud security" has become the most recent industry's most popular vocabulary. For users and non-professionals, in the "cloud security" success after Dizzy, still not clear what new ideas, resources occupy small? Has the function been increased?      Or is the security improved? Let's take a look at a manufacturer's "cloud security" explanation, "cloud security" fusion of parallel processing, grid computing, unknown virus behavior and other emerging technologies and concepts, through the network of a large number of clients on the Internet software behavior of the different ...

Defending cloud security and unveiling a new era of "full cloud audit"

The beginning of "cloud computing", the question of its security has never stopped, cloud computing is a fire, but the cloud security problem is also quite a headache. Enterprises concerned about their own data will not be wantonly acquired, tampering, the most concern is that their private information will not be intentional or unintentional leakage. When the enterprise gives the data to cloud computing service provider, has the data priority access is not the enterprise itself, but the cloud computing service provider. In this way, it is not possible to exclude enterprise data from being compromised. In addition to cloud computing service providers, a large number of hackers who covet cloud data, they continue to tap the service providers ...

Cloud security gradually receives the attention of users

As cloud computing is increasingly being understood by more and more enterprise users, the security problems brought by "cloud" are gradually heating up.    At the world Security (RSA) conference just convened this year, the security issue of cloud computing has become the absolute mainstream topic, "cloud security" has undoubtedly become one of the biggest hotspots in the security field in the 2010. The idea that the cloud would be a safe disaster has sparked a big stir in the industry, said Cisco's President Chambers. In fact, it's not sensational, data protection, terminal protection, risk management in virtual environments ...

Trojan Horse specializes in domestic cloud Security Initiative defense into the best response

Today, the threat of viruses and Trojans to the internet has changed a lot, traditional artificial analysis is not enough to support the large number of virus samples. In this case, cloud security technology was born.   It will be the original manual analysis of the traditional process of the virus into the server-side automatic processing process, which is a huge innovation in the security sector, but also Trojan makers are the most headache protection mode.   Cisco's President Chambers has said that cloud computing will be a safe disaster, and this has sparked a big stir in the industry. Indeed, this is not sensational, data protection, terminal defense ...

Cloud Security: Public Cloud pack who can stay away from listening?

Over the past few years, there has been a constant clash between ISPs, Internet connection providers and large online media such as Google, Yahoo and YouTube. The core of this problem is whether the ISP has the right to block or postpone connections to certain networks, certain content, or some applications, and whether the ISP has the right to charge a higher connection charge for a particular object.   The current situation is that ISPs charge only for Internet connection usage, regardless of the purpose of the network connection. But the US Federal Communications Commission (FCC) has just announced a compromise ...

The business path of cloud computing: security issues are the guarantee of development

In September 2010, after a bout of white-hot competition, Hewlett-Packard eventually beat Dell at $33 a share of about 2.35 billion dollars, successfully acquiring 3Par of data storage, before 3Par's share price was less than 10 dollars.  What makes the two giants so interested in a store that has only 1 billion of its revenues, and to incur the cost of it? The answer to this question is only one keyword: "cloud". The Chairman of HP Singapore Laboratory, Chris Whitney, said in an interview that Asia ...

"Refinement" to solve the cloud-era security puzzle

In the face of the huge changes brought about by cloud computing and virtualization, it is unrealistic to hope to solve complex cloud security with one or two products or a set of solutions. According to the forecast of network environment released by Trend technology company, there will be more proof-of-concept attacks against cloud infrastructure and virtualization system in 2011. Cloud computing and virtualization will bring a lot of investment return and cost savings to the enterprise, but also put the server outside the traditional security boundaries, so that network criminals have more space to play, to infiltrate the cloud.   It will highlight the key to the information security of cloud service providers. In addition, the city ...

Jinshan Network invested 30 million yuan to implement cloud security cooperation program

TechWeb News February 21, Jinshan Network announced today, put 30 million yuan to implement the "Cloud Shield" program, and officially open its cloud Security Platform API interface, Baidu, AO Tour manufacturers have been involved in cooperation. Jinshan Network said that it will open its Web site security, file security inquiries, including the cloud security platform, allowing web browsers, search engines, instant Messaging IM, e-commerce, online games, software download tools, such as third-party application providers free of charge interface to provide users with security features or services. Jinshan Network will also invest 30 million yuan, ...

RSA President: Cloud Security is inseparable from virtualization

RSA President Art Coviello said: "Virtualization technology helps to achieve better security and control in the cloud computing environment." In a speech at the RSA Conference, Coviello a bullish argument about cloud security. He argues that some companies are largely skeptical about moving data and apps to the cloud, and that the solution is actually easier than many people think. "The trust mechanism for cloud services is now in place, and the key is to stop relying on the design of physical infrastructure security controls," Coviello said. On the contrary, the enterprise ...

Cloud security is a huge challenge for cloud computing's future development

At present, the whole world has set off a Geoyun upsurge. "Clouds", "Jianyun", "Deng Yun", "Driving Cloud", "Teng Yun" heat wave high waves. Google, IBM, Microsoft and other IT giants to the unprecedented speed and scale to promote the spread of cloud computing and development, a large number of academic activities with business advocacy, quickly put the concept of cloud computing into a leadership and entrepreneurial agenda; Media hype, but also to the peak of cloud computing.   Desperately for capital. However, the hype and clamor of the "mystery cloud" will eventually dissipate. The attic in the clouds always lands. With cloud planning, cloud outlines ...

Symantec new product first equipped with cloud technology insight

February 16 News, according to foreign media reports, Symantec recently released endpoint homeowner 12, this is the company's first use of cloud technology insight, the collection of 2.5 billion software files of the intelligent database to help PC identify malware and block it.   The company's sonar 3 hybrid behavior Trust engine can prevent the 0 threat by analyzing the behavior of a piece of code, rather than through traditional signature file analysis techniques. The performance of the new version of the software is also a key factor, according to the company's European product marketing manager Mik ...

Security risks and solutions for the cloud computing age

Definition and status of cloud computing cloud computing is the development of parallel computing, distributed computing and Grid computing. At present, cloud computing industry is divided into three layers: cloud software, cloud platform, cloud equipment. Top Rating: Cloud software provides a wide range of software services. Participants: Software developers from around the world; Middle Level: Cloud Platform Program development platform and operating system platform. Participants: Google, Microsoft, Apple, lower rating: Cloud Device integration infrastructure.   Participants: IBM, Dell, HP, Amazon. Second, the important characteristics of cloud computing (a) super large-scale. "Cloud ...

Where is the bad security of cloud computing a problem?

Cloud computing security issues have always been a concern!   Here's the annoying thing: last month, a hacker claimed to have entered many government, military and university websites, only because the sites were weak and easily hacked.   Cloud computing bad security, where is the problem! Consider if the hacked sites were sold by hackers at less than 500 dollars: Michigan and Utah State government websites, South Carolina State National Guard websites, Italian and Arab government agencies, and perhaps most worried about the beauty of battlefield systems software engineering ...

Total Pages: 2156 1 .... 1409 1410 1411 1412 1413 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.