Further explanation of cloud security and active defense

A period of time ago sent 2 posts cloud security is safe and cloud security is two, did not expect to attract a lot of saliva. And some friends simply put cloud security as the representative of Jinshan, 360 as the representative of active defense, and compare the two.   There is clearly a misunderstanding, here further to the cloud security and active defense to do an explanation, welcome to discuss, do not spit. First said active defense, this is the micro point of Mister Xu first proposed, Xu Everyone is not necessarily very familiar with, but in the industry this is a very cattle name, because he is also the original Rui ...

Rising will invest in Qingdao to build the world's largest cloud security service center

Recently, rising to Qingdao, the plan to invest in Qingdao to build the world's largest "cloud Security Service Center", and increase the "online expert out-patient" service system construction investment.   This is the first time since the March 18 rising personal Software announced a permanent free, new initiatives in the service.   The investigation by the Qingdao Government attaches great importance to the municipal commission of the letter entrusted to communicate with enterprises, the two sides on the Qingdao information Industry investment environment and development planning issues such as full exchange, and the rising express sincere welcome. It is said that ...

The latest "security" view of cloud security technology

Cloud Security Program is the latest manifestation of information security in the network era, it integrates the new technologies and concepts such as parallel processing, grid computing, unknown virus behavior judgment, and obtains the latest information of Trojan and malicious programs in Internet through the network of a large number of clients ' abnormal monitoring of software behavior. Transfer to the server for automated analysis and processing, and then distribute virus and Trojan solutions to each client.   Cloud security is the concept of enterprise creation in our country. Is cloud services secure? The U.S. government tells you in real action ...

Two big lies about cloud computing security

Bernard Golden, chief executive of Hyperstratus Consulting, wrote that one after another survey showed that security is the most worrying issue for potential users of public cloud computing. For example, a April 2010 survey found that more than 45% of respondents said cloud computing risks outweigh the benefits. A survey conducted by CAS and Ponemon Cato also found that users have such concerns. However, they also found that, despite the user's doubts, cloud applications were being deployed. Similar to ...

The successful winning Kylin safe Cloud operating system launches new cloud security architecture

With the development of domestic cloud computing industry, the construction of cloud computing infrastructure has been paid attention by many software vendors, and "cloud security" has become an important link in cloud computing development. Relatively speaking, the traditional operating system security problems will only affect the single machine, and the cloud operating system security problems will be running on the underlying platform of all virtual machines, the loss to users is immeasurable. Therefore, in the construction of cloud computing infrastructure platform, how to ensure the security of the basic platform has become the focus of attention of users. ...

Identity authentication and access management Escort cloud security

Identity authentication and access management Escort cloud security--CA Technologies IAM Strategy provides protection for cloud information security This article tag: Information channel cloud computing industry informatization "How do I manage my users ' SaaS account" and their access?   "How do I define and implement access policies for PaaS applications without creating more islands of security information?"   "How do I control the privileged users in IaaS, including each other and our own users?" It's not.

Protecting data security in the cloud who has the final say: Technology or system?

"Sadie Network-it Technology" in this year, at home, about cloud computing voice this time. It industry manufacturers if they do not let their products and clouds on the top, almost will feel very embarrassed, not with the times, it is really "out". You see, now even mobile phones are playing "cloud mobile phone" it! However, cloud computing sound is very hot, but the crowd is still not much, users are most worried about the data security problem in the cloud. Think about it also, the enterprise all the data is placed in the cloud, and, the application of virtualization technology also makes ...

Video: Cloud data security and monitoring (cloud computing)-quest-vizioncore

Cloud computing era, how we protect the cloud data, in time to monitor clouds to understand the cloud inside, dispel run cloud computing data Center: Vizioncore Focus on the field of virtualization management, Questsoftware focus on the field of performance monitoring, Powerful Alliance to build cloud computing era best Cloud Platform data protection and monitoring management platform. Cloud Data Protection module: Vranger/vreplicator Cloud Conversion module: Vconverter Cloud storage Optimization module: Voptimizer Pro; cloud performance monitoring;

Lenovo Network UTM system based on cloud security

National information security leading enterprise Lenovo network in the 2009 Unified Threat Management (UTM) product market share first, continue to increase investment in product development, July 2010 released the new UTM, in a significant increase in the original 6 major functions (firewall, VPN, antivirus gateway, intrusion protection, Anti-spam, web filtering, based on the latest development of the new cloud based active cloud defense function, the Internet's first threat to the "malicious site" has a qualitative leap in the protection effect. At the same time, this product combined with intelligent security management and continuous security services, play ...

Trend Technology Cloud security success in virtualization evaluation

The Global cloud security leadership brand-trend Technology (TSE:4704) 's enterprise-class cloud safety products deep Security has received two more awards in the United States, respectively, in the receptacle World magazine's "Best Informed Choice Test (Clear Choice test)",   And the world's authoritative third party evaluation agency, Tolly Group, has won the first place in the latest test for virtualization security Solutions products. Best report making and analysis function: Realizing virtualization system transparency ...

Cryptographic services and data security in Windows Azure

Many early adopters of the Windows Azure platform still have a lot of questions about platform security and its cryptographic support. Here, I'll introduce some basic concepts of encryption and related security in Windows Azure platform. It may take a lot of space to elaborate on this topic, so I'm just going to explain and revisit some of the cryptographic services and providers in Windows Azure.   Any transition to Windows Azure can also have some security implications. For any new platform or service delivery method, you will face ...

Controlling cloud security requires "people"

Sony recently leaked data from more than 100 million users, and the theft of credit card information from some users has become the focus of the global spotlight, as Amazon's cloud computing center has been attacked and exploited by hackers, all of which suggest that in this rapidly booming "cloud" market, Security will be the biggest challenge for enterprise cloud technology applications. In the 2011 China Network Operation Summit held recently, Li Hua, a general manager from Gu an world, made a speech about cloud security and web security threats and responses, and in the speech, Li Hua specifically talked about, as the cloud security seven big ...

Trend Technology CEO says separating hardware from encryption enables cloud security

Trend technology recently in the cloud computing security market and the field of virtualization focus on exerting force, Chen Yihua, chief executive and co-founder of Phoenix Technology, said that many people now have public clouds less than private cloud security such questions, but in fact the public cloud can start from management, so that the computer and data management encryption process completely separate, Achieve the goal of safety efficiency. In view of the public cloud's information security problem, Chen Yihua said that in the whole cloud security category, users are most worried about the data security problem on the public cloud, whether the public cloud can guarantee the data only ...

Iron Kings: Hit the safest data center

Iron Kings, an American company focused on storage backup and data security, has a secret database of security levels behind the White House and the Pentagon, about 66 meters underground, claiming to be one of the safest places on earth. Iron Mountain Company Data Center is huge, need to drive into the Tieshan company underground database area of 145 hectares, like Lime cave composed of a maze. In 110 basements, the size of a football field, they store confidential information from government agencies and corporate companies. There's a "911" incident that crashed ...

Maikfeil Security layout Expansion five times times global deployment

March 9 McAfee announced today that it is officially launching a new cloud data center, the 5th Cloud Data Center to be launched by McAfee in a year. The data center is located in London, UK, and its launch further expands McAfee's global cloud security layout. Several other data centers are located in Amsterdam, the Netherlands, Sydney, Japan, Tokyo and North America.     McAfee's other data centre in Hong Kong is expected to be launched in the coming weeks. The rapid deployment of the cloud data center fully demonstrates McAfee's confidence ...

Trend technology launches cloud computing security products

It technology has become a medium and small enterprise speed growth of "agent", but because of the lack of professional maintenance, some security software functions did not play to the limit, the network security management complexity is rising.   Recently, the trend of technology launched small and medium Enterprises security Package 6.0 products, grasp the small and medium-sized enterprise information Security management of cost control and maintenance of the specific needs of simple, using unique cloud security technology and product integration, release the small and medium-sized enterprises in the day-to-day network security management pressure. Network security management difficulty continues to climb by ...

Kim San-mai cooperation: 6,000 Wi-Fi hotspot access Cloud security

March 9 News, the domestic security enterprise Jinshan Network and commercial Wi-Fi service provider Michael reached strategic cooperation for more than 6,000 businesses in Beijing to provide cloud security Internet services. Jinshan Network claimed that the cooperation to make Jinshan poison PA cloud Security and open system so that Beijing has become the country's largest free safe internet access area. Including on the island of coffee, Burger King, Haagen-Dazs, Yonghe king, COSTA, Brown Plantronics, Barbera, red card coffee, etc., Beijing well-known business and leisure venues of the Wi-Fi internet services are connected to Jinshan poison PA Cloud security system, where the Internet will not be affected by trojans, viruses ...

Cloud computing security and privacy: identity and access management

Page 1th: Why use the IAM in the traditional sense, organizations invest in IAM practices to improve operational efficiency and meet requirements for regulatory, privacy, and data protection: improved operational efficiency The architecture of good IAM technologies and processes automates repetitive work such as user entry,   Thus improving efficiency (for example, self-service reset user request password without system administrator using Help desk dispatch system intervention). Compliance Management to protect systems, applications, and information from internal and external threats such as ...

Cloud security company Zscaler appointment Trend Former senior executive for COO

Beijing Time May 4 Evening news, cloud security company Zscaler announced in Wednesday, has appointed trend technology former executive Leine Baise (Lane Bess) for the company's new chief Operating Officer (COO). "Bass has extensive experience in running fast-growing start-ups, building business partnerships and managing operations," Zscaler said in a statement. "Bass has been the CEO of Palo Alto NX, a network security firm, and the executive vice president of trend technology responsible for global sales, in addition to ...

Consumer electronics Stroll "cloud" end User Service Don't forget the security problem

Cloud computing slowly landed, the consumer electronics sector stroll "cloud" side. It is reported that a few days ago, Chengdu formally introduced cloud computing applications and industrial development Twelve-Five Planning outline, comprehensive layout of cloud computing. The consumer electronics sector is also the wind of "cloud" surge. At the 2011 China International Consumer Electronics Fair, consumer electronics companies, including home appliance companies, have focused on cloud computing and pushed the product forward, according to China Consumer News. At the same time, the vast potential of cloud computing has attracted many it giants to invest in it. According to media reports, Acer 320 million dollars to buy igware development cloud computing, Asus said ...

Total Pages: 2156 1 .... 1410 1411 1412 1413 1414 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.