Protect Cloud security Dawn launch encryption products and solutions

"Sadie Network News" Although "cloud computing" in the domestic by many manufacturers of the pursuit, but often are wool, the security of cloud computing has become an important obstacle to development, especially some enterprises, still for the information stored in the "cloud" lack of confidence. If the issue of information security is considered a war, then in this battle to maintain information security, everyone in society becomes a cyber-security fighter guarding their own domain security. It is understood that at present, China's information security areas are mainly related to things, mobile internet, cloud computing system security and the three network integration ...

Focus on cloud security applications to gain insight into user needs

Jinshan Poison PA is one of the few anti-virus software in China is the real cloud security application of the relatively good anti-virus software, such as the installation package is very small, killing speed and so on, can be said to be a cloud security to the user brought the actual experience. In today's internet age, the network threat has not only limited to virus Trojans, such as fishing sites are also very rampant, Jinshan poison PA can fully insight into the changes in user needs, the Web site Cloud Security Identification Technology application products, for phishing sites, fraudulent Web site interception is excellent. Can say Jinshan poison pa in the cloud security aspect already walked in front, hoped in the future ...

Symantec: One cent price one penny cloud security hidden danger

Free Antivirus is becoming the mainstream of individual user market. But Symantec believes the ultimate victim of this free approach is the user. This year's IT industry's vigorous QQ War 360, once stirred the entire instant messaging and anti-virus software market. followed by the traditional anti-virus software manufacturers for personal users have erected a free banner, Kaspersky, Jinshan poison PA, can be cow antivirus, rising antivirus, aviraantivir, AVG Antivirus has been launched in full free or six months, free of a year's concessions. Previously, in the area of desktop security, the proportion of paid users was close to 40%. 360.

Pioneer Pharmaceutical CIO: Focus on cloud security issues to promote business development

Nowadays, the most popular technology and hottest topic in IT industry is "cloud computing", and the concept of cloud computing is no longer new today. As the Pioneer Pharmaceutical Group CIO Feng Lei said: "Cloud computing is not only a concept, it provides a more systematic idea of resource integration, so that many information solutions rely on her ideas to play incisively and vividly." "Cloud Computing (cloud computing) is an internet-based computing in which the so-called" cloud "refers to a variety of computing centers distributed in interact, containing thousands of ...

Cloud security makes the Internet the largest anti-virus software

The rapid increase in malicious threats has overwhelmed antivirus software before cloud security technology has emerged. The main threat from the Internet is from computer viruses to the horse, fishing, malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. Cloud security technology application, identify and kill virus no longer rely on local hard disk virus only, but rely on a large network services, real-time collection, analysis and processing, the entire internet is a huge "anti-virus software." Cloud security incorporates the emerging technologies such as parallel processing, grid computing, unknown virus behavior judgment, etc.

Novell joins Windows Azure Certified Cloud Security Service

December 22, 2010, Beijing--Novell announces that it has joined the Microsoft Windows Azure Marvell Adoption Program, through Novell Cloud security Service to address cloud security challenges. Microsoft and Novell will be pre-release, Non-commercial, in-house ... for Novell Cloud Security Service on the Windows Azure platform.

Kaspersky Cloud Security upgrades start using file Reputation technology

In recent years, with the development of information technology and Internet, all kinds of malicious programs such as viruses, trojans and worms show explosive growth, and the defense response system of traditional security software relying on malicious object database can not adapt to the fast changing network environment. The emergence of "cloud computing" technology has created an opportunity to solve this problem, so many security software vendors are moving the database to the cloud (server side) storage and sharing, to improve the accuracy of analysis and judgment. But this way still does not give full play to "cloud computing" advantage, because ...

Defending cloud security and unveiling the era of "all-cloud audit"

The beginning of "cloud computing", the question of its security has never stopped, cloud computing is a fire, but the cloud security problem is also quite a headache.   Enterprises concerned about their own data will not be wantonly acquired, tampering, the most concern is that their private information will not be intentional or unintentional leakage. When the enterprise gives the data to cloud computing service provider, has the data priority access is not the enterprise itself, but the cloud computing service provider. In this way, it is not possible to exclude enterprise data from being compromised. In addition to cloud computing service providers, a large number of hackers who covet cloud data, they keep digging their clothes ...

Shuguang Encryption Series products and solutions to protect cloud security

Although "cloud computing" at home by many manufacturers in the pursuit of numerous vendors, but often are wool, the security of cloud computing has become an important obstacle to development, especially some enterprises, still for the information stored in the "cloud" lack of confidence. If the issue of information security is considered a war, then in this battle to maintain information security, everyone in society becomes a cyber-security fighter guarding their own domain security. Although "cloud computing" at home by many manufacturers of the pursuit, but often are wool, cloud computing security issues become ...

Interview McAfee "M duo" to feel McAfee Cloud security confidence

Beijing time November 17 McAfee announces the launch of McAfee Cloud Security program. The program helps software, a service (SaaS) vendor, improve security for its cloud-safe deployment. That is, you can provide protection for cloud computing vendors. The two leading actors in Beijing were the McAfee Asia Pacific Vice president Marc Olesen and McAfee Asia Pacific Chief technology officer Michael Sentonas. This two-bit "M" warrior is very characteristic, Marc Olesen gives the first impression is very English gentleman wind ...

Cloud computing security: Experts talk about the path of password cracking in the cloud

On-demand cloud computing is a fantastic tool for companies that need some computing capacity in the short term but don't want to invest long term in fixed assets.   For the same reason, cloud computing is also useful for hackers-many hacking activities involve passwords, key cracking, and other forms of brute force, all of which require expensive and highly parallel computations. For hackers, there are two main sources of computational resources on demand: The Zombie network of consumer PCs and the infrastructure of services provided by service providers (IaaS). Each form ...

Web reputation query server speed up China's "cloud security"

Trend Technology announced recently, in order to let Chinese customers get better and faster cloud security protection, trends in Nanjing set up a special service for Chinese customers in the Web Reputation query server. After testing, located in Nanjing, the new Web Reputation query server application, Web reputation query speed than before the maximum can be increased by more than 50 times times! Trend Technology says, in November 2010, by applying Global load Balancing Technology (GSLB), Migrate and speed up the Web reputation query traffic in all Chinese regions. As long as you are using trend technology products and have ...

Defending the cloud: A security perspective in the cloud computing era

In the 80 's, the desktop computer, the Internet revolution, with technological advances as a leader to stimulate the people's potential demand, creating more market and business model, the achievements of Microsoft, Oracle, Sun and Yahoo and other companies.   Today, the Internet of things, cloud computing, triple-net convergence has become the most commonly mentioned three keywords, these three hot areas from the technical level and business aspects of the industry brought new changes. Following the PC and Internet revolution, cloud computing was seen as the third it wave in the 2010, becoming an important part of China's strategic emerging industries. It will bring birth ...

Cloud Security Greatest risk: unclear security responsibilities

The advent of the cloud security era, the Internet's resources to share the characteristics of the ultimate, but also for cloud computing security controversy is also uproar. More and more companies are turning their corporate security into corporate cloud-computing security vendors, trying to use new technology to keep their corporate data from leaking. But in practice, because IT service customers take it for granted that their cloud providers should assume security responsibilities, this makes these customers vulnerable to attack.   At the same time, virtualization and cloud computing also play a role. Science and Technology Business Research company is responsible for the server ...

Improve security Otherwise cloud computing will also be a "cloud"

Such a story has been widely circulated: September 15, 2008, Lehman Brothers declared bankruptcy at 10 o'clock in the morning, the story happened in the next 10 minutes: The German Development Bank in accordance with the implementation of the business, through the established payment system, the bank will 300 million euros to pay the Lehman Brothers, of course, this 300 million euros "there is no return ”。 300 million euros were lost with the return key, and the bank's three executives were dismissed, and the German Parliament formed a special fact-finding mission to investigate the matter.   The Sun newspaper, Germany's biggest newspaper, called the German Development Bank the dumbest bank in Germany ... In the past, I.

Examining the trend of terminal safety exploration Technology Cloud Security 2.0

Recently, trend technology has launched the trend Technology Cloud Security 2.0 with the theme "Rethinking your Terminal safety".   1 years from 1.0 to 2.0, why? What's so special about cloud Security 2.0? 1, the crisis: traditional terminal protection is not safe as the most basic enterprise network components node, terminal because it stores a large number of sensitive data, and thus become the target of hackers and virus manufacturers, at the same time, because the terminal directly facing the internal staff of enterprises, management difficulties, resulting in the enterprise network is the most vulnerable link. According to the trend of science and technology global Anti-Virus research and technical support ...

Cisco Chambers: Cloud Security is fundamental

As SaaS becomes more and more hot, the security of SaaS becomes the subject of intense discussion among users, vendors, and the media. "Cloud security has become the most important element of cloud computing," said Cisco chairman and chief executive Officer Chambers in a keynote speech at the RSA Research Office.     Only by maintaining the leadership of security technology, can always stand in the forefront of the industry. Chambers believes that security issues need to be integrated not only with the enterprise's IT infrastructure, but also with business processes. Domestic from ...

Cellocloud; Lead mail protection into the new realm of cloud security

2009/4/21–gartner's latest "phishing report" points out that phishing has exploded in 2008, with a single U.S. victim of up to 5 million people. Although there are 70% of enterprises, organizations and service providers to take some of the mail threat of defensive measures, but these traditional anti-spam technology is a major issue of timeliness, interception speed can not keep up with the changes in spam, the face of a new type of mail attack behavior helpless, resulting in spam rampant, mail fraud pouring problem. According to the Radicati group ...

Cloud security concept escalation triggers hot debate: gimmicks or change

July 24, international information security manufacturers trend technology announced, upgraded its "cloud security" to "cloud Security 2.0" a year ago and announced the launch of a new "cloud Security 2.0" multi-level terminal security solution and related two core products-deployed at the network Layer Threat Discovery System (TDS) and deployed on the end of the antivirus wall network version of OfficeScan 10. Four days later, July 28, the domestic information security manufacturer Rising company also announced that its running a year of "cloud security" technology has achieved great success, "cloud security" will become a new anti-virus industry ...

EMC Mao Wenbo: What is Cloud security

Cloud security is an important issue in cloud computing. Cloud security has been highly valued by the industry. But what kind of security service is cloud security? Is it the same thing with cyber security? A blog I sent in June 2008 http://blog.sina.com.cn/s/blog_535dace301009i51.html And a series of follow-up technical discussions: the essence of cloud security problem is computing platform security isolation between applications, usually network security technology, such as network security encryption transmission.

Total Pages: 2156 1 .... 1412 1413 1414 1415 1416 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.