Cloud computing era: at the "cloud" side, how to dismantle the bomb?

The era of cloud computing is announcing to people that it has arrived. When you are still shocked at the "XX Gate", fearing that your terminal equipment suffers from information theft, a "cloud" of technological innovation is seeking to network all computer information and services. In the past, all our operations and storage actions occurred at Terminal devices, and the network was an end in itself, not a way.   Today, cloud computing makes the network a computing resource. Keso, a well-known it commentator, describes the "era of cloud computing"-"will ...

The dark side of the PAAs of cloud security

Cloud computing security has been the focus of major suppliers and users, and the public cloud as a way to reduce computational costs and increase the adaptability of the great potential, but it also caused the public cloud of the dark snobbery of the public Cloud's eyeing. Arbornetworks recently monitored a Googleappenginepaas application by a botnet command control (CnC).      Google quickly removed the software, but the incident sparked some interesting topics. In the area of malware, this is not a new topic ...

Bumper Harvest Cloud Jie, EMC big single

This is a time when the United States is busy opening two conferences, one from the virtual factory Shangshijie's Citrix Synergy Conference, the other is the storage giant's EMC world.   Even we see a head-on collision of "virtualization, the Web, and cloud computing" from the key words of the Citrix Conference.   Although EMC world is more store-oriented, the Synergy conference is centered on desktop virtualization, and the vendors are talking about a common point in the "cloud", the concept of the booming. As EMC Global Practice Director E ...

EMC and VMware and Intel join forces for Cloud security

San Francisco RSA Security Assembly March 2, 2010, the leader of the Global Information Infrastructure Solution EMC Corporation has unveiled a common vision with Intel and VMware to build a more secure, transparent, and accountable infrastructure for cloud services in the core business. This vision comes from the technical and professional experience of EMC Information Security division RSA, Intel, and VMware, outlined in the latest RSA Information Security Overview Infrastructure Security: Understanding the nature of cloud compliance, and demonstrated through innovative proof-of-concept, this week in the old ...

Talking about the challenges and opportunities of cloud security from authentication

Many IT staff believe that public cloud services are too insecure to secure critical program workloads and data.   But the medical information provider Schumacher Group chief information officer Doug Menefee doesn't think so. "There is a real risk of using cloud services, but everything is risky and we have to weigh the business interests against these risks."   "Menefee does, and now 85% of the Schumache group's business data is within the public cloud service. Menefee not think of himself as a cloud ...

Microsoft Bets Cloud Computing Security Program

"IT168 Information" 2010 is Microsoft cloud Computing platform Construction and marketing year, Microsoft CEO Ballmer had previously said that Microsoft will "bet on the cloud computing field."   While security is the key to cloud computing deployment and implementation, this article hopes to share Microsoft's security strategy on cloud computing with readers by summarizing Microsoft's recent initiatives in cloud computing. The information technology industry now faces a number of challenges as it offers many opportunities for cloud computing today. According to a previous Microsoft release, a "Cloud technology architecture for Microsoft" (Securing Microsoft ...)

"Cloud security" results in the first big drop in new virus numbers

In the first half of 2010, the global Internet security environment has been comprehensively improved, which is an important milestone in the anti-virus industry. According to Rising "2010 first half of the Internet Security Report" Statistics, the first half of 2010, rising "cloud security" system to intercept a total of 4,221,366 new virus samples, compared with the same period last year down 53.7%.     This is the first time that the number of new viruses has dropped dramatically. In the first half of 2010, rising interception to 596 million people infected with Internet users, the average daily infection of 33.

China's cloud computing security deserves attention energy saving and environmental protection is the key

And for the current enterprise concerns energy-saving issues, the president of the military has also had a deep feeling that: "In the past people are concerned about the procurement costs of the server and computing performance."   Cloud computing, cloud security, low-carbon environmental protection, energy-saving emission reduction will not be an individual, but like the great nature of the chain of interlocking closely linked and integrated. 2010, is the key year of the development of China's science and technology industry, with the enhancement of human science awareness, more and more people have a great interest in the effects of High-tech, cloud computing as the IT industry in recent years, the key hot word, natural also become a focus on one of the objects. ...

The eight Secrets of cloud security

While the benefits of cloud computing continue to be highlighted – including on-demand services that increase enterprise efficiency and control it costs, cloud security is often considered the first major obstacle to making cloud solutions widely accepted.   According to industry experts, many companies also hesitate to the cloud environment in the data integrity, recovery and privacy, the rules of compliance.   At the Gartner Security and Risk Management Summit, Verizon Business offers the following tips to protect data and network security. Evaluate your goals in deciding to migrate IT services ...

Users worry about cloud computing security

It pros fear that sensitive data could fall into the wrong hands if the company uses cloud computing, according to a new survey commissioned by the CA company Ponemon Cato, a US security research agency.   At the same time, many respondents admitted that some of the companies that might have adopted cloud computing ignored those risks. The study, called Security for cloud users, surveyed nearly thousands of cloud-computing users in Europe and the US. Some companies may have adopted cloud computing services without their knowledge, the respondents said. More than 50% of American respondents ...

Uncovering the secret veil of security technology "0" distance face the clouds behind the halo security

Photo 1: Rising engineer Tao Picture 2: Trend Technology Global Senior Vice president and Greater China General Manager Oscar picture 3:websense Technical advisor Chen Shi Core tip: From 2008 to 2009, the security market for "cloud security" in pursuit of the culmination. A variety of concepts of "cloud security" from the sky, and then from the concept of rapid evolution into products, "cloud security" market process seems to have surpassed any previous it technology. However, the "cloud" of the aura instead of the security technology itself put on too many mysterious veil, "cloud security" in the end is ...

Web "Cloud Security" technology application

Recently, the consolidated web, mail, and data security Solutions provider Websense released a security forecast for 2009. It is noteworthy that "cloud security" technology is abused, Web applications and Web 2.0 applications, and other malicious use of the risk will increase dramatically.   Hackers make the most of the web-launched attacks, and in 2009 a malicious attack that uses Web API services to gain trust, steal a user's credentials, or confidential information will increase. At the same time, as Web sites that allow users to edit content are becoming more and more popular, the number appears ...

Global security cooperation under cloud computing

March 2, 2010 ~3 5th, the world's top Information security conference RSA Conference 2010 was scheduled to be held in San Francisco, United States. Unlike in previous years, this year, the Zhongguancun Science Park CMC has organized 7 China's information security leading enterprises jointly participated in the conference, showing the Chinese government to participate in the world's information security technology exchange of attitude.   What are the implications of this year's conference on what is going to be a profound change in the Global Information security field? Cloud computing security into the biggest hot topic speech of the morning of March 2, always ...

Cloud Security Federation CA provides identity access management technology

The CA company recently announced that it has joined the Cloud Security alliance to help businesses and organizations solve security problems when they enter security calculations. Matthew Gardiner, head of the CA security and Compliance business unit, said the software company would work with other alliance members to achieve this, including technology vendors, customers and cloud service providers. They will also be aimed at "cloud" users training, to solve their actual encounter ...

Monitoring static address obsolete cloud firewall Chigau

In the information industry, security is an embarrassing profession.   Computing, network, storage and other vendors can proudly enumerate the recent advances in technological performance, and the security industry in the continuous development and investment, faced with more and more troublesome security issues. Zombies into "clouds" if you want to further illustrate the deterioration of the situation, in addition to the ongoing security incidents in the newspapers, we can also try to ask the question: compared with the past, today, to become a hacker, or launch a cyber attack, it is more difficult or easier? The answer is obviously the latter, just like f ...

Security in the age of cloud computing

With the focus of it technology from the user's computer terminals to the "cloud" side, that is, the network end of the transfer, China's security companies have proposed "cloud security" concept, the current cloud security has been identified as a new round of network security technology competition theme.    Oscar, president of the trend technology greater China, said it will develop along the cloud computing axis in the next 20 years, which is also the driving force for cloud security. For the PC protection Technology era has lost the user trust of the Chinese network security company ...

Rising set up the first "Cloud Security website Alliance"

Today (9.2), the country's largest information security manufacturer rising Company announced that the first "cloud Security Web Site Alliance" has been formally established (http://     union.rising.com.cn), the vast number of Web sites to join the alliance, once the server was hacked and implanted Trojan, rising will immediately notify the webmaster, help network management real-time monitoring of their own site security situation, the removal of hackers implanted malicious code, Trojans and so on. Rising vice president Lu Qing said the alliance's establishment will help the domestic nearly million websites ...

Enhancing cloud computing security-security considerations to protect your organization

Introduction: Cloud computing poses security concerns. In a recent online survey conducted by Unisys Corporation, 51% of the 312 respondents said that security and data privacy were still the main factors hindering their acceptance of cloud computing. In another Unisys network survey in June 2009, 72% of respondents said it was safe to move the workload to the cloud ...

Response Time 90% 4 Section Enterprise Cloud Security products cross-evaluation

Today, the speed at which a network threat has been generated has been shortened to two seconds. The U.S. Ostermanresearch "Cloud Client Enterprise Security Impact Assessment Report" shows that in today's network environment, a company with 5,000 employees, in the case of traditional terminal protection has been deployed, in a year will still have 2/3 of the endpoint is infected, The company will lose 2.5 million yuan for the cost.   At the same time, because of the inability to locate the source of the threat of infection, the virus will continue to repeat the infection in the corporate network, resulting in the company's losses are constantly magnified. Terminal because it stores ...

Security vendors focus on virtualization's three security issues to resolve

The benefits of virtualization and cloud computing will be included in most enterprise IT infrastructure discussions in the 2010. Virtualization has proven that it can save money through server consolidation and better utilization of resources. More virtualization technology is expected to be used throughout the server infrastructure, in other areas of the IT stack, and on desktops. The growth of SaaS (software-as-service) applications such as Salesforce.com and the success of IT services demonstrate the centralized remote computing approach such as ...

Total Pages: 2156 1 .... 1414 1415 1416 1417 1418 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.