Cloud Security

Alibabacloud.com offers a wide variety of articles about cloud security, easily find your cloud security information here online.

Imperva buys Cloud security company Incapsula

Imperva, an IT corporate security company listed on the NYSE, recently announced acquisitions of new cloud security Gateway company Skyfence and reached an agreement with the Cloud Computing Network application Security company Incapsula to acquire its remaining shares. Imperva also released the Securesphere Network application Firewall (WAF) for Amazon AWS. Gartner has predicted that spending on global public cloud services will grow from $1.55 trillion in 2014 to $2.1 trillion in 2016. With the rapid spread of the cloud platform, enterprises will ...

Application of information level protection system in cloud security

Application of information level protection system in cloud security The Cloud Security Management Center Cloudfirm Information Hierarchy protection system in cloud security based on the level protection standard system

Cloud Security has a hand Kaspersky to achieve the perfect cloud protection

Kaspersky Security Force 2012 is a very focused on the way to protect users of the security of the anti-virus software, Kabbah 2012 is in the Kabbah 2011 on the basis of the function of cloud security further enhanced and technology to consolidate the products. I believe that we are more concerned about Kaspersky Security Forces 2012, below to share the cloud function of Kaspersky. Compared to Kaspersky security forces 2011, the new version of Kabbah in the cloud security features strengthened use, filled the 2011 version of Kabbah in the cloud security features, no cloud security function settings, do not embed the right key to use and objects should ...

PCSL Test Report: Cloud security is difficult to deal with 0DAY threats

Recently, China independent Security software Evaluation laboratory PCSL released the latest Security software evaluation report, "PCSL security software 0day virus Test-October 2011 report", the report for the first time using a 0DAY virus sample set and cumulative test two new test parameters,   Most of the commercial security software that claims cloud protection is underperforming, highlighting cloud security vulnerabilities. The report shows that in the first scan of the 0DAY virus sample set, all based on the signature engine security software, virus identification rate of less than 40%, installed with unknown virus engine security software such as 3 ...

Further explanation of cloud security and active defense

A period of time ago sent 2 posts cloud security is safe and cloud security is two, did not expect to attract a lot of saliva. And some friends simply put cloud security as the representative of Jinshan, 360 as the representative of active defense, and compare the two.   There is clearly a misunderstanding, here further to the cloud security and active defense to do an explanation, welcome to discuss, do not spit. First said active defense, this is the micro point of Mister Xu first proposed, Xu Everyone is not necessarily very familiar with, but in the industry this is a very cattle name, because he is also the original Rui ...

FU: Security companies can not put cloud security in front of the evil fig leaf

Jinshan Network Conference scene picture (Tencent Science and Technology map) Tencent Science and Technology (Lotte) December 31 News, Jinshan Network today Emergency conference, to media exposure 360 through the client secret collection of user information of a large number of evidence. Jinshan Network CEO Fu (Micro Bo) in the meeting called on the security industry to increase regulatory legislation, enterprises to open and transparent, policy level to speed up legislation. Fu also pointed out that security companies can not put cloud security in front of a fig leaf. It is understood that from yesterday evening to today, Jinshan Security Center said received users report: on Google website can search to large ...

Asia's biggest cloud Security Center builds

March 15, Asia's largest "cloud security" data center will be officially opened, the center initially invested 130 million yuan, a total of more than 5000 enterprise-class professional servers, designed to provide 1 billion users with High-quality security testing, "cloud security" information interaction and Internet threat processing services. Security experts said that, with the Internet application in-depth, many users are not simple virus problems, Trojans, but the integration of social engineering fraud, phishing psychology, cybercrime and the Web site of a series of new technologies and tools, the original anti-virus software can not ...

The Cloud Security Alliance is established to develop the best security solution

A group claiming to be the Cloud security Alliance was announced in Tuesday, and ebay and ING, the world's largest financial services group, were founding members of the group. The alliance is poised to make its debut at the upcoming RSA Data Security Presentation Conference. The Cloud Security Alliance was established to provide the best security solution in a cloud computing environment. Dave Cullinane, the ebay chief information security officer, said in a statement that the on-demand cloud computing model was cisos for security.

Faster and more accurate trend technology cloud security Subversion web threat protection history

Cloud Security Architecture (full name is the trend technology cloud Security Intelligent Protection Network) consists of 4 parts of Intelligent Threat collection system, computing cloud, service cloud and security subsystem. These four systems work together in a faster response to anti-virus than the traditional anti-virus scheme, with more accurate identification techniques and better protection. On-demand service cloud response faster according to Av-test.org's latest statistics, the global malicious program has more than 11 million, and every 4 seconds to produce a new virus. The current rate of virus outbreaks is difficult to handle with traditional security protocols. Especially depending on the disease ...

Take you to know cloud computing, cloud security, Cloud Security 2.0

At present, cloud security has become a hot topic in the information security world. With the development of the security situation, the connotation of cloud security has been evolving, and new technologies and schemes have been integrated clouds the concept of security.      For enterprise users, with the entire new generation of cloud Security 2.0 of the technology system gradually surfaced, the user's own security defense deployment also followed by a new change: the use of cloud technology to promote terminal security defense has become a brand-new experience. When it comes to cloud Security 2.0, insiders understand that any new technology is not an overnight occurrence. For security deployments, the current cloud ...

NI: Domestic database shoulders The important mission of cloud security

Recently, the Chinese Academy of Engineering Academician NI received an interview with Sadie NET, this interview is "Jin Cang have about" series of interview programs. Cless in recent years to promote domestic CPU, domestic software and other independent intellectual property products, and to promote the formulation of relevant industrial policy suggestions. He pointed out that the most important guarantee cloud security problem is to achieve autonomous control, which is bound to use the domestic basic software.   Cloud security ultimately to the implementation of data security, the current domestic database in the security level has overtaken foreign. It is understood that currently includes Oracle, SQL Server, DB ...

Protecting API keys in the cloud improves enterprise cloud security

The API key, like the SSL key, is the top priority in security policy. Many people verbally say they want to protect the information in the cloud, but in fact we are all stones in cloud security. Most organizations use some form of API key to access cloud services. The protection of these API keys is important.   This article will discuss the issue of protecting API key and recommend some solutions. In the 2011, the importance of API keys was gradually recognized, and companies were more aware of their full protection of these keys. After all, API keys and access to sensitive information in the cloud have ...

Bending Comments Chen Huai Lin: SDN is cloud security opportunities

Cloud Security TechTarget China Cloud Security Survey 2012 shows that 79.6% of enterprises are currently conducting or considering cloud services. However, when it comes to cloud computing security, respondents who think cloud computing is safe and insecure are basically the same , 51.9% (safety) and 48.1% (insecurity) respectively. Cloud security is still the most important reason that businesses can not get into the cloud with peace of mind. In the long run, even if cloud computing continues to become popular, many enterprises do not trust themselves to put all their workload in the public cloud. They will still have an in-house deployment. in 2012...

Rising becomes "Cloud Security Alliance (CSA)" First Asian anti-virus member

Recently, rising company formally joined the "Cloud Security Alliance (Cloud)", became the "Cloud Security Alliance Member" qualified Asia's first anti-virus manufacturer. Previously, including Microsoft, Intel, Cisco, Symantec, Trend technology and other heavyweight manufacturers have joined the organization, they will work together with the rising cloud security and cloud computing in various fields of application, for consumers and suppliers to provide the best security solutions. 498) this.width=498 ' OnMouseWheel = ' javasc ...

What is the cloud security policy for large data?

The combination of cloud computing and big data can be said to be a perfect match. Large data requires a flexible computing environment, which can be extended quickly and automatically to support massive amounts of data. The infrastructure cloud can deliver these requirements precisely.   But whenever we talk about cloud computing, we can't avoid the following questions: What is the cloud security strategy for big data? When referring to cloud security policies in large data use cases, we hope that any security solution will provide the same flexibility as the cloud without impacting deployment security. When transferring large data to the cloud, the following four ...

Is cloud security an alarmist or a minefield?

Cloud computing has been developing very rapidly since the 2008, and cloud security issues have followed.   Cloud security vendors have different interpretations of security issues, and all sorts of schemes that can solve cloud security are coming, but the question of cloud security has never stopped. The November 2010 IDG survey showed that 67% of users were worried about cloud security when deploying cloud computing solutions. The recent speculation of the "Prism Gate" incident, once again the cloud safely dragged into the public opinion of the Rapids Vortex. What are the challenges and opportunities that cloud computing poses to security?

Cloud security into the "second kill" era, the user's gospel?

Safety is always the most mouth of the industry, which can be explained at least two points, one is that the field of profit is sufficient, the second is that the field of competition is too intense. The core of competition is the innovation of concept, the skill of hype and the real progress of technology. Since the trend and rising first cloud security concept, has become the biggest bright spot of security software, there is no talk about cloud security you are not a real security potential. After the 3Q war, 360 quickly listed, become a dark horse in the IT field, the thought of the listing after 360 will be silent, the results of a period of time before because of the second level cloud identification and Jinshan. The cause of things ...

Rising will invest in Qingdao to build the world's largest cloud security service center

Recently, rising to Qingdao, the plan to invest in Qingdao to build the world's largest "cloud Security Service Center", and increase the "online expert out-patient" service system construction investment.   This is the first time since the March 18 rising personal Software announced a permanent free, new initiatives in the service.   The investigation by the Qingdao Government attaches great importance to the municipal commission of the letter entrusted to communicate with enterprises, the two sides on the Qingdao information Industry investment environment and development planning issues such as full exchange, and the rising express sincere welcome. It is said that ...

Jinshan Network invested 30 million yuan to implement cloud security cooperation program

TechWeb News February 21, Jinshan Network announced today, put 30 million yuan to implement the "Cloud Shield" program, and officially open its cloud Security Platform API interface, Baidu, AO Tour manufacturers have been involved in cooperation. Jinshan Network said that it will open its Web site security, file security inquiries, including the cloud security platform, allowing web browsers, search engines, instant Messaging IM, e-commerce, online games, software download tools, such as third-party application providers free of charge interface to provide users with security features or services. Jinshan Network will also invest 30 million yuan, ...

What are the reasons for choosing cloud security

With the popularity of cloud computing, the heat of cloud security is also rising. IDC's survey data show that nine out of 10 cloud users are worried about the security of cloud computing. "Cloud security is an inevitable choice for future users," says Michael Sentonas, vice president and chief technology officer for McAfee Asia Pacific. "Three reasons to choose Cloud Security McAfee Company Senior vice president and general manager of the cloud Security business unit Marc Olesen The reason to choose cloud security down to three points, he said:" First of all, the content of the network is showing an explosive increase ...

Total Pages: 57 1 2 3 4 5 .... 57 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.