85% of large enterprises refer to hybrid clouds, and cloud security is a challenge

There are currently three forms of cloud security. Traditional vendors have clouded, for example, firewalls, PLPs, etc., but the customer's environment has changed. Previously, the machine was put in IDC. Now many people put it in the cloud. The previous firewall was Hardware firewall, but the hardware firewall is placed in the cloud, there is no place to put it, there is a virtual firewall, which can be deployed in the virtual, called the traditional device cloud, there are many domestic and foreign manufacturers to do such an attempt, for example A lot of scanners or HAPS on this kind of host can be seen on the Alibaba Cloud. These are the scenarios of an application after the traditional device is placed on the cloud.

The second most common is that cloud service providers build their own. Everyone knows that the first factor that most customers consider cloud computing is the security of the cloud. This causes cloud service providers to pay close attention to their own security. Whether it is Ali or Amazon, they will provide additional security services, such as WAF, etc., as well as a cloud security service provider. This is known as Chuangyu Cloud Security. To do cloud security, everyone distinguishes between cloud security and security cloud. This is completely different definitions. The so-called security cloud is that a cloud platform is a secure cloud, and cloud refers to technology to provide services. This is an essential service. .

These three modes are the most common forms that can be said to be good or bad. They are just three forms that are more common now. We know that Chuangyu is one of the representatives of the third form, only doing cloud security. Provide services. As cloud security, there are many kinds of security, such as doing web security, having intelligence, and delivering a variety of security services.

85% of large enterprises refer to hybrid clouds, and cloud security is a challenge

International Data Corporation (IDC) announced in Beijing on the 8th that more than 85% of large enterprises will adopt hybrid clouds by 2018. Computer experts are concerned about "cloud security."

Hybrid cloud convergence of public and private clouds is the main mode and development direction of cloud computing in recent years. According to Zhou Zhengang, director of enterprise-level research at IDC Greater China, the survey figures show that between 2016 and 2017, users will spend more on public and private clouds than on traditional information technology such as servers.

IDC predicts that by 2018, the number of industry clouds in the world will exceed 450, more than three times now; by 2019, 43% of IoT data will be pre-processed by edge computing devices, which will reduce the computing pressure on the server side; By 2020, 80% of the “Top 500” companies will provide digital services to customers through the industry cloud.

"The future prospects of the cloud computing market are very good." Zhou Zhengang called this future "the era of cloud computing 2.0". He believes that the era is characterized by cloud computing resources will be concentrated on several platforms, and more users will use the hybrid cloud architecture. He also mentioned that artificial intelligence will be widely used on cloud computing platforms and make cloud data center operations more efficient.

Zhao Youjian said that the security threats faced by cloud data centers are different from those of traditional network systems. This is reflected in the invisibility of cloud traffic and the inability to divide cloud boundaries. He summed up the four major drawbacks of current cloud security: Industry experts pay more attention to "cloud security", Zhao Youjian, deputy director of the Department of Computer Science and Technology at Tsinghua University, bluntly said: "If there is no security, 'cloud' has no vitality."

First, there is no complete data model to represent the trust relationship between computing resources in the data center and the private cloud data center. Secondly, virtual machine security computing can not completely eliminate data leakage, data corruption and resource encroachment. Third, currently There is no complete illegal behavior detection and forensic process. Fourth, there is no complete method for cloud computing security assessment of virtual machines and computing platforms.

On the same day, Tsinghua University’s high-tech enterprise Tsinghua Tongfang and domestic company UnitedStack Yunyun reached a M&A intention to increase capital, and the two sides will provide safe, autonomous and controllable cloud computing integrated solutions for the education, government, finance, military and other industries. .

"The national information industry needs the national team to guarantee, and Tongfang is willing to make its own contribution in this regard." Li Jianhang, chief operating officer of Tongfang Co., Ltd. said.

VDE POWER CORD

Guangdong Kaihua Electric Appliance Co., Ltd. , https://www.kaihuacable.com

This entry was posted in on