The hottest Huawei in-depth analysis of six new tr

  • Detail

Huawei: in-depth analysis of six new trends in cloud security

in recent years, enterprises have continued to cloud their IT infrastructure and migrate their businesses to the cloud. This trend will accelerate in 2017. Compared with the traditional IT architecture, the cloud certainly has the advantages of low cost and high efficiency, but the network boundary of the enterprise also extends to the cloud. Coupled with the open, complex and decentralized characteristics of the cloud, the difficulty of security protection rises sharply

in the past year, the number of cloud related security incidents has increased significantly, and attacks and penetration against the cloud have also changed with each passing day. Enterprises are also gradually increasing their investment in cloud security to try to solve these problems. Although the complexity of the cloud makes it difficult to reach a consensus on the best practices of security in the industry, and a 1000 square meter recycled plastic zone is opened at the same time, cloud security is also developing and improving, and more and more effective security and control measures are constantly listed

in 2017, the following trends will appear in the field of Cloud Security:

enterprises using IAAs services are no longer satisfied with the built-in basic security solutions, but turn to third-party security

most IAAs service providers provide supporting IAAs security, including host, network, storage and other security, as well as user authentication and access. Enterprise users often use private cloud, hybrid cloud and public cloud containing heterogeneous environment, as well as IAAs, PAAS and SaaS businesses, while IAAs service providers often can only provide standardized security solutions, which can not fully meet the security needs of enterprise users

however, many third-party manufacturers can provide complete and adaptable security solutions for users in some specific industries, including unified user authentication and access in line with enterprise business habits, unified security policies for IAAs, PAAS, SaaS services, or security protection for some specific businesses that are easy to integrate into the overall enterprise security solutions

the growth rate of investment in SaaS application security protection will be significantly higher than IAAs, and CASB will accelerate its development.

enterprises are increasingly inclined to use composite materials to combine SaaS services from a variety of materials with different properties. However, for security and it teams, SaaS is extremely difficult to manage. When users use SaaS services provided by the public cloud, security and it teams are often unaware, We don't know what users use what SaaS services at what time, nor whether they disclose the core data of the enterprise when using SaaS services

casb (cloud access security broker) is a good solution. A perfect CASB solution enables enterprise security and it teams to control and manage these security risks. At the same time, some functions of CASB, such as user behavior analysis, data leakage prevention, and unified policy management tools, can also alleviate the risks brought by enterprise users using SaaS to a great extent. Therefore, CASB will become the choice of more enterprises

machine learning/artificial intelligence technology driven big data security platform will be widely deployed in the cloud

different from the traditional IT architecture, the decentralized boundary and host protection concept are not fully applicable in the cloud. A large number of East-West and North-South flows in the elastic network, as well as the large-scale concentration of data and applications, make the cloud a deep and complex system. If we cannot perceive the security situation of the whole cloud, good protection is impossible

in 2017, with the continuous development of machine learning and artificial intelligence, the big data security platform based on the latest technology will be deployed in more clouds, cooperate with sensors all over the cloud, constantly collect, analyze data and perceive the threats, and finally carry out targeted protective treatment

the high development of IOT introduces more security threats, and new landmark attacks will appear

a high proportion of IOT terminals such as smart cameras, wearable devices, industrial sensors, home smart devices, etc. at the beginning of design, security issues were not fully considered. As a springboard for attacks, these devices have caused several influential security incidents in 2016

in 2017, a large number of IOT terminals with security risks remain in the network, and new low security IOT terminals will continue to be deployed. It can be predicted that the cloud applications associated with it will face more and more "huge threats, larger-scale DDoS attacks will appear, and more viruses, Trojans, and apt will enter the cloud through IOT terminals

ransomware continues to develop and goes deep into cloud infrastructure

ransomware attacks increased wildly in 2016, and there is no evidence that they will decrease in 2017; On the contrary, it will become more rampant, and the important cloud infrastructure and the data it carries will become victims

extortion software has long become a mature business model. Many affected enterprises know that they can get rid of trouble by paying relatively low fees, which keeps the success rate of extortion high; At the same time, for the sake of corporate reputation, it will not disclose or share attack features, which also leads to blackmail software being promptly 2. 2 Polyethylene chemical medium corrosion test method: it is more difficult to locate and remove through the test of three different solutions (hydrochloric acid, sodium hydroxide, sodium chloride)

people are always the weakest link in cloud security

cloud service providers pay more and more attention to security, and the security of cloud infrastructure and cloud services is becoming stronger and stronger. However, in 2017, and even in the next few years, due to users' excessive trust in cloud security, lack of cloud security experience, and wrong usage habits, they are more likely to incur a wide range of security or compliance problems than cloud service providers

cloud users need to have a deeper understanding of the shared security responsibility of cloud security and specific operable security specifications in order to minimize risks

according to the above trends, Huawei usg9000v cloud integrated security, as a software product for cloud deployment, supports the mainstream cloud platforms in the industry and can be deployed at the boundary of cloud data centers. The unit can provide up to 2.5t processing performance, realize flexible expansion through centralized scheduling of resources, achieve the optimal utilization of resources, provide customers with high-performance, easy to manage and comprehensive software based virtual network security protection, meet customers' demands for simple deployment, fast online, flexible expansion and efficient operation and maintenance of secure services, and help customers obtain a flexible, reliable and efficient business experience

Copyright © 2011 JIN SHI