Thursday, November 24, 2011

NSFOCUS Ke Chen explains cloud computing security service model

Au technology technology Director Ke Chen in "11th session China network media forum" technology min Forum speak. website reporter Uke photo taken website Wuhan on November 21 Electric (reporter Li Yan) to "promoting network media new across promoting network culture large prosperity" for theme of 11th session China network media forum today in Wuhan Grand opening. this Forum consists of four a min Forum, which second min Forum "take force technology means upgrade influence spread force" invited eight bit guests for theme Marni Replica Handbags speech, green au technology technology Director Ke Chen to "  Practice on security in the cloud era "as the topic of keynote. Following is NSFOCUS Technical Director of Ke Chen lecture record: Ke Chen: first of all, I want to talk about my topic "security in the cloud era practice." you know the concept of cloud computing is really hot in these two years, of cloud computing security issues and security opportunities mainly in two aspects show, is a cloud computing environment, our internal editors
Disappeared has, virtual technology of implementation let traditional of security device no deployment of points, this is challenge one. II is cloud computing Marni Replica Handbags environment Xia, different customer Zhijian of data storage will produced cross, data of access can are effective of authorized and control, this is we customer most concern of a points. also has third a aspects, cloud computing environment Xia for some new of attack form, yiqian has never been no protection of experience.  Today, I talk about this topic are not from a purely security perspective how security-building in the cloud computing environment, I will talk from another dimension as a security vendors, service providers, how can we use the opportunity of cloud computing to improve our service delivery model for clients, providing more and better services to more customers. For our final customers, security services, IT is supporting sectors, leadership is really concerned about whether the business of sustainable, stable running, focus on what happens to changes in customer demand, businesses can
Innovation with Shang customer of demand. in occurred security event zhiqian, leadership were generally does not too may to attention placed in security aspects. in resources inputs aspects, also will appeared is large of problem. here of may are is each units IT aspects of head and leadership, we this two years used many security device, each a a customer are can cite many security device of type, such as intrusion detection, and firewall, and intrusion protection, and security audit and scan and so on.  But the current security status of the device, whether it ought to play a role to play, after our investigation, in fact, the vast majority of environmental safety equipment when deployed to a network running a year later, safety role in gradually reducing, because no one rules to optimize and maintain it on a regular basis. In addition, security problems can occur at any time, we do not have sufficient resources to monitor and adjust at any time, many unit engine room watch, we are able to do 7x
24-hour monitoring. at present, is concerned at the operational level of security Miu Miu Handbags Replica for customers, rather than network level security, customer's own security operations team wanted to focus on the operational level, rather than endless energy in patching and updating security maintenance work. These are the current security maintenance gap of realities and our ideals. We has specialization security service, has many security device, many security of software, but as customer for, we hope enjoy to of is own of personnel can focused Yu business level security, we can through a mode help we 7x24 hours monitored, best we can from threat who of angle for intrusion behavior of analysis, and forensics, so as it turns out we needs of is not Miu Miu Handbags Replica software, and hardware, is not some simple of service, What we need are under others ' help, customers can have the ability, when a security event's ability to respond quickly to solve the problem.
  There are three examples, I not tell in detail due to time constraints, three examples are from the perspective of three security problems.  First, we to national about sector deployment security products, called key network system, national about sector has technology and people, deployment up yihou can is good of application. we attempts to to these products provides to General of customer service, but customer reflect effect bad, because they may from personnel of number to professional degree for, are up does not to using this products by needs of a benchmark sexual. Second, just has colleagues talked about, domestic of operators provides flow cleaning device, include many units are used has flow cleaning service, they also carried out has some related of extended service. but met some burst sexual, and does not too obvious of new attack for, they of should speed will obvious of variable slow, they is was of, but they of games dimension personnel to maintenance host, and maintenance network, for security of device, and for new
Analysis of the attack, they are not the most professional, they need to find a manufacturer to provide relevant assistance, we need to send Anvi caught and analysis researcher, tuning of the rules, it will take time, the customer has been in the State of being attacked. Third, most General of enterprise level customer. these enterprise level customer in security operations aspects of features, a is people rarely, II is security professional of people on more less has, this customer no energy maintenance large of security device. such as today is network media of General Assembly, we are has website, we will has games dimension personnel for related of maintenance and monitored, once found security problem, we how should, to reduced this occurred of probability, Mulberry Bags Replica we to regularly for security checks, such as each months, even each two week for once check, But check interval if a problem occurs, this possibility, anyone can do it 7x24, even 5x8 monitor
Difficult. two years ago, we try to take advantage of cloud computing technology has launched a website monitoring service, now has achieved good results, going over the service pattern change, enabling more customers to improve the safe operation and maintenance of the status quo. Through just of explained can see, security games dimension can with pyramid of model for than on, from spires to tower base is a are to of, most grass-roots of work is is daily Mulberry Bags Replica do of account management, and event response, and vulnerability scan, and assessment, and data analysis and so on, this is games dimension personnel daily among large inputs energy do of. to Shang do is in-depth understanding business, and guarantee security and business echo. Security core ability of development, supplier management and so on. but games dimension personnel energy was large daily consumption,  We want to liberate our maintenance staff, focus on the most business-critical security levels. Below the cloud, our security services, we hope to have three goals helping customers real
. Are safety equipment enables customers to purchase a real difference. Second, in the case of existing manpower is very tense, very human cost, which can achieve better results. energy and focus of the third, enables customers to switch from day to day safe operation and maintenance to business operations. Real reached this three a target, we customer needs established of is iceberg Xia 90% of system, this is a what system, we to it called iceberg Xia of security ability system, we hope through new of mode assist customer reached above cycle. first, can do effective to warning, can perception currently of security trend and threat, can for daily of monitoring, can at any time for flow of monitoring, for data of collection and features analysis. Dang found has problem of when, can for most fast of policy deployment, and Tuning protection. when a security event has occurred, when hour-, minute-level response, assist customer in event processing
.  This target, relies on currently of products, and human service of way very difficult reached, we green au technology made a new of model, and a mode, is cloud era Xia of security practice. currently in national branch each room established large of server group, we attempts to established a monitored of platform, this monitored of platform is future we to implementation of target, I to members guests and leadership simple meeting about.  This platform behind has a security intelligent library, we national deployment of device will formed we own of analysis investigation for daily of data of collection, for Internet of threat analysis, we also will and national of sector for close of cooperation, for data of collection, we has security team for vulnerability of mining and analysis, with third party manufacturers timely for data of interactive, they will into to background of intelligent library in. A lot of NSFOCUS its existing products and services are packaged into service modules include the following I
Chat with massive company, we can in the field of cooperation in the future, because their service model can be incorporated into the platform, analysis services can provide customers with advanced detection. finally opened to the customer service platform, to provide policy recommendations for tuning for customers, of course, not all customers can receive. We to future of customer into following different groups: very sensitive of customer does not willing to through network of way, to we sent data, also does not willing to received we provides of data analysis results and adjusting excellent recommendations, may traditional of mode full by customer is responsible for daily of games dimension management, needs large of people and these people in security aspects very professional, to guarantee security games dimension of results. middle of customer may is future large customer groups, he willing to has limit of to it internal of some security data and log sent to we, Background cloud analysis centers for safe transportation of dimensional analysis, and to increase the results of the analysis by

No comments:

Post a Comment