RSA 2017 | Cloud Security Threats Are Coming: Are You Ready?

2017/02/07 • Security • Views: 185

Nowadays, people expect total interconnection in their daily lives. As human society has developed, connections have moved from the physical world to the digital world.

Entering the Cloud World

In the past, enterprises usually built their own networks and added services to the local networks by themselves. In recent years, elastic cloud computing platforms, such as the Elastic Compute Cloud (EC2) provided by Amazon, changed the traditional model of enterprises having to purchase hardware for their networks and maintain the networks by themselves. With cloud-based data centers (DCs), tenants can use the provided hardware resources, and they are charged by hour for the resources they use.

Internet service providers no longer need to purchase their own devices. Instead, they pay only for the device capabilities they actually use, and enjoy professional device maintenance services without needing to hire specialized personnel. This new, flexible model is highly reliable and can rapidly respond to service requirements and flexibly cope with traffic peaks and valleys. Even the smallest of companies can access the powerful cloud computing platform in a moment to enjoy enterprise-level device capabilities. Moreover, various network platforms, IT systems, and even enterprise apps can be directly deployed or subscribed to in the cloud, without being established or maintained locally.

According to statistics, by the end of 2020 80% of enterprises worldwide will adopt cloud computing services. More and more individuals, enterprises, and organizations will join the cloud world.

Reshaping Security Architecture

The traditional security structure is becoming obsolete. As enterprise services directly connect to the cloud by bypassing the monitoring of conventional network devices, system information is made vulnerable. Because of this, local network security is facing new invisible threats. For example, the rise of ransomware, which targets core data assets. Such ransomware invades the target system and compresses sensitive or confidential files. Users must then pay the hacker for the decompression of, and so access to, their files. In addition, traditional hardware-based security protection cannot cope with the agile service changes of the flexible cloud architecture. Security issues have become a major concern when enterprise customers select cloud services, hindering cloud computing development.

READ ALSO :   NGFW: Enterprise Network Guardian

Therefore, security protection has transformed from “static physical environment protection” to “dynamic virtualized environment protection.” The conventional network security protection system has been made obsolete. Next-generation threats, such as software vulnerabilities and advanced persistent threats (APTs), have emerged one after another. Therefore, enhancing big data-based detection and analysis and providing timely detection and response have become high priorities.

RSA 2017 Gives Insight into New Opportunities in the Security Industry

The latest in the RSA annual security industry conference series, RSA 2017, will be held from February 13 to 17 in San Francisco, USA. The subject of RSA 2017 is the POWER of OPPORTUNITY, which conveys two meanings: 1. Power of opportunity. Threat changes bring opportunities to the security industry, and opportunity changes trigger the generation of new solutions and concepts. 2. Power of collaboration. One sign of network environment complexity is the extension of networks to the wider IoT and cloud, and another sign is the fact that no single vendor can provide comprehensive E2E solutions to defend against attacks such as ransomware attacks. Only collaboration provides the power to defend against new threats generated in new environments, and so seize the opportunities this defense presents.

Huawei is bringing new solutions and concepts to RSA 2017, in order to detail new threat changes and countermeasures in the current network security field, and explain how its new solutions and security capabilities deal with these changes after services are migrated to the cloud, filling the gaps in security opened up by the cloud era. Armed with such solutions, enterprise customers can fully enjoy the benefits brought by technological development, especially in the field of cloud computing.

READ ALSO :   Network Agility for Ultimate Security

We are looking forward to meeting you at Booth 1529 in the South Hall of the Moscone Center to discuss the current state and future of the security industry.