On June 1, 2017, the "Network Security Law of the People's Republic of China" (hereinafter referred to as the "Net Security Law") officially began to implement, and the network is an important part of cloud computing . Nowadays, cloud computing has been deeply integrated into people's production and life, and the issues related to cloud security have become more and more important. How to protect the information and data security of users in the cloud? How do cloud vendors handle the threat? How is the network security method reflected in cloud security? In order to understand the security, management and operation and maintenance capabilities of major cloud computing vendors, Zhiding.com plans to carry out this 2018 annual cloud security technology horizontal comparison activity from March to June 2018. The activity plan is as follows:
First, the comparison target
In the wave of new technologies, there is often a pattern of development: when the contradiction between traditional products and services and user applications accumulate to a certain extent, new and subversive new theories and concepts are spawned. With the gradual improvement of new theories and new concepts, new and subversive new products and applications are created. Later, people will put forward higher requirements for the quality and cost performance of these new products and new applications. When the price/performance ratio is balanced, it will require better service. The manufacturer will further improve the product, technology, quality and service while serving the users, forming a cycle of product development, production and service until the contradiction between new products and services and user applications is accumulated again. After the level of irreconcilability, another subversive new concept will reappear...
The current development of cloud computing technology is also following this law, and has basically passed the subversive stage of theory and concept, and is moving in the direction of new products and new applications. New applications and new features on the cloud (such as big data analytics and artificial intelligence) are constantly appearing. While it is extremely convenient for users, the security issues of cloud computing are gradually emerging. Record-breaking cyberattack traffic, the emergence of IoT security threats, and various types of security vulnerabilities... It is known that cloud computing security issues require disruptive technologies to be resolved.
Two years ago, we also called for the transformation of cyber security from "defense" to "checking". The official launch of the network security law has provided legal protection for the emergence of new security technologies. So what new features or products do cloud security vendors offer? Therefore, this time in the "top to the network 2018 cloud security horizontal comparison" activity, the comparison target is positioned in the major cloud computing (cloud security) vendors to provide users with application security features. From the eight application functions of “user loginâ€, “user behaviorâ€, “security isolationâ€, “anti-attackâ€, “anti-virusâ€, “anti-leakageâ€, “monitoring statistics†and “management control†The provided security features are comparatively analyzed.
Second, the comparison project introduction
User login
In the new cloud security mode, user login is not only a simple man-machine determination of the user's identity. In different application scenarios, users with different security levels need to log in to the authentication mode to effectively authenticate the user's true identity. Judging, in order to effectively protect the user's personal information and online property.
Based on the above reasons, in this horizontal comparison of cloud security, functional comparison analysis of user authentication functions provided by major cloud vendors will be conducted first.
user behavior
Anyone is responsible for their actions, and there should be no exceptions on the Internet or even the "cloud." The biggest difference between cloud security and traditional network security should also be the analysis and supervision of user application behavior.
Therefore, in this horizontal comparison of cloud security, we will focus on understanding the user application behavior analysis capabilities of major cloud vendors and conduct comparative analysis.
Safety isolation
Cloud computing is not only interconnected, but also massive user information and data on the cloud needs to be protected by effective security isolation.
Therefore, in this comparison activity, the security isolation capability that the cloud computing system can provide in different applications is also known.
Anti-attack
Attack defense is an old problem of network security. In the era of cloud security, whether the manufacturer is still passively defending against attacks, whether it is attacked by source means, allowing the attacker to launch an attack and lose a batch of broilers, or there is an attacker. The risk of being positioned in the opposite direction, which effectively raises the cost of attack, is the latest requirement for assessing the attack protection capabilities of cloud security vendors.
Therefore, in this comparison activity, the anti-attack function is not only an analysis of the cloud security vendor's attack and cleaning capabilities, but also an understanding of the vendor's attack source tracing capabilities.
Antivirus (vulnerability)
As mentioned in the security analysis article of the previous two years, cyber attacks are just rogue-like smashing, but the impact is bad but the loss is not necessarily great for users. However, network viruses that spread through network vulnerabilities often cause damage to user systems and data, and even devastating effects.
Therefore, the ability of cloud security vendors to provide anti-virus and timely response to loopholes will become the direction we need to understand.
Leak prevention
The Trojan virus is also good, and the temporary workers who are bought out are worth mentioning. The risk of user data leakage always exists. In Chapters 4 and 40 of the "Network Security Law", there is also a clear provision that "network operators should strictly keep confidential the user information they collect and establish a sound user information protection system." There are clear requirements for using personal information and for storing personal information.
How to prevent user information leakage has been raised to the height of the law, so the information leakage prevention capabilities of cloud security vendors have become our focus.
Monitoring statistics*
Since the development of the PC era, the single point monitoring problem of information security has basically had a relatively proper solution. However, the ability of cloud security vendors to monitor and count the massive users in the system is worthy of a deeper understanding. Only by ensuring that a good user is not in the entire cloud computing system or a malicious user is missed can the cloud security be truly guaranteed. exist.
Management control*
Management control of user behavior and network applications is the biggest difference between cloud security and traditional network security. What management and control capabilities are provided by cloud security vendors, and the management and control of large-scale cloud computing networks is an issue that needs more in-depth understanding. Moreover, only by combining security with network operation, management, and maintenance can security be not only in the form, so that security can be truly integrated into daily management and operation. Therefore, the combination of cloud security and cloud computing system management control is also the most practical test for the practical application of cloud security technology.
*In view of the assessment of monitoring statistics and management controls, cloud security vendors may need to provide more management control rights to implement. Therefore, we will further evaluate the management and control functions of cloud security after further communication with vendors participating in horizontal comparison.
Third, the comparison of manufacturers
This horizontal comparison activity can be said to be an extension of the horizontal comparison of the performance of public cloud applications conducted by the top network last year. Therefore, in the choice of cloud computing vendors, the cloud security functions of the current mainstream public cloud vendors will be prioritized. analysis. If conditions permit, you can also join the security features of some private cloud vendors for analysis.
I hope that through this comparison, you can have a clear understanding of the cloud security protection and management capabilities of current vendors. I also hope that this event will get more participation and support from cloud computing vendors.
Description
✿Service Life
Mechanical ≥ 1000000cycles
Electrical ≥ 50000cycles(Degree of protection againstDepend on model No.
✿Approvals
UL CUL VDE TUV CE DEMKO CQC
✿ Material
Made of high quality plastic and metal, rust resistance and corrosion resistance, durable enough for you to hanging items, So the product appearance is exquisite, perfect workmanship.
✿ Rating
You can meet the different RATING daily needs. Please pay attention to the model of the switch before purchase, to ensure that you purchase the same as you need.
✿ Vairous Sizes
Actuator Action is momentary and Actuator Type is long straight hinge lever. Switch Body Size as shown in the picture.So different sizes can meet all your daily different needs.
✿ Wide Application
Home appliance: micro oven, electric cooker, washing machine, electric heater, warmer, water fountain and so on.
Commercial appliance: Vending machine, electric toy, electric tools, duplicating machine and so on.
Machinery: Transport machinery, printing machinery, textile machinery and so on.
Basic Micro Switch,Micro Power Switch,Waterproof Micro Switch,Micro Switch Limit Switch
Ningbo Jialin Electronics Co.,Ltd , https://www.donghai-switch.com