Enviar búsqueda
Cargar
分会场八云及虚拟环境安全防护
•
0 recomendaciones
•
642 vistas
ITband
Seguir
Symantec 2010 @ BJ
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 28
Recomendados
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Private Cloud
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
CSAIsrael
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Trend micro deep security
Trend micro deep security
Trend Micro
Trend micro v2
Trend micro v2
JD Sherry
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
Recomendados
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Private Cloud
Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
CSAIsrael
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Trend micro deep security
Trend micro deep security
Trend Micro
Trend micro v2
Trend micro v2
JD Sherry
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
VSD Infotech
VSD Infotech
VSD infotech
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
Satish Hemachandran
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
guest66dc5f
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
Nextel S.A.
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
Best Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
IBM India Smarter Computing
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
HyTrust
Cloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Skybox Security
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
OpenStack Foundation
Web Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
InnoTech
2 li nong-experience show keynote-li nong-v1
2 li nong-experience show keynote-li nong-v1
ITband
V mware虚拟化运营就绪服务
V mware虚拟化运营就绪服务
ITband
V mware v sphere 的 5 项关键存储技术
V mware v sphere 的 5 项关键存储技术
ITband
Más contenido relacionado
La actualidad más candente
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
VSD Infotech
VSD Infotech
VSD infotech
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
Satish Hemachandran
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
guest66dc5f
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
Nextel S.A.
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
Cat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
Best Practices for Cloud Security
Best Practices for Cloud Security
IT@Intel
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
IBM India Smarter Computing
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
HyTrust
Cloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Skybox Security
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
OpenStack Foundation
Web Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
InnoTech
La actualidad más candente
(19)
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
VSD Infotech
VSD Infotech
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Cat6500 Praesentation
Cat6500 Praesentation
Best Practices for Cloud Security
Best Practices for Cloud Security
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Cloud securityperspectives cmg
Cloud securityperspectives cmg
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
Web Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
Destacado
2 li nong-experience show keynote-li nong-v1
2 li nong-experience show keynote-li nong-v1
ITband
V mware虚拟化运营就绪服务
V mware虚拟化运营就绪服务
ITband
V mware v sphere 的 5 项关键存储技术
V mware v sphere 的 5 项关键存储技术
ITband
分会场三神话终结者:数据丢失防护的5个神话
分会场三神话终结者:数据丢失防护的5个神话
ITband
1 john wang-experience show exec intro
1 john wang-experience show exec intro
ITband
通过Ops center优化netbackup管理
通过Ops center优化netbackup管理
ITband
分会场九Windows 7迁移最佳实践
分会场九Windows 7迁移最佳实践
ITband
分会场一新的安全威胁趋势下的企业安全建设
分会场一新的安全威胁趋势下的企业安全建设
ITband
V ds深入探究
V ds深入探究
ITband
Destacado
(9)
2 li nong-experience show keynote-li nong-v1
2 li nong-experience show keynote-li nong-v1
V mware虚拟化运营就绪服务
V mware虚拟化运营就绪服务
V mware v sphere 的 5 项关键存储技术
V mware v sphere 的 5 项关键存储技术
分会场三神话终结者:数据丢失防护的5个神话
分会场三神话终结者:数据丢失防护的5个神话
1 john wang-experience show exec intro
1 john wang-experience show exec intro
通过Ops center优化netbackup管理
通过Ops center优化netbackup管理
分会场九Windows 7迁移最佳实践
分会场九Windows 7迁移最佳实践
分会场一新的安全威胁趋势下的企业安全建设
分会场一新的安全威胁趋势下的企业安全建设
V ds深入探究
V ds深入探究
Similar a 分会场八云及虚拟环境安全防护
Seguridad en la Nube
Seguridad en la Nube
Mundo Contact
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
HKITF
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
CloudOps Summit
Cloud Computing and VCE
Cloud Computing and VCE
Cenk Ersoy
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
AlgoSec
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
HKISPA
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Trend Micro (EMEA) Limited
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Digicomp Academy AG
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
CA API Management
Keeping IT Real Webinar
Keeping IT Real Webinar
johnworthington
102 1315-1345
102 1315-1345
Chiou-Nan Chen
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
Security in Cloud Computing
Security in Cloud Computing
Ashish Patel
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
chaucheckpoint
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Xenesys
Vmware 虚拟花技术作为云计算的平台
Vmware 虚拟花技术作为云计算的平台
George Ang
S series presentation
S series presentation
Sergey Marunich
Similar a 分会场八云及虚拟环境安全防护
(20)
Seguridad en la Nube
Seguridad en la Nube
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
Cloud Computing and VCE
Cloud Computing and VCE
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
Cisco tec chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
Keeping IT Real Webinar
Keeping IT Real Webinar
102 1315-1345
102 1315-1345
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Security in Cloud Computing
Security in Cloud Computing
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Vmware 虚拟花技术作为云计算的平台
Vmware 虚拟花技术作为云计算的平台
S series presentation
S series presentation
Más de ITband
It运维管理10大痛点
It运维管理10大痛点
ITband
Citrix虚拟化方案
Citrix虚拟化方案
ITband
利用统一存储获得无与伦比的速度,简化系统,并节省更多
利用统一存储获得无与伦比的速度,简化系统,并节省更多
ITband
Oracle 存储释放数据库价值
Oracle 存储释放数据库价值
ITband
适应业务需求的甲骨文存储解决方案及产品演示
适应业务需求的甲骨文存储解决方案及产品演示
ITband
1 opening-jeff-storagesummit-347340-zhs
1 opening-jeff-storagesummit-347340-zhs
ITband
滕达斐
滕达斐
ITband
滕达斐
滕达斐
ITband
5 hanhui-e xperience show data final cv
5 hanhui-e xperience show data final cv
ITband
4 zhang jinghui-experience show contact center
4 zhang jinghui-experience show contact center
ITband
3 junhua-experience show unified communication
3 junhua-experience show unified communication
ITband
6 wang xiusheng - experience show ip office
6 wang xiusheng - experience show ip office
ITband
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
分会场八和Net backup一起进入云备份时代
分会场八和Net backup一起进入云备份时代
ITband
分会场八Application ha和virtualstore推动关键业务虚拟化
分会场八Application ha和virtualstore推动关键业务虚拟化
ITband
分会场六用Storage foundation简化操作系统和存储系统的迁移
分会场六用Storage foundation简化操作系统和存储系统的迁移
ITband
分会场五Enterprise vault新特性
分会场五Enterprise vault新特性
ITband
分会场六利用赛门铁克的Sort工具降低风险,提高应用的持续运行时间 中文版
分会场六利用赛门铁克的Sort工具降低风险,提高应用的持续运行时间 中文版
ITband
分会场一攻击趋势与攻击手法的剖析
分会场一攻击趋势与攻击手法的剖析
ITband
分会场一企业安全及审计
分会场一企业安全及审计
ITband
Más de ITband
(20)
It运维管理10大痛点
It运维管理10大痛点
Citrix虚拟化方案
Citrix虚拟化方案
利用统一存储获得无与伦比的速度,简化系统,并节省更多
利用统一存储获得无与伦比的速度,简化系统,并节省更多
Oracle 存储释放数据库价值
Oracle 存储释放数据库价值
适应业务需求的甲骨文存储解决方案及产品演示
适应业务需求的甲骨文存储解决方案及产品演示
1 opening-jeff-storagesummit-347340-zhs
1 opening-jeff-storagesummit-347340-zhs
滕达斐
滕达斐
滕达斐
滕达斐
5 hanhui-e xperience show data final cv
5 hanhui-e xperience show data final cv
4 zhang jinghui-experience show contact center
4 zhang jinghui-experience show contact center
3 junhua-experience show unified communication
3 junhua-experience show unified communication
6 wang xiusheng - experience show ip office
6 wang xiusheng - experience show ip office
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场八和Net backup一起进入云备份时代
分会场八和Net backup一起进入云备份时代
分会场八Application ha和virtualstore推动关键业务虚拟化
分会场八Application ha和virtualstore推动关键业务虚拟化
分会场六用Storage foundation简化操作系统和存储系统的迁移
分会场六用Storage foundation简化操作系统和存储系统的迁移
分会场五Enterprise vault新特性
分会场五Enterprise vault新特性
分会场六利用赛门铁克的Sort工具降低风险,提高应用的持续运行时间 中文版
分会场六利用赛门铁克的Sort工具降低风险,提高应用的持续运行时间 中文版
分会场一攻击趋势与攻击手法的剖析
分会场一攻击趋势与攻击手法的剖析
分会场一企业安全及审计
分会场一企业安全及审计
Último
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Overkill Security
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Último
(20)
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
分会场八云及虚拟环境安全防护
1.
云计算及虚拟化数据中心安全防护
Yu-Min Lin, CISSP, CISA, SCSP Senior Principal System Engineer Copyright © 2010 Symantec Corporation. All rights reserved. 1
2.
大纲
1 走近云世代 2 虚拟化数据中心安全防护 3 云计算安全威胁与对策 4 安全产品的云化 5 结论 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 2
3.
走近云世代 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 3
4.
信息科技的三大发展趋势
云计算 移动互联网 社交网络 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 4
5.
正在改变你我生活的云技术 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 5
6.
新一代的工作环境与模式 Mobility
Cloud Services Employees Customers Partners Collaboration Rich Media Society Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 6
7.
采用云计算的阻碍与顾虑
} 31% Source: Springboard Research, 9/2010 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 7
8.
风险与效率的平衡 安全风险
运维效率 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 8
9.
虚拟化数据中心安全防护 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 9
10.
虚拟化数据中心基础架构的变革
应用程序 应用程序 应用程序 操作系统 操作系统 操作系统 虚拟机 虚拟机 虚拟机 虚拟化 虚拟化平台 物理机 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 10
11.
虚拟化数据中心安全风险(I)
应用程序 应用程序 应用程序 操作系统 操作系统 操作系统 虚拟机 虚拟机 虚拟机 虚拟化平台 物理机 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 11
12.
虚拟化数据中心安全风险(II)
应用程序 应用程序 应用程序 操作系统 操作系统 操作系统 虚拟机 虚拟机 虚拟机 虚拟化平台 物理机 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 12
13.
虚拟化数据中心安全风险(III)
应用程序 应用程序 应用程序 应用程序 操作系统 操作系统 操作系统 操作系统 虚拟机 虚拟机 虚拟机 虚拟机 虚拟化平台 虚拟化平台 物理机 物理机 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 13
14.
虚拟化数据中心防护趋势
更安全!更节能! 更轻!更快! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 14
15.
云计算安全威胁与对策 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 15
16.
云计算安全威胁 Information at Rest
Information in Use Information in Motion •防护边界消失 • 拒绝服务攻击 •云端资源滥用 • 黑客攻击及假冒身份 •数据隔离、外泄与销毁 • 网络钓鱼及恶意网站 •恶意代码 •双向审计及服务保障 • 数据传输加密 •敏感数据外泄 •免责条款及永续经营 •系统漏洞 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 16
17.
赛门铁克信息核心云安全模型
Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 17
18.
赛门铁克云安全解决方案 Information at
Rest Information in Use Information in Motion Security & Hosted Services • SSL Certificates • Hosted Messaging Security • Hosted PKI • Hosted Web Security • VIP • Hosted Endpoint Protection • Trust Services • Mail Security Gateway • Critical System Protection • Data Loss Prevention • Web Security Gateway • Symantec Endpoint Protection • Control Compliance Suite • Encryption • Network Access Control • Data Loss Prevention •Endpoint Protection for Servers •Encryption • NetBackup & Backup Exec • Norton Security Suites • Enterprise Vault • Mobile Antivirus • Storage Foundation • Mobile Management • Workflow • Altiris IT Mgmt Suite Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 18
19.
安全产品的云化 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 19
20.
恶意代码趋势 (2002 –
2009) 2009年… • 57% 恶意代码只出现在单一计算机 • 传统防病毒机制已力有未逮!! 成长17倍!! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 20
21.
赛门铁克云端文件信誉评级工作原理
数据提交服务器 2 1 蒐集数据 计算文件信誉评级 云端信誉评级发布服务器 文件杂凑 好/坏 信心指数 普遍性 首次出现时间 3 发布文件信誉评级 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 21
22.
赛门铁克云端服务
For the Enterprise For the Consumer 14 Data Storage SLAs 87 PB Foundation Centers 32k 10.9 million 72% Pennies/GB Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 22
23.
赛门铁克云安全服务
Software-as-a-Service E-mail & IM Security Web Security Enterprise Endpoint Security Email Archiving $ Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 23
24.
赛门铁克云安全服务成效
Actual SLA Sep‘10 2.3 Million pieces of AntiSpam Malware captured in 99% 99.99997% Feb 2010 effectiveness 434 Thousand were captured only by Spam false 0.0003% 0.000008% Skeptic positive rate 31 Billion email connections per day in Feb AntiVirus false positive rate 0.0001% 0.000005% 1 Billion web requests per day in Feb Email & Web Service Availability 100% 100% 3.0 Billion emails scanned by Skeptic in Feb Average Web scanning time 100 ms 30.2 ms Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 24
25.
结论 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 25
26.
云计算安全管理三要素 Copyright © 2010
Symantec Corporation. All rights reserved. Symantec Vision 2010 26
27.
互联世界 满怀信心
Trust Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Vision 2010 27
28.
Thank you!
Yu-Min Lin, CISSP, CISA, SCSP yu-min_lin@symantec.com +86 10 85180008 ext. 2130 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2010 Symantec Corporation. All rights reserved. 28