About us

Quality oriented, customer-oriented, hardworking, pragmatic and innovative

<Return to the public list of news

Why can Huawei VM ensure user data security?

Release time: 2012-05-31 19:19:13

This year's Huawei Developer Conference HDC. Due to the special situation that Cloud moves offline, Huawei's cloud enterprise host security, as part of the network security guard, provides strong support for the entire meeting. Huawei software development protects cloud computing resources and provides a secure and reliable development environment for many software developers. At present, Huawei's cloud enterprise host security has made new breakthroughs in functions. So why can Huawei VM ensure user data security? Today, Micronet will take you to a deeper understanding of Huawei's Virtual machine

Micronet believes that security has no boundaries. Wise people should think far ahead to meet the security challenges of the future Internet of Things era. Many new features of Huawei's cloud enterprise host security service released this time are defense forces that have expanded with the mainstream development trend.


 Why can Huawei VM ensure user data security?

01 The ram support of Huawei virtual machine enables the installation and use of Kunpeng virtual machine.
Today, with the rapid development of cloud computing, ARM with low power consumption and low cost can better meet the needs of enterprise computing in the cloud era. The appearance of Peng reflects the charm of ARM. In the future, all basic services and a large number of major services of Huawei Cloud will be based on Peng.
ARM architecture has higher security and reliability, but like X86 architecture, it may face host security risks, account decryption, weak passwords, malicious programs and other threats. Huawei's cloud service is also completely consistent with Peng Ecology. The first major function of enterprise host security is to fully adapt to ARM. Pengpeng host can be installed with confidence.

02 Huawei VM supports IPV6 to prevent attacks on IPV6 addresses.
On November 24, 2019, European RIPE confirmed that global IPV4 addresses were officially exhausted. With the emergence of cloud computing, big data, artificial intelligence and other emerging networks, the number of IPV6 address users is increasing. According to the Chinese Academy of Communications, as of July 2019, a total of 1.278 billion users had access to IPv6 addresses, and the number of Internet application IPV6 active users also reached 210 million.
With the promotion of government departments, IPV6 will achieve rapid and large-scale construction. In this case, network security will face more new challenges.
Security problems caused by IPV6
Compared with IPv4, IPv6 has taken security factors into consideration at the initial design stage, but because of the huge address space, it has great advantages in dealing with some security attacks. However, there are still many security risks.
With the connection of IPv6 network and business, IPv6 network attacks have begun to occur, and IPv6 network security problems have emerged one after another. According to the White Paper on Securing the Next Generation Internet Security - IPv6 Network Security published by the China Academy of Information and Communications, according to the statistics of domestic security enterprises, more than 90000 IPv6 network attacks were found in the first half of 2019, including government departments, business units, educational institutions, etc.
In March 2019, domestic security enterprises prevented 80 million network attacks on IPv6 addresses (IPv6 network attacks include attacks on IPv6 addresses and various attacks using IPv6 networks or security issues).
The security challenges brought by the development of IPV6 include:
1 Due to the huge address space of IPV6, there will be more devices accessing the network, the number of devices will increase, and network attacks and potential security threats will be greater.
2 Upgrading from IPV4 to IPV6 requires long-term conversion. To this end, security products must support both IPv4 and IPv6.
3 With the expansion of IPV6 scale, new attack modes will continue to appear.
Huawei cloud enterprise host security supports both IPV6 and IPV4. It can detect attacks caused by IPV6 addresses, provide users with IPV6 defense functions, and provide sufficient room to solve security problems in the IPV6 era.

03 Support subscription security report
Complete security reports enable enterprises to understand the security status of hosts more accurately and in a more timely manner, so as to quickly implement effective security measures. The host security enterprise version released by Huawei Cloud this time provides a new security report subscription function.
-Retain for 180 days, in accordance with warranty provisions such as.
The statistical cycle of the safety report is divided into weeks and months, and it can be saved for 180 days, which can meet the insurance compliance requirements.
-Support online viewing and downloading
The report can be viewed online, downloaded and circulated by internal personnel.
-Multi dimensional display and all-round mastery
The report displays the security status of the current host from multiple dimensions, such as intrusion risk, vulnerability risk, and benchmark risk, so that enterprises can fully understand the security status of the host.

04 Vulnerability click recovery support
Scanning for vulnerabilities is easy, but fixing them is a big project. Especially for large enterprises with hundreds of Huawei virtual machines, this may take a long time and may cause failures. The click to repair vulnerability released by Huawei Cloud Enterprise Host Security this time can comprehensively solve the problem, support the batch repair of vulnerabilities, and help enterprises achieve operational automation.
1 Rich vulnerability database, real-time update
130000 vulnerability databases cover most vulnerabilities, and support real-time updates. New vulnerabilities can also be added to the database within 24 hours.
2 One button maintenance, simple operation and maintenance
It supports patch file download and automatic installation and update, timely checks for missing traps, and minimizes vulnerability risks. Especially for large enterprises with hundreds of hosts, it can greatly improve operation and maintenance efficiency.
At present, the vulnerability click repair function is in the invitation stage, and can be applied through the customer manager if necessary.


 Why can Huawei VM ensure user data security?

The importance of host security is self-evident. If the host recruits the whole system, it will only cause huge losses. 360 protects the host security in an all-round way, and the defense ability MAX's protector "host security" is indispensable!

The above is the reason why Huawei VM can guarantee user data security introduced by Micronet. I believe you will have a deeper understanding of the security issues of Huawei VM after reading it, and it will also be convenient for you to choose Huawei VM.
Huawei Cloud, a micro network agent, is an excellent cloud computing service provider. It can provide the best service for friends who want to rent Huawei VM to open their own online business. It has perfect industry solutions and excellent cloud computing technology. The self-developed pure SSD architecture virtual machine breaks the industry record with 50000 IOPS random read/write speed and 800 Mb/s throughput as performance indicators. The ECS elastic virtual machine uses pure SSD architecture hardware devices. It can easily acquire and enable the cloud in just a few minutes to meet your computing needs. Expanding the flexibility of resource use also saves you computing costs, simplifies IT operations, and enables you to pay more attention to core business innovation.


Huawei VM: hopechilam.com



/template/Home/Zkeys/PC/Static