"Yunqi Conference" Alibaba Cloud released a remote office zero trust solution-identity will become the new boundary of enterprise security

"The future of digital intelligence, full speed reconstruction." From September 17 to 18, the annual digital economy wind vane Yunqi Conference hosted by Alibaba came as scheduled. Unlike previous offline events, the Yunqi Conference was held online for the first time this year. On September 18, at the site of the heavy release of Alibaba Cloud technology, Xiao Li, vice president of Alibaba and general manager of Alibaba Cloud Intelligent Security, officially released the Alibaba Cloud remote office zero trust solution.

In this epidemic, more than 300 million people around the world choose to work remotely. With the characteristics of improving office collaboration and corporate management efficiency, and reducing the risk of crowd exposure, remote office has become an important way for companies to resume work and production safely during the epidemic. Xiao Li said that the end of the new crown epidemic does not mean the end of remote working, and that remote working will become the normal working method of enterprises.

However, for most companies, the remote office system temporarily built due to the epidemic can solve the office needs of corporate employees, but it also brings a lot of crises.

1. Remote office terminal security

2. Internal business system security

3. Remote access stability

4. Leakage of sensitive corporate data

In this context, the core of this Alibaba Cloud remote office zero-trust solution is "trusted and dynamic", through trusted terminals, trusted identities, and trusted applications to create dynamic authority management and dynamic security detection and protection capabilities. Realize the security protection of the whole link.

 

With more remote office requirements and the development of mobilization and cloud computing, the original security concept mainly based on network boundary isolation will not be able to deal with the new security threats of the current enterprise. Xiao Li said that identity will become the new security boundary of the enterprise. It can be seen that identity authentication and transmission channel encryption have become a key part of the remote office zero-trust solution.

As a domestic independent CA brand built by Tianwei integrity and passed the international WebTrust audit certification, vTrus can simply and safely solve the problem of remote users accessing the company’s sensitive data. Its security is mainly based on the TLS protocol and is encrypted with the PKI certificate system. transmission. The TLS protocol layer includes two types of sub-protocols: SSL/TLS handshake protocol and SSL/TLS record protocol. Together, they provide encryption and tamper-proof functions for application access connections (mainly HTTP connections). SSL/TLS can perfectly handle the Internet protocol stack between TCP/IP and the application layer without affecting other protocol layers. This embedded function of SSL/TLS can also be used for similar Internet applications, such as Intranet and Extranet access, application security access, wireless applications and web services.

Now vTrus domestic SSL certificates have been officially put on the Alibaba Cloud platform, and users can purchase them directly on the Alibaba Cloud platform. vTrus supports binding wildcard domain names, single domain names, and supports RSA algorithms to meet the individual needs of cloud users for product prices and different business scenarios. At the same time, all Alibaba Cloud customers who place an order from September 1st to September 30th can enjoy a 15% discount on benefits, and there is also a vTrus super value first release commemorative gift waiting for you to receive!

When traditional VPNs could not continue to meet the needs of enterprises, the enterprise security access system based on the concept of zero trust began to be widely used. Xiao Li finally stated that the zero trust architecture is not a superposition of all related technologies, nor is it simply identity management. Enterprise security is responsible What people need to think about is how to build a dynamic security defense system based on the needs of enterprise business development. SSL/TLS encryption, as a key link, will help enterprises develop rapidly in a more secure scenario.

Guess you like

Origin blog.csdn.net/qc007000/article/details/108737619