Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How does the cloud terminal prevent the leakage of stored data? Where is its data stored?

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Netizens asked: how does the cloud terminal prevent the leakage of stored data? Where is its data stored?

First of all, which company's cloud terminal do you use?

Is it public (Internet open registration) or private (the company builds its own platform), or desktop virtualization?

Generally speaking, the security solutions for data leakage prevention on cloud platforms are provided by the companies of cloud products, so the initial selection of products is very important.

Now BYOD office is very hot, mature private cloud products will have a dedicated office storage space, the data in this part of the storage space to do strict identity and access control.

In the case of desktop virtualization, both are centralized storage aspects, and the data is stored in the background. The small scale of users is stored on the server, and most of the users are on the storage devices directly connected to the background server. But the security of this part of the data is still provided by the manufacturer. Although the display on each cloud terminal is the same as the real PC, in desktop virtualization, the terminal, display, keyboard and mouse are all input and output devices, which can not be well supported by the traditional terminal security management software.

Original address: http://www.jishulian.com/forum.php?mod=viewthread&tid=455

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report