You’re already using it
You may already be familiar with the term ‘Real Time Protection’, which could just as easily be labeled ‘Cloud Protection’. Simply put, when a vendor’s research team identifies a new email threat, the characteristics of the message are sent to all affected hardware appliances straightaway, so that the malicious content is immediately blocked. This all happens far ahead of the regular update by on-premise virus signatures.
Because they are outsourced, Cloud technologies can be implemented far more flexibly; it could also be referred to as an “elastic protection”. Conventional security technologies demand computing power from both onsite hardware and software. But when new threats emerge it means that much more computing power is necessary to take successful action against the threats from one moment to the next. This performance can be provided in the Cloud without having to replace or upgrade the customer’s …