The emergence of cloud computing makes it possible for public customers to obtain low-cost, high-performance, fast configuration and quantitative computing services. However, just like a coin has two sides, while cloud computing such as cloud server brings us economies of scale and high availability, its core technical characteristics (such as virtualization, resource sharing, distribution, etc.) also determine that it has natural hidden dangers in security. At the same time, the more sensitive data companies have, the more important the issue of security becomes, especially in heavily regulated industries such as healthcare and financial services. Cloud security is the latest embodiment of information security in the network era. “Cloud security is based on the traditional virus defense technologies, combined with parallel processing, grid computing, emerging technologies and concepts, such as unknown viruses judgment through the network of a large number of the client software of network behavior monitoring, so as to obtain the Internet Trojan horse, malicious programs, such as the latest information, and then to distribute the solution to each client for automatic analysis and processing, Finally from this and the establishment of the vertical body security defense system. After the application of cloud security technology, the method of virus identification and removal no longer relies on the virus database in the local hard disk, but relies on the huge network services for real-time collection, analysis and processing. It is reported that cloud security can support an average of 5.5 billion queries per day and collect and analyze 250 million samples per day. The whole Internet is a huge “anti-virus software”, the more participants, the safer the participants, the safer the whole Internet will be. Therefore, the development of cloud security is like a gust of wind, Rising, Kaspersky, Kingsoft, 360 security guard and so on have launched cloud security solutions. In order to protect the cloud resources, cloud security system needs not only covers the full life cycle of cloud and the whole comprehensive solutions in the field of security, by increasing visibility, control and automation degree to assist the client against the latest threats, but also need to develop flexible and extensible solution, to meet the specific requirements of different customers. Therefore, to get a cloud security system up and running, you need to solve these five problems. Massive clients (cloud security probe) Only a large number of clients can be sensitive to malicious programs and dangerous websites on the Internet. In general, the higher the usage of a cloud security vendor’s product, the faster the response time. Finally can realize no matter which netizen’s computer is poisoned or visited the horse web page, the cloud security system can respond in the first time. Professional anti-virus techniques and experiential malicious programs should be analyzed as soon as possible after being detected. This requires cloud security vendors to have excellent technology, otherwise it is easy to cause the accumulation of samples, so that the ability of cloud security system to detect quickly is greatly compromised. A large amount of capital and technology investment Cloud security systems require huge investment in servers, bandwidth and other hardware, and cloud security vendors are required to have the corresponding top technical team and continuous research funds. More flexible and extensible Architecture To meet users’ personalized requirements, cloud security systems must be flexible and extensible on the premise of high security, and can even be integrated into existing service applications. The cloud security system is an open system, and its “probes” should be compatible with other software, so that users can enjoy the results of the cloud security system even if they use different antivirus software. It should be said that cloud security is an innovative way in the field of security. With the power of the Internet and cloud computing, making everyone become a “security guard” is the ultimate goal of cloud security. In the future, with the continuous emergence of cloud security service providers, a large number of new security segmentation fields and comprehensive security protection technologies will emerge one after another. The application of new technologies and knowledge will not only provide users with security services, but also make cloud security systems more intelligent and personalized.