Cloud computing industry into the "soft power" era of competition, get security to those who have "the world"

  Cloud computing industry into the "soft power" era of competition, get security to those who have "the world"

  In recent years, the government needs to promote and market the dual impact of cloud computing industry to accelerate development in China. According to the China Institute of Communications information display, 2018 China cloud computing industry reached 96.28 billion yuan; the next few years will maintain steady and rapid growth, by 2022 the market will reach 290.29 billion yuan.

  In the context of the global wave of intelligent information technology-driven industrial upgrading also brings a more serious security threats and challenges. Malware soared and increasingly attack against business objectives; the degree of harm caused by unknown threats continue to upgrade; black ash production start applying AI and other emerging technologies to enhance the capacity and efficiency of attack; DDoS attacks occur frequently, the scale increasingly greater.

  "DDoS Threat Report 2019" shows that in 2019, the number of DDoS attacks slight downward trend, but the attack traffic situation is still grim. Since 2018, the industry found that the peak of 1.94 Tbps, DDoS attacks have not entered Tb-level contingencies.

  Faced with increasingly complex security environment, security systems and patterns of traditional hardware and software start powerless. Tencent Research Institute released the "2020 Security Industry Report" that the era of cloud computing security issues presents a new systemic and global nature of the security being promoted to an unprecedented degree of importance.

  With the degree of digitization of all walks of life deepening security threats facing the Internet industry more subtle, complex, more destructive. Security has become the lifeblood of business, related to business survival. Once the business user data stolen by hackers, not only stock prices, profits will suffer a huge impact, may also lead to huge user a crisis of confidence, to bring sustained damage; the same time, security is also related to business development, digital throughout the R & D, production, distribution and service the entire process, all requirements related to safety, security has gradually become one of the core competitiveness of enterprises. It can be said that security is not only the development of enterprises, "the bottom line", but will become a restricted enterprise development "ceiling."

  The era of cloud computing industry rely on first-mover advantage, advertising brainwashing, brutal price competition and other ways to gain market share has been in the past, relying on the technical strength and service capabilities, collaborative ecological and other "soft power" to gain market "second half" is turned on, and the cloud security service providers the ability to become one of the key elements to obtain incremental market, the stock market business.

  Cloud security threats era struck five pain points to be solved

  The face of the demographic dividend peaked, market growth bottlenecks, the urgent need to enhance the effectiveness of service and many other challenges, China's financial, retail, industrial, transportation, government, medical and other industries have on the cloud, hoping to achieve cost efficiency through digital transformation, optimization services The goal. But in the face of security threats come calling, a large number of traditional enterprises have neither perfect, robust security defense system, there are not enough to put the cost of security operations and security talent pool which can be said to "pain points" a lot.

  First, security is not easy to control costs. On the one hand, the high cost of renovation, old equipment, maintenance and management of the process of forming a hard "spider web" of large quantities of data migration need to invest in technology and the cost is quite high. On the other hand, the high cost of operation and maintenance, network security products and services company with revenues do not match the price, especially for small and medium enterprises, capital investment more difficult.

  Second, weak security capabilities. Traditional security methods are backward, not enough to cope with new attacks and increasingly complex network environment, data silos, information silos situation is still serious. With future developments in the field of government services, smart city, industry and other regulatory requirements and continue to improve the integration of information, for the enterprise data lifecycle security capability requirements will be more urgent.

  The third is to accelerate the upgrading of security technology. Data-centric security technologies to increase demand, technological innovation to promote the industrial Internet security technology along with upgrades, application cloud security, mobile security, physical security and other networking technologies also raised new challenges to security.

  Fourth, security implementation efficiency should be improved. Internet security industry's future development is not a unilateral cuts can be resolved, the key need more joint force. China's investment in network security more developed countries there is still much room for improvement. For businesses, the efficiency of the implementation of network security depends on strategic, decision-making, implementation level all-round awareness, lack of will to any layer of network security are likely to hinder the implementation effect.

  Fifth, the absence of security personnel. The new age of the Internet security industry needs and finer division of labor safety, require even greater resources to support the security personnel. But now, our network security personnel training and industry needs serious decoupling, a huge gap.

  Lone fast, Public Bank far, the establishment of security on the cloud first line of defense

  Face a lot of pain points, how low-cost enterprise in the cloud process efficiently build their own safety and security defense system operational capability? Currently leading cloud service providers have given the problem-solving method. In recent years, is committed to the security building cloud Tencent cloud, for example, may be a glimpse of what is "secure cloud" and how to build a cloud network security. In the "cloud convergence," the second half "first line of defense."

  As a cloud vendor, we must first have experience in operating a large-scale infrastructure in order to continue to provide high-speed, stable, secure cloud services. It is understood that the total amount of Tencent whole network server has more than 100 million units, peak bandwidth breakthrough 100T, infrastructure covering 25 regions on five continents.

  A patent is an important indicator reflects the level of technology and business competitiveness. I think tank Intellectual Property Press release issued the "China Internet cloud technology patent analysis report" shows that as of December 2019, Tencent cloud technology patent applications reached 4899, patent applications, granted, the number of valid patents, patent price etc. system ranked first, the inventor team reached 5948 people. In the field of cloud technology segments, Tencent security in multiple dimensions, such as maintaining the industry's first big data, where the number of patent applications in the field of security reached 1599, up 32% ahead of second place.

  Threat intelligence network attack and defense is regarded as the first level of perceived risk and the "siren." With 20 years of experience in network security Tencent cloud, combined with years of production experience against black and gray, can be filtered and automatic identification of massive data security, a threat intelligence repository. In a particular large network attack and defense activities, Tencent has been relying on cloud threat intelligence center, take the initiative to attack successfully blocked more than 30,000 times, the safety analysis report the incident thousands of times, the new network is detected attack dozens of times.

  Offensive and defensive capabilities are reflected in hard power security technology, including the excavation and collection of cloud vulnerabilities, emergency response to emergencies, such as hacker attacks traceability. Tencent cloud security offensive and defensive team, take the form of red and blue in the internal confrontation, continue to hone improve the team's offensive and defensive technology to collect security vulnerability on the cloud.

  AI + large data capacity, compared with the cloud service provides more security guarantees. Mengniu had during the 2018 World Cup, relying on Tencent large data capacity black ash cloud, AI risk control model to achieve accurate identification, real-time judge and grade three level marketing risk control process guarantees fast, accurate and relentless rejected "Wool Party, "the plunder.

  Cloud computing to break the traditional boundaries of network protection, security planning and construction of a business or organization, it is difficult to provide a single, a security company full technical capacity to solve. With the development of the Internet industry, and the complexity of the incremental security requirements, accelerate the ecological security co-build is imminent. To this end, Tencent past few years has been advocating construction of ecological safety, set the power of the multi-industry collaboration to promote development.

  It is understood that Tencent and partners together to create a joint security solution for over 20, these joint solutions accounted for Tencent secure the whole category sales ratio reached 26%; in the first half of 2019, Tencent security products through channel partners sales growth It has reached 200%. Based on the good practice of cooperation, Tencent is exploring ecological and security partners, "shared ecological resources, complementary capabilities, ecology build a" cooperative mechanism, shared industrial safety bonus.

  Cloud computing era, provides digital crack of the Road for China's all walks of life science, health and sustainable development. Facing the complex network security situation, to build "a more secure cloud," should be the mission of all cloud service providers; choose "safer cloud", should be the primary consideration elements of corporate procurement.

Guess you like

Origin www.cnblogs.com/jinsexiaomifeng/p/12637312.html