Tencent Security and Ruijie Networks strategic cooperation, threat intelligence capabilities "integrated"

On February 28, Tencent Security and Ruijie Networks jointly held a "Threat Intelligence" strategic cooperation conference in Beijing. The two parties released a new-generation firewall integrated with Tencent's security threat intelligence, and held a strategic cooperation signing ceremony.

At the meeting, Xiang Xiaosheng, general manager of Ruijie Network Security Products Division, and Chen Long, general manager of Tencent Security, signed a strategic cooperation agreement on behalf of the two parties. At the same time, industry experts and guests from ICT Institute, Ruijie Networks, Tencent Cloud, Tencent Security, etc. were invited to participate in the conference, and delivered keynote speeches from the perspectives of threatening industry trends and product innovation capabilities.

(Tencent Security and Ruijie Networks signed a strategic cooperation agreement)

This strategic cooperation is another implementation of Tencent's security and ecological co-construction strategy. Tencent Security integrates the industry-leading threat intelligence capabilities into Ruijie network security products, which will effectively help it proactively prevent potential security threats and respond in a timely manner, making security protection more efficient. The two sides complement each other's strengths to jointly build a security ecosystem and provide security guarantees for our customers together!

Traditional security systems are facing challenges, threat intelligence helps security operations

As a sharp weapon for enterprise security defense to "turn passive into active", threat intelligence can obtain attacker's attack tools, attack methods, attack intentions and other information in advance, and directly promote the rapid response of security incidents.

However, traditional threat intelligence is mainly oriented towards security analysis during and after a threat attack, making it difficult to achieve all-round protection for business security operations. In addition, cloud-based monitoring of traditional firewalls will also lead to risk spillovers due to business first. Therefore, enterprise security operations need to pay more attention to capabilities such as practical security detection, clearer alarm classification, and scenario-based threat portraits.

In order to solve the security flaws brought by traditional threat intelligence solutions, security vendors try to upgrade threat intelligence solutions and cooperate with various security tools to help enterprises build a more complete operational protection system and reduce security risks. Although the effective application of threat intelligence brings significant value to security operations, it has shortcomings such as low coverage, high threshold, and poor use.

Gao Rui, senior manager of security threat intelligence products at Tencent, said that small and medium-sized customers are limited by cost and difficulty of use, and the overall penetration rate is not high, which has become a constraint for enterprises to build a security protection system.

In order to achieve linkage between security products and lower the threshold for using threat intelligence, Tencent Security Threat Intelligence Center TIX supports various delivery methods such as web terminal, small program, API, SDK, software and hardware integration, etc., and realizes cloud intelligence data in the user's local download through integration. Shen, it supports linkage with the user's existing security defense products to improve the efficiency of detection and response, so as to realize the best practice of threat intelligence application. The combination of Tencent Security's local SDK library with multiple intelligence sources and Ruijie Networks' next-generation firewall enables customers to have strong outbound security detection and blocking capabilities at the network border. Local identification of risks greatly reduces the identification time and realizes local detection and blocking.

Security capabilities are integrated to output a new generation of firewalls

Tencent Security and Ruijie Networks have been deeply involved in the security field for many years, and have unique insights in the fields of intelligence analysis and hardware management and blocking respectively.

Based on the importance of the integration and coordination of threat intelligence and security equipment, the two parties have joined forces and combined "hardware and software" to conduct in-depth exploration of the practical application of intelligence engines.

Tencent Security has accumulated more than 20 years of security capabilities into the field of threat intelligence, and has built a threat intelligence center TIX with basic intelligence capabilities, attack surface intelligence capabilities, and business risk intelligence capabilities. Ruijie Networks, as a comprehensive network manufacturer with profound technology accumulation, has been deeply involved in the field of network security for 20 years, and is an advocate and practitioner of "network + security".

During the development and implementation process, Tencent Security and Ruijie Networks conducted in-depth research on the scenario characteristics of firewall products, combined Tencent Security’s big data capabilities, anchored the key points of intelligence application scenarios, and provided a complete set of intelligence TIX-SDK integration kits and authorizations to help Ruijie Network to create a new generation of threat intelligence products.

In terms of integrated scenario capabilities, Tencent Security also supports Ruijie Networks with "Tencent-level" technical capabilities in four major scenarios: border protection, intrusion risk blocking scenarios; traffic detection, compromised host discovery scenarios; security operations, threat events Analysis scenarios; threat management, intelligence data operation scenarios.

Based on Tencent Security's powerful intelligence capabilities, Ruijie Networks has innovated in technology to break through many problems such as blocking timeliness, accuracy, and performance, and has achieved comprehensive improvements in threat detection coverage, key threat identification rates, and threat event description dimensions. At the same time, under the integration of Ruijie Networks firewall, Tencent's security threat intelligence capabilities jointly spread threat intelligence to a wider user layer and bring better security services to customers.

Linkage with ecological partners to jointly protect the steady development of the industry

This strategic cooperation is an in-depth exploration of the two parties in the field of threat intelligence technology. With the integration of Tencent's security capabilities and the product output of Ruijie Networks, they will jointly promote the synergy and win-win situation of the security ecosystem. As Kong Song, a cloud security expert at the Academy of Information and Communications Technology, mentioned in his speech, the integration and collaboration of threat intelligence and various security tools can not only improve the utilization rate of threat intelligence in enterprises, but also greatly enhance the professional capabilities of security tools. The complementary combination of threat intelligence vendors and security vendors is the only way to achieve a win-win situation.

For the technological development of both parties, Tencent Security, based on years of practice in the field of threat intelligence, has helped Ruijie Networks achieve three major improvements in threat detection coverage, key threat recognition rate, and threat event description dimension. Tencent's intelligence capabilities provide customers with scenario value through the integration of Ruijie Networks firewalls. At the same time, based on Ruijie Networks' extensive customer base, Tencent Security has obtained high-value user feedback and practical experience accumulation, effectively improving its own threat intelligence products. iterate.

For the industry, this strategic cooperation provides practical experience for the industry to further explore technology integration and ecological synergy. Tencent Security provides strong technical support for partners, and jointly engages in ideological collisions in terms of security situation, industry status, product services, etc., to promote the healthy and sustainable development of the security industry and security ecosystem, and truly realize technical mutual assistance and cooperation. The joint construction of the industry has contributed to a win-win situation for customers, partners and Tencent.

Tencent Security has always supported collaboration with partners and security products in an open model, hoping to help them optimize technology and services, and provide ecological guarantees for high-quality industrial development, which reflects Tencent Security's determination to build an ecosystem together.

In the future, Tencent Security will continue to implement the strategy of ecological co-construction, and hopes to actively cooperate with security vendors, cloud vendors, operators and other ecological partners to share each other's technical capabilities and practical experience, improve offensive and defensive capabilities, tackle tough industrial problems, and face different industries. According to the specific needs of industries, different industries, and different development stages, we will provide matching security joint solutions, export more valuable technologies and capabilities for industries and customers, and help the industry to develop steadily and long-term.

Guess you like

Origin blog.csdn.net/qcloud_security/article/details/129266957