Third China Data Security Governance Forum Nanjing sub-forums come to an end

The digital age, all things Internet, and core data as the bearer, whose safety has become one of the core issues in network security. With the level protection system 2.0 released national standards, network security, public opinion once again pushed to the high point. May 17, hosted by a third gold Anwar Data Security Governance Forum Nanjing sub-forum in Jiangsu Province Information Security Industry Alliance guidance, Shanghai, Hong wing Software Technology Co., Ltd., the number of Swiss information technology (Shanghai) Co., company and other units come to an end with the participation of support. Anwar gold and all the way to carry data security management concept line to Nanjing, Jiangsu to bring a user to regions such as Paul 2.0 era, gluttonous feast under the new security situation data security building.

Make use of data security and freedom 

Beijing Anwar gold and Technology Co., Ltd. CEO Liu Xiaotao General Assembly in his speech said that the release of data and to enhance the value of the data drive black production and abuse, data security issues to the government and enterprises has brought great challenges. Network security has risen to the height of the country, "××× Network Security Act", 2.0 grade protection system, are all reflected in national cybersecurity will. As a professional data security vendors, Anwar gold and obligation to help users have a responsibility to make every effort to build network security, building a free and secure data security system.

1 copy .jpg

Anwar gold and Solutions Director Gan Xuan Miao ideas from both data security and application management on "data security technology system and practice of governance" were to share. 2.0 level of protection data security requirements are proposed in general much deeper security, cloud computing, mobile Internet, networking, industrial control portion. Xuan Miao Gan for the data security building security situation in order, using data security management and control, data security audit of the construction route, as well as organizations, capacity assessment, system design, technical design of the four stages in detail. Data security and governance to share in the cloud-government project in practical application. Scene permissions and data applications focused on data, so data security management to bring real value to users.

2 copies .jpg

Anwar gold and the financial industry solutions expert Shi Lei on the "Guide to Data Security building governance" has been interpreted, respectively, were described in detail from the capability dimension, a dimension execution, thinking of building a scene dimension. He pointed out that data security management, product solutions than just a combination of a set of tools, but, from system management tools to support decision-making from the technical level, from top to bottom throughout the entire organizational structure of the complete system construction .

3 副本.jpg

Hung Wing Software Technology Co., Ltd. Deputy General Manager of Shanghai Yan said bringing speech "data security network disk + ECM governance model based on sharing". Details Hung Hung wing by wing easy to store application intelligent security network disk technology in the bank. For bank data security requirements and application scenarios, the formation of Internetwork ferry, cloud data, the data do not fall, VDI integration complete solution.

4 副本.jpg

Number of Rui Information Technology (Shanghai) Co., Ltd. Wu Jiangang, director of "The Dark Side - Perspective unknown data leakage risk" as the theme of sharing. He pointed out that traditional data security, more focused on internal data security, data governance concerns, internal data leakage prevention, like the front of the moon. But with the opening of business, employees, partners and users can directly access business data, which brings another risk of data loss, like the dark side of the moon. And guests attended the legitimate user and crawling along on volume business data through automated tools, crawling after successful black production hit library user data and API interfaces abuse unknown risk of data loss and other issues were discussed.

5 副本.jpg

Professor Hou Xiao Li China University of Mining and based on years of research experience has been shared for the "network security and data governance." Professor Hou think network security is relative, architecture is three-dimensional, hierarchical system of all-round space, and according to the law of the barrel, from inside the fort most likely to break, so data management is particularly important. Deployment of database security products, to do a preliminary inspection, and control and audit access to three levels. Scene, Hou shared network security architecture diagram China University of Mining and gave a detailed account from identification to protection and then to monitor database security solutions.

6 副本.jpg

Jiangsu Jinling Technology Group Co., Ltd. Shuai director of "internal network data security risk management technology and application" as the theme to share. Director Wang pointed out that the risk perception and disposition within the network cloud security platform P2DR2 dynamic security model, can monitor the security situation, and linked with the protection module to generate the corresponding protection rules, this platform has monitoring, protection, early warning analysis and disposal in one of the features.

7 副本.jpg

Between 2019, the author of the concept of governance data security Anwar gold, which lasted three years, has been the concept of data security governance to fall more and more industries and is widely recognized and praised. Future, Anwar will rely on their accumulated gold and advantages in technology and industry, to build a free and secure data security system along with the user, data security, help build Jiangsu Province.


Guess you like

Origin blog.51cto.com/schina/2401003