[Comment] 360 soft6 star won the first single government and enterprise security, the situation becomes tricky

640?wx_fmt=png

An egg can draw many times, a love can do. 

- Leonardo da Vinci

  640?wx_fmt=pngChina Software Network Daily Collection

June 26, three hundred and sixty announced that a subsidiary of Qihoo 360 Technology winning network security Collaborative Innovation Industrial Park, a project bid amount is 239,500,000 yuan, the core projects include: Urban Safety brain, network security personnel training base, large collaborative data security technology national Engineering laboratory, network security Science and technology Museum, the Internet cloud industrial center, network security against the base.

640?wx_fmt=jpeg

360 spent two and a half months, one after another in the voices of doubt, scored its first big single government and enterprises after the separation. 360 side claimed the city industrial park create a set of security operations command, big data security technology research collaboration, network security personnel training, combat offensive and defensive drills, and many other network capabilities in one, network security practices with the benchmark significance of training and demonstration bases.

1

These items apart to see, most of the 360 is still in the "retreat." This is not to say "retreat" is the concrete deeds. Such as science museums, science and technology museum is a place of exhibition posters of network security, the purpose is to raise people's awareness of network security; another example, the network is to provide security against the base attack and defense simulation training platform for a confrontation, the aim is to continuously temper offense and defense personnel technical and tactical, which are necessary to do something.

In this regard, ah, eat melon melon is the people most concerned about: 360 to help government and enterprise customers to solve any security problems, such as 360 can not be able to resist the blackmail virus, can not be capable of defending against APT attacks, can we not be able to have occurred after the attack, rapid disposal attacks. From this perspective, some 360 successful projects is "retreat."

Anyway, the 360 made a good start, indeed gratifying. According Eastcom Securities expects 360 will be relatively large and local governments to talk about cooperation, the focus is to seize the big one, the company won the first turnkey government or the city, to the eco-companies, make their own core security business. This analysis Eastcom securities is very clear, 360 city as a unit, the brain relies on City Safety won the city-level security operation projects, some of which then subcontracted the project to the ecological partners, make the most professional companies to do the most professional thing.

2

This path right! But the first question is touched 360 other security vendors cake. China's network security market has experienced twenty years of development, also gave birth to some of the overall abilities of the security companies, such as Venus, Cian letters, they rely on comprehensive products and solutions, has long been the city in terms of security layout. Orders won the city, a steady stream of security vendors will be able to sell products and services. So this piece of business, 360 is not readily available.

The second issue is how to secure the brain in the city safe landing scenario. We all know that 360 security 2C fought for so long, has accumulated a wealth of virus samples, malicious URL, IP address, vulnerability data and other resources, these data can be said to be the basis of 360 security brain. However, these data are usually derived from the personal terminal (PC, mobile phones, car, etc.), consumer applications (electricity providers, social), etc., are not necessarily applicable to enterprise-class terminal (industrial host, etc.) and enterprise applications ( financial and tax software, Invoicing, database) as well as enterprise-class business environment.

for example. 360 at the time of detection of external threats (such as extortion viruses, Trojans mining, fishing and other web site) are very powerful, but in the government and enterprise organizations to detect insider threats when it (such as internal staff unauthorized access to confidential information within the enterprise)? This behavior is similar to the lack of business services 360 genes can be detected whether still unknown.

Then the third question again, how to solve the 360 problem of the lack of business-side data? I believe that there are two paths. The first is the product must be 360 deployed in the enterprise end. But the complexity of enterprise IT environment, the consumer business is not comparable. For example, to configure a host on industry, industrial host uneven, the difference may be only 256M of memory, in order to host this tops 360 security products, fit a wide variety of operating systems, and can not influence the efficiency of industrial production, which You can imagine the difficulty of. From the 360 security products in the personal terminal point of view, this is not something one or two days to complete, the product must be polished after a long and extensive customer service experience.

The second path is through the power of ecology, open 360 security brain API, access security device ecosystem partners to maximize the capacity of 360 security brain. This path also in line with the old Zhou said, 360 reached the market and which vendors are not trying to compete, but to create an ecosystem.

3

So, in this year's ISC, Zhou proposed to the "build big ecology" of such a topic, I hope in this meeting, so that more start-up of network security company to have a stage show, can contribute to greater cooperation within and outside the industry, so that the whole industry can create a sound development of the ecological environment.

Eco have to have a unified standard, so other manufacturers' equipment and data access can come in. But now such a stage, to achieve seamless there are some difficulties between the various security vendors, and even the same manufacturer synergistic collaboration capabilities of different devices time are still unknown. 360 threats such as sending a malicious IP intelligence under the Information Center, the firewall needs to ban this path IP and network connection, if the firewall can not recognize this information, it will not help.

So, ISC2019 is 360 chance to prove himself to the public.

360 came, and off to a good start, after all, the company had had to subvert consumer-grade network security market. 360 has also been good news for investment in the fields of government and enterprise security, support may be able to have their own "brothers, one vote", the pattern of China's network security market is also more subtle .


640?wx_fmt=png

640?wx_fmt=png

Not Goushuang? CDEC to it! Click to read the original text which have more experts, associations, CEO to explain the scene and industry trends,
limited time free registration Oh!


640?wx_fmt=gif

Guess you like

Origin blog.csdn.net/Z1Y492Vn3ZYD9et3B06/article/details/94501370
Recommended