Esai roots in data security more than ten years - from documents to data protection Smart Protection

In recent years, data leakage events frequently, to individuals, businesses and countries causing enormous economic losses. Information leakage problems not only people's lives and endanger people's lives and property safety, people dreaded. Therefore, data security has risen to the need to address social problems, in this context, for enterprise security emphasis has gradually deepened, data security market potential is also growing, the market for security technology spotty and products, the user is difficult to choose a reliable, proven security solutions, and Esai Plow field of data security than ten years, has achieved high performance in data security level to make it a typical representative of the manufacturer of the safety field One.

Four consecutive rivers and lakes throne sit tight data security

Million race through in the beginning, its business focus is the document encryption, through continuous frontier, and in the data security field has achieved good results. It is reported that shortly before the CCID CCID's latest "China Data Loss Prevention Market Research Report (2019)" shows Million race through data loss prevention market share ranked first, and that the "throne" has been continuous sit tight four years.

Building a comprehensive data security system, intelligent personalization

Why Esai can achieve such results in the data security market, which Esai CTO Zhuhe Jun given us a brief introduction:
Esai roots in data security more than ten years - from documents to data protection Smart Protection

Zhuhe Jun introduction, Esai slogan is "Chinese data security expert" as deep plowing secret agents in the field of data security vendors more than a decade, now has over 400 million customers and more than one million end users. This performance and status, by not only the product of escalating and introduce new, more is to give customers a real practical value, its core advantages are mainly reflected in the following levels:

First, Esai after ten years of precipitation and accumulation document encryption technology, research and development, data loss prevention, and many other disk encryption products, nearly a thousand adaptation of applications on the terminal, and to provide comprehensive industry-wide data security solutions , which is the cornerstone Esai data security products.

Secondly, Esai has a powerful protocol analysis and processing capabilities, such as support for Gigabit high-volume data processing, analytical support rich web applications (including voice recognition and content of the picture), with the support of the bypass series and deploy cloud environment mode, supports IPv4 and IPv6, support https content reduction and blocking, which ensure that Esai core technology in the field of security database to quickly adapt to changes in the trend of emerging technologies.

Finally, Esai addition to a strong technical accumulation, the most important highlight is the core of the building has a complete data security protection system of ideas, in addition to the basic conditions of security, stability, ease of operation and other system considerations, but also in-depth focusing comprehensive, intelligent and personalized protection products.

1) comprehensive in: departure from the document encryption, constantly enrich the product range protection. Currently achieve security features in many areas of Windows Terminal, Linux terminal, MAC terminal, mobile terminal, network, mail, database, storage, business systems, clouds, etc., and these protective ability unified into security intelligence management platform (DSIP), and a plurality of terminals and probe combination with the organic, for the user to bring integrated and comprehensive protection capability. Recently, Esai launched for customer data leak prevention demand for new products --TIS, the product is UEBA (User and Entity Behavior Analytics) category, primarily to help users solve data security problems lurking deep within, such as industrial espionage, security event monitoring and investigation, belong to completion program under high security classified scene, is an important complement to the DSIP.

2) intelligence: the continuous improvement of the system architecture and key areas of technology, based on big data and machine learning capabilities, integrated into the intelligent classification and grading, behavioral analysis, situational awareness, pictures and audio recognition technology has greatly enhanced the ability of the product to the user with protection to new smart feel.

3) Personalization: Esai also try to launch as for individual users 'data security guards' products, giving users a new data security experience. In addition, the focus of security force in the area of ​​structured data, big data, cloud applications, and new auditing database, database firewalls and other products, the formation of multi-source heterogeneous product of the integrated security system.

Future, Esai will be in accordance with national laws, regulations and industry development strategies, new technologies big data and artificial intelligence to plan product direction, and always adhere to the "customer service, continuous innovation, bravely assumed responsibility, professional first" core values, provide first-class users with comprehensive data security solutions.

Expert perspectives words Data Loss Prevention DLP trends

Zhuhe Jun as domestic senior experts in the field of data security, he believes that in recent years, driven by security incidents and policy, domestic data loss prevention DLP technology has made great strides in, but still there is a certain gap compared with foreign countries.

He noted that due to the various different manufacturers and original technology industry background, leading to differences in technical development options. For example, some had to do firewall product origin DLP vendors may implement DLP functionality from the network level, and in conjunction with their existing firewall, gateway and other products. Some manufacturers also do major DLP protection against a certain type of application, as it mainly for foreign Mimecast mail protection. Foreign Symantec, McAfee DLP some of the traditional vendors, can security of terminals, networks, e-mail, database, storage, etc., technical route has its advantages. According to observation of the market and understanding of the industry, the field of DLP Zhuhe Jun believes the next two years there will be some new trends:

First of all, the importance of cloud security will become increasingly large, many manufacturers in the design of the product technology roadmap, are increasingly considering cloud technology, zero trust. Such as cloud access security agent (CASB) can be regarded as a hot cloud security this year, Zscalar, Skyhigh and other enterprises have been listed or mergers and acquisitions.

In addition, with the development of artificial intelligence, artificial intelligence will play an increasing role in the security field, many manufacturers are looking to integrate artificial intelligence into existing products. For example, Symantec introduced into the artificial intelligence security solutions, its endpoint protection products using artificial intelligence and behavioral analysis techniques to monitor endpoint endpoint events and identify suspicious behavior, integrated machine learning, by blocking evil, behavior analysis and other techniques.

The Million race through localization on DLP technology, which combines the company in the field of document security implemented for many years of experience, the use of recurrent neural network on the terminal behavior analysis, scene text detection, machine learning algorithms, form their own unique intelligent security solutions, not only for protection of unstructured data and structured data, big data, cloud and other security protection. These aspects, although foreign manufacturers than domestic firms invested earlier, but domestic manufacturers by virtue of localization, industry experience and other advantages, it should be said also gradually show its own characteristics.

Data security product selection Layout Considerations

In the field of data security through the accumulation of a large number of technical solutions and be seen, Esai business focus is not only limited to the original document encryption, it also has a very sophisticated layout in the data security field, not empty talk concept. Finally, in order to allow more users to "detours", Esai CTO Zhuhe Jun think we should pay attention to the following points when domestic issues during user data security product selection:

l data security products for businesses is a set of integrated solutions, from the demand characteristics of the enterprises themselves, the overall deployment of embodiment that is particularly important for their own.

l data security products in addition to audit and traceability, the timely detection alarms and real-time behavior blocking function is also essential, to prevent harm occurring before, reduce or even eliminate the loss of customers is crucial.


l data security products in addition to conventional pre-set by the judge rules, shall have the ability to intelligent machine learning, we should be able to automatically identify and judge for illegal malicious behavior. ***

Guess you like

Origin blog.51cto.com/14620346/2451896