Digital transformation requires smart defensive security

In the past year, no single domain has received as much attention as the cybersecurity industry, and the formal implementation of the National Cyber ​​Security Law has given cybersecurity industry a new stage of development since then. 'National Cybersecurity Week ', China Annual Conference on Cybersecurity, China Internet Security Summit, China Internet Security Conference and other ongoing security summit and activities in this year has been held in an endless stream.On December 1, Hefei will usher in the current year Field heavyweight security event - China's information security summit.

Cybersecurity is so highly regarded that security has become a global challenge: cyberthreats have not only led to massive data breaches and significant financial losses, but have also led to the closure of critical information infrastructure that is relevant to people's livelihood. Of the investment is increasing, but why the security incidents are still frequent, endangering and influencing more and more? As a leader in leading the next generation of security technology innovation, purple light Xinhua Group III (Xinhua 3) have a profound understanding and interpretation .

Traditional protection mode is weak and security needs to be transformed into digital device. According to the latest research released by data security service Gemalto, in the first half of 2017, nearly 2 billion data records were lost or stolen globally due to cyberattack Ransomware virus has also become a major security threat. In May this year, outbreak of the software virus WannaCry ransomware, affecting 150 countries, more than 500,000 devices are infected, causing about 100 billion in global economic losses .European official data show With over 4,000 ransomware attacks taking place every day in the world since 2016. Some ransomware attacks have even reached the level of quasi-cyberwarfare and have led directly to the closure of key information facilities in some countries.

In the view of Xinhua Third, the main reason for the huge network security challenge is that with the gradual popularization of new IT technologies such as big data, internet of things, mobile internet and cloud computing, the development of networks and IT has entered the era of cloud networking, Of the security boundary becomes blurred, the traditional border protection mode based on feature recognition is failing.

We all know that the traditional border security model relies more on the single point protection capabilities of security devices - terminals, network boundaries, intrusion detection and prevention, and Web. These protection devices are fragmented each other for a period of time, lacking the necessary information sharing and Collaborative. Under the principle of border protection barrel, once any point is broken, the entire line of defense will fall apart. In addition, the protection of the border ambiguity also requires traditional security devices to achieve virtualization, resource pooling, security resources can be automatically migrated and formulated This is clearly a big challenge to traditional security vendors.

At the same time, attackers have become more sophisticated and have gone beyond simple virus propagation. Zero-day vulnerabilities, advanced attacks such as APT, are often exploited, and some even lack national support.

It is precisely because of the challenges that security is at the heart of the digital transformation of the business as the entire community is experiencing digital transformation, with 71% of IDC executives polled by 2000 CEOs of multinational corporations about cybersecurity Is hindering the innovation within its organization.So, the security problem is the most worrying issue for the enterprise towards the digital transformation.Therefore, how to solve the network security problem that affects national security and enterprise development through the idea and technological innovation has become the Network Security Corporate Industry and Social Responsibility.

Synergistic linkage and proactive defense of network security In the world history of World War II, there is a well-known line of defense that military enthusiasts can not butturn to, that is, the French defense of Maginot. This expensive project was built and looked indestructible Of defense did not play any role in the German attack in the history of mankind, rely on the construction of passive defensive fortifications failed cases are not uncommon.Farming attention to the enemy intelligence, active and dynamic defense of the military strategy is often Success has been achieved, for example, the Wei and Qing Dynasties in the Han Dynasty of China used the Great Wall System and the Campaign to successfully resist and effectively contain the Huns invasion.

Network security experts believe that in the field of network security, it is also necessary to shift from the traditional passive defense to the active defense system of coordinated collaboration - a system that can detect the network security situation and attacks in time through the analysis of huge amounts of data so as to realize the early detection network Attack or more timely response to security threats, will minimize the loss.

Xinhua III announced at the 2017 Navigator Summit that it will create a fully upgraded and pro-active big security system for the digital economy, and Xinhua-3 security experts believe that in the new defense system of active defense, through deep learning and AI artificial intelligence Big data analytics platform that aggregates data from terminals, borders, and networks, and a "safe brain" with massive threat intelligence that accurately pinpoints security threats and "directs" endpoints, network boundaries and clouds Of security devices that will prevent cyberattacks before they occur.

In the new system of proactive defense, vendors with platform integration capability and massive data will have obvious advantages.In the field of cybersecurity where data is king, integrating data from different sources or relying on its own mass data will determine whether At the 2017 RSA Conference, IT giants relied on the strong return of integration, integration and other capabilities to herald the future need for platform-based integration and integration in the security industry to address security challenges in the future. In fact, each Big companies are also enhancing their security platform capabilities through acquisitions and partnerships.

In China, Xinhua III, which released the strategy of "big security", also demonstrated its leading platform advantage: In addition to its strategic cooperation with security vendors such as AsiaInfo Security, the Xinhua III products in terms of security are concerned with network security, Cloud security, mobile IT security and big data security, industrial control information security products solutions and services, but also to the trusted computing, IoT security and other aspects of extension, 'can provide a full range of information security products and complete solutions'. As the government and enterprises focus on the digital transformation, they may prefer to work closely with the same big security provider that can match the application scenarios of cloud computing, network and big data.

It is reported that on December 1 in Hefei, China's information security summit, will invite the national security authorities, top industry experts and leading business representatives to interpret the country's security situation and coping strategies; Xinhua three will also be released initiative Defense system in the core products for users to create a more comprehensive and proactive defense capabilities.

2016 GoodChinaBrand | ICP: 12011751 | China Exports