Security Dog founder Chen Yu: To build 360 on the server

Source: Internet
Author: User
Keywords Safe dog safe server we at present

Security Dog is a server security dog, Web site security dog, server security management cloud, Security dog Cloud Backup and other server tools as one of the software security vendors. With its own strong technical skills, the security dog has now successfully obtained a round of financing, which is often referred to as "Server 360". Recently, the author was fortunate enough to interview the founder of the security dog Chen Yu, sharing the security dog behind the entrepreneurial story, unique research and development experience and future planning.

Security Dog founder Chen Yu

CSDN: Please give a brief description of your own and your current responsibilities.

Chen Yu: Founder of the Safe Dog Project, has been working in the domestic security industry, a listed company director of research and development positions, has many years of security product development and management experience. 2011 led the team to develop and release a safe dog products, products focused on solving the server, cloud host system and application security issues; Since the launch of the product has been using a free strategy, has been recognized by many users and sought after, users often call the security dog as "Server 360."

CSDN: Please share your entrepreneurial story. What is the source of inspiration for a safe dog? How many people are there in the team, and how are you divided?

Chen Yu: 2010, I was in charge of a project for server system security, found that China's Internet server security problem is very serious, 80% of Internet servers have a variety of security vulnerabilities or have long been hacked without self-knowledge, with the public cloud computing (IaaS platform) of the continuous development, This security situation will be even more severe. In response to this situation, in 2011 I formed a team to develop a safe dog product, the goal is to do a simple, easy-to-use, can help server users quickly find, solve the server system security problems, but also to strengthen the server system security products.

At present, the team is close to 40 people, research and technical personnel accounted for 70%, or more biased towards the technical team, market personnel accounted for 30%, mainly responsible for the safety of dog products Internet promotion, at present we have with more than 500 IDC established a partnership.

Called "360 on the server" by the user

CSDN: What kind of company is a safe dog? What are the main products?

Chen Yu: The safe Dog is a start-up company, at the earliest, the whole project was hatched in a company specializing in safety products and services, and when the project developed faster than our estimate, the entire project team felt the need to break out of the cocoon and operate independently, so in 2013 we made the project Independent, At the same time we introduced a round of financing, the establishment of the Xiamen Service Cloud Information Technology Co.

At present, the company's main research and development products are around the server, cloud Host user security and management requirements for the development of design, mainly has the following products: Server security dog, Web site security dog, server security management cloud, Security dog cloud Backup. We want to be able to provide users with more and better products in the field of server and website security.

Experience: Focus + user needs + Agile

CSDN: The safe Dog team began to develop and operate the Safe Dog project in 2011, and currently has the highest market share in the field of server security, so please share with us your unique research and development experience.

Chen Yu: Mainly in the following areas:

1. Focus: Since its inception we have been focused on Internet server security and management of product development, which we rejected a lot of personalized customization needs, and focus on Internet server security products research and development. At present, our user's coverage is very wide, including the domestic Aliyun server, Orange Internet Cloud host users, and even the very popular overseas Amazon cloud Server users.

2. To meet the needs of users: we set up from the inception of the Group, Forum, Enterprise QQ and many other ways to communicate with users, the first time to obtain user feedback and demand for products, and the fastest speed in the new version of the iteration. In the course of the operation of the United a group of very loyal users, they have been helping us to continuously improve and improve products.

3. Agile development: We in the product iterative development process, has adopted the agile development pattern, guaranteed the product development progress and the quality.

Using Hadoop and Spark technology to build safety protection products

CSDN: What problems have you encountered during the development process? And how to solve it?

Chen Yu: Security product development in addition to with other domain software similar to the problem, there are some of their own unique problems, summed up mainly in the following areas:

The occasional security and defense Combat Research: Security products to be able to defend against a variety of actual attacks, you need to understand the various means of attack; Therefore, in the process of research and development, we need to build a variety of attack environment, simulate different types of attack scenarios, the attack means analysis and reduction, so as to develop a more practical security protection products.

The application of large data in security products: Safe dog products from the very beginning to attach great importance to the accumulation of security data, at present, we intercept the daily average of attack log more than billion times. How can you store and analyze these large amounts of attack data? After comparing several large data processing platforms, we chose to store and process these security data based on the Hadoop platform. At the same time, we have also practiced the current more popular data analysis technology, such as Spark, the future of large security data analysis is also a very important direction.

CSDN: At present there are many well-known web site security defense tools, compared with these tools, the advantages of the security dog?

Chen Yu: Our core advantage is in the server system security issues, the reason for the development of the Web site security dog (software Web firewall), is because the Web application is the most used Internet server application.

At present, the site security dog has protected more than 1.2 million sites, the main advantages of the following three:

Free: The use of free policy, users can download their own installation;

Easy to use: users need only one-click installation to complete deployment, by default, no need to make any settings;

Comprehensive web site Security Defense: In addition to the common Web attack defenses, Web site security dogs can detect and intercept web backdoor attacks at the first time, and can intercept the behavior of the web backdoor to avoid damage to the system.

CSDN: Front-End time is affected by OpenSSL, many sites are attacked, how do you see this event? How does a safe dog defend itself?

Chen Yu: OpenSSL is one of the biggest security incidents of the year, because OpenSSL is a very popular open source security component that is widely used in various fields such as finance, electricity quotient, security products and so on. So this vulnerability has a very large impact, which could result in a user name password being illegally read from the site. , the SSL private key certificate leaks, even each enterprise's VPN login information leaks, the firewall paralysis and so on risk.

Since the OpenSSL, various companies and safety producers have responded positively, and some big financial and internet websites have repaired the loophole and even replaced the SSL certificate.

As a safe production business, we are the first time through various channels to the user for early warning; at the same time, we assisted more than 500 IDC manufacturers to the site of its customers security scan, the first time to help users find the site of risk and notify users to repair; In addition, the security dog product also updated the corresponding protection rules Help users intercept this attack.

Cloud Host Security defense into future strategic focus

CSDN: How do you look at the ecology of the current safety application products, and how is the future of the safe dog planned?

Chen Yu: Nowadays, with the continuous development of the Internet, the network has penetrated into our life, the network in bringing convenience, but also latent risks, such as data leakage and other network security incidents occur frequently. To protect against the threat of security incidents, in addition to improving the awareness of self network security, can also be deployed security products, use of security products to help protect against attacks, to achieve protection purposes. In the next few years, the network security problem will not weaken, this is also a development opportunity for the safe application product.

With the development of the public Cloud Platform (IAAS), more server users will be migrated to the public cloud platform in the future, so the security defense of cloud hosts will be the most important direction for the security dog in the future. At present, our products can be Aliyun, Amazon and other mainstream public cloud platform, but also has been integrated into the domestic many small and medium-sized cloud host provider of the server mirror inside; the future security dog will be around the cloud host users, the development of the corresponding cloud Host security, management related products, to help users security, Easy to manage your own cloud server. (Source: CSDN)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.