CEO of wangkang proposed Internet-based next-generation security for the first time

Source: Internet
Author: User

CEO of wangkang proposed Internet-based next-generation security for the first time

As the agent of wangkang JiangSu region, Jiangsu Guojun Information Technology Co., Ltd. has the following advantages: information security integration, network security service, and application software development, provides comprehensive and cost-effective solutions and technical services, including information security and network management (self-developed) data center construction, system optimization, information system integration, and customized office management software development. R & D and agent products include network anti-virus, security gateway (firewall, intrusion defense, etc), traffic control, Server Load balancer, disaster tolerance backup, image file encryption, Intranet security management, and online behavior management.

On September 9 and 24, the 2014 China Internet security conference was held at the Beijing National Convention Center. As the most authoritative annual event in the information security field in the Asia-Pacific region, the conference was once again the largest in history, hundreds of top information security experts at home and abroad and more than 5000 information security practitioners attended the opening day meeting. Mr. Yuan Shengang, founder and CEO of wangkang technology, was once again invited to participate in this event and delivered a keynote speech titled "redefining the next generation firewall by username" at the Enterprise Security Summit.

No use, no use, or no use makes the defense useless.

Yuan Shengang pointed out that, on the road of enterprise security construction, both technology and management are important. technical means provide support for management, while management is a guarantee of technical effectiveness, however, there are many strange phenomena in the firewall users in China.

Survey data shows that 75% of firewall users have not logged on to the firewall device in the last three months, and 80% of online firewalls only configure an "any permit all" policy, more IT managers are helpless when network problems occur. For a long time, it has become synonymous with firewalls and even most security products.

▲" Strange current situation "of firewall users

"The core cause of unavailability, unavailability, and unavailability is the lack of key information. Users lack an understanding of basic information during security decision-making and lack reasonable suggestions for implementing security policies, after implementation, there was a lack of timely feedback ", Yuan Shengang said, for a long time, security Decision-making resources such as status quo, risks, threats, events, suggestions, and effects cannot be clearly viewed, understood, or completely viewed, which is the root cause for users not to use the firewall.

Insight-the fourth largest capability of the ignored Firewall

Traditional Border Security Devices always use identification and blocking as their main logic for security. We can see from the firewall's development history that, its technological evolution focuses on improving the core capabilities of data communication, access control, and feature matching.

Yuan Shengang said, "When the era of smart threats comes, we can no longer rely solely on the traditional virus database and threat feature library Matching Technology to passively defend against emerging threats, we must build a closed-loop security management that can continue to run, and all of this puts forward higher requirements for security device insights.

Yuan Shengang believes that insight refers to the ability to penetrate into things or problems. It is not the same as visualization in the traditional sense. If we say that visualization makes basic arrangement and presentation of information, therefore, insights should be based on multidimensional analysis and intelligent association to completely solve the problems of unclear, incomprehensible, and incomplete key information.

Based on powerful insights, the next generation firewall can present network traffic, threats, risks and security events to users, and provide suggestions for adjusting security policies with data, and the real-time security protection effect is fed back to the user. From the perspective of users, the next generation firewall completely subverts the logic of traditional passive Security Event Response, and reconstructs a security closed loop that begins with current problems, provides suggestions, responds quickly, and detects results.

▲Use logic of rebuilding the next-generation Firewall

First proposed the next generation of Internet-based security

Yuan Shengang pointed out that Internet thinking is revolutionizing traditional industries, and the traditional security industry is also in a period of great historical change. The combination of Internet and security has become the mainstream trend.

"The essence of Internet thinking is to drive product development completely based on user needs, emphasizing the ultimate user experience and pursuing strong user stickiness," said Yuan Shengang. From the perspective of Internet thinking, traditional security products actually solve the problems that are useful to users, but because users are not actually using them, they have not met the ideal expectations. The next generation of security products reduces the difficulty of user operations through a series of innovations, so that they can be used by users. In the future, more severe security environments and more people's participation should be emphasized. Therefore, the next generation of Internet-based security should be promoted. Through more extreme operation experience, the user's desire to use should be stimulated to make users love to use.

Attach traditional security to the Internet

"For users, security products can truly exert maximum value only when they are useful, useful, and useful. Therefore, the real next-generation firewall should integrate necessary security functions, it is able to defend against more complex and hidden threats, and can use data to support the establishment and continuous and efficient operation of a security management closed loop. It has a simple human-computer interaction interface and timely positive feedback incentives, "Yuan Shengang said.

CEO of wangkang proposed Internet-based next-generation security for the first time

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.