Security will be the main feature of vrouters in the future

Source: Internet
Author: User

Security will be the main feature of vrouters in the future

Since 2013, a wave of intelligent trends began to sweep the entire Internet, followed by countless popular smart hardware, one of which is routers. However, it is a pity that intelligence is not the correct direction for the development of routers. It is just a selling point discovered by the router manufacturers. This year, the concept of smart routing has gradually vanished with the user's rational experience, but the journey of Router Innovation and Development will not stop. Based on the current network communication status, I think security may be one of the main features of vrouters in the future.

Frequent security events and the biggest hidden danger of routers

According to the "Summary of China's Internet network security situation in 2013" report, the National Information Security Vulnerability sharing platform, after analyzing and verifying vro products of multiple manufacturers such as D-Link, Cisco, Linksys, and Tenda, hackers can directly control the routers and initiate DNS hijacking, information theft, phishing, and other attacks, directly threatening users' online transaction and data storage security, this makes related products a security "mine" that can be detonated at any time ". In China, around 0.1 million TP-Link routers have similar security risks, affecting millions of users.

In addition, public data shows that 80% of the top 25 most popular SOHO Wireless routers in Amazon have security vulnerabilities. Among these vrouters with vulnerabilities, 34% of the vulnerabilities have been exploited. Attackers can easily launch highly targeted attacks or target general attacks with vulnerabilities. What's even more disturbing is that many vro products on the market have reserved a super management privilege for convenience of future debugging and detection, laying a huge security risk for users. According to the detection by security companies on vrouters of hundreds of millions of users, 5% of vrouters in China have been successfully controlled by hackers, most problems such as closed pop-up windows, malicious jump links, and Trojan viruses are caused by routers.

Vendor attaches great importance to the rise of the concept of secure Routers

Based on the existing security problems of routers and users' rigid security requirements, many manufacturers have also launched so-called security routers. There are two vro vendors that focus on the security concept in the industry. One is a security vro produced by 360 in cooperation with yunke, and the other is TOTOLINK, a brand launched by South Korea in China. Why are these two vendors used as examples? Because the two represent the current two directions of the concept of security router.

The former is a cooperative model, that is, 360 developed a 360sos security system based on open-source Linux with its own security technology, and then combined with the mature hardware technology of yunke, A security router is created. The latter TOTOLINK is an independent model that uses the latest Korean Communication Technology and uses the underlying driving method to completely integrate technology R & D into industrial production, the first domestic "WAPI Home Edition Security Router" has passed the ISO9001 quality certification, the us fcc and European CE security certification.

The cooperation model is currently emerging rapidly in China. Like Alibaba and Baidu, they are also frequently cooperating with traditional communication equipment manufacturers to launch the so-called "smart Router" and also propose the concept of security. In addition to Internet giants like Alibaba and Baidu, there are also many third-party routing Operating Systems in the router industry that do quite well in terms of security. For example, ClearOS can provide services such as anti-virus, anti-spam, VPN, and content filtering. Endian also provides services such as firewall, VPN, anti-virus, anti-spam, Web security, and content filtering; of course, Untangle and ZeroShell have a certain degree of security protection capabilities. However, there are not many manufacturers with underlying driving technologies such as TOTOLINK and R & D and production capabilities.

Unlimited prospects for secure Routers

At present, wireless networks have become an indispensable rigid requirement in our daily life. wireless networks play an increasingly important role in our daily life, whether in office or home entertainment, mobile phone network, shopping, Video watching, and file data transmission among family members are almost completed through wireless networks. However, over the years, the security of the home wireless LAN has been ignored. Especially in the future, with the development of the Internet of Things and the advent of the Smart Home age, when wireless LAN becomes the link technology of All Smart appliances and smart devices in the home, the security of Wireless LAN is not only related to personal and family information security, but also a key area of personal and property security. To ensure the security of the wireless LAN, the router is the core of the home LAN.

In the future, vrouters that focus on security will surely have a huge market prospect. The domestic consumer-level market alone will reach more than 10 billion. This does not calculate the huge associated benefits of vrouters as the core traffic entry of the home network. In the cloud computing and Big Data era, household consumption-level routers will become the main big data nodes in the family. Data Security and Privacy Protection are all users' concerns, it is also an important part of achieving IoT breakthroughs in the future. It can be seen that the future market of Security routers will be extremely huge, with unlimited prospects.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.