A new 3Q war?

Source: Internet
Author: User
Keywords Tencent Micro-trust bodyguard
Tags 360 mobile phone security application application distribution browser company credit daily economic news economic

Absrtact: Following last year's announcement of the establishment of 1 billion yuan security fund layout Mobile Security, Tencent board chairman and CEO Ma is internally claimed, to set Tencent's entire company to win the mobile phone security and browser This battle, the goal is to the current mobile phone security Market First

Following last year's announcement of the establishment of a 1 billion-dollar security fund layout mobile Security, Tencent board chairman and CEO Ma is in the internal claims, to set Tencent's entire company to win the mobile phone security and browser this battle, targeting the current mobile phone security Market first in the 360 mobile security defender.

Yesterday (June 12), Dingke, vice president of Tencent, told the Daily economic news that Tencent would launch a "micro-trust bodyguard" dedicated to protecting micro-and micro-credit security in a new version of micro-letter 5.0, which is expected to be launched with the commercialization of micro-letters.

This is seen as Tencent's "preemptive" action against 360. Earlier, the 360 chairman of the Zhou has been in public shelling micro-letter privacy issues. The industry has widely speculated that 360 may follow the year's "Buckle bodyguard" launched "micro-letter bodyguards."

At the same time, Tencent is more interested in assembling a whole industry chain to establish a Security industry alliance. According to insiders close to Tencent, in the security alliance, in addition to security vendors, handset terminal manufacturers and chip makers will also join the alliance. 50 companies have indicated their willingness to join the alliance, which is expected to be formally established in the second half of the year.

A new 3Q war?

"Tencent and the 360 battle based on mobile security may be another 3Q war," he said. Said Zhigang, an internet expert.

According to the reporter understand, Tencent's security strategy is divided into two parts, one is Tencent Computer Butler, to the PC market, the other part is the new sharp Tencent mobile phone Butler team, the main mobile internet market.

In the organizational structure, Tencent mobile phone Butler team is subordinate to the reorganization of the Tencent Mobile Internet business Group (MIG), its positioning is platform, traffic, application distribution, that is, mainly responsible for the entry level of the flow platform and mobile phone application distribution platform.

According to Dingke, Tencent is looking to expand the security needs of users in the mobile internet to the "Pan-security field." Before the big six months time, it has been immersed in research products and do research, and even write their own code.

According to Tencent mobile phone butler for tens of thousands of three or four-line city users of the survey found that users of the traditional sense of security needs are not large, more need for flow monitoring, anti-spam and harassment phone calls, the application of Rights management, games and QQ security login and other service functions. "This is the concept of universal security. ”

Dingke that 360 of the user base has been saturated, this is Tencent's opportunity, and the killer is already widely accepted as a mobile internet "ticket" micro-letter.

Tencent's killer is a micro-letter

According to the Daily economic news reporter understands, in the micro-letter 5.0 version, will open the online payment function, in order to the micro-letter as well as the user's privacy security, Tencent Mobile phone Butler will provide the Special Security Service for the micro-letter.

Is this Tencent hoping to promote the safety of micro-credit products, or to prevent the introduction of 360 "micro-letter bodyguard" products such as preemptive?

Dingke said the imminent pressure on Tencent's mobile-phone butler was that it would inevitably face new security challenges once it started to commercialize. For example, in the micro-letter 5.0 to open up the issue of payment, Tencent has at least more than 10 meetings, "internal decision-making, in the cloud killing inside more strong to do security pull." Without a reassuring protection, it is dangerous for micro-letters to develop so quickly. ”

In Zhigang's view, the mobile internet era, micro-letter to Tencent's strategic significance is beyond doubt, so Tencent will not allow other people to meddle, 360 preemptive to become Tencent's only choice.

Internet expert Cao Yue also believes that the micro-letter of 400 million users has increased Tencent against 360 of the chips. In a way, Tencent will occupy the upper hand in this game based on security and communication, micro-letter has become the PC side of the QQ as a sticky product, Tencent once announced that Tencent mobile phone butler in the "micro-letter bodyguard" concept, 360 to try to hit the micro-trust user's idea has become extremely difficult.

In addition to the huge micro-credit, Tencent will also be in the channel to 360 of the formation of further "squeeze."

Ecological chain model to be observed

Although there are micro-letter of the full escort, Tencent mobile phone security to be out of a bit is not a simple thing, in fact, Ma Teng's mobile phone security positioning is far more than this.

According to people close to Ma Teng, in Ma's architecture, the hope is to build a sharing mechanism similar to the open platform on mobile phone security products, and Tencent is trying to woo the manufacturers of the security industry chain to create a alliance of security vendors, which will cover security vendors, chip dealers, terminal manufacturers, etc. There are already 50 companies that are willing to join the alliance.

"Daily economic news" reporter noted that in order to build this security alliance, Tencent has already adopted 3 aspects to draw the security Industry alliance manufacturer: provides the electronic market to include the application security inspection and the official genuine attestation, the competitor machine manufacturer provides the safety module, lets the handset manufacturer on demand, provides the ROM developer "the Security module", To enrich the ROM developer system and so on.

According to Tencent insiders, Tencent mobile phone butler through the Samsung, Millet 2, Lenovo, ZTE, Huawei, Cool faction, such as mobile phone manufacturers to provide "security module" for chip manufacturers to provide the underlying security features, and for the application of sinks, pea pods, application treasure, Baidu applications such as more than 30 electronic market to provide security testing services into a step to occupy the market.

This and 360 in the mobile security strategy in sharp contrast, you can see that 360 in the mobile security area is still the security software as a gongchenglvede, and Tencent is around security, to win allies big industrial chain.

"Tencent's mobile phone security must not be for the purpose of profit, but to work with partners to create a security alliance." "Dingke said.

However, Tencent mobile phone Butler's challenge is that the micro-letter, the two major businesses are in the large-scale investment period, how to ensure that the internal blood transfusion has become a big test Tencent.

In addition, Zhigang that 360 of the product system is built around the safety of genes, its unique strategy has achieved its market position today, and Tencent currently has a large number of products at the mobile end, and the security Alliance manufacturers also have a complex competitive relationship, how to integrate the underlying security architecture, to form a set of their own "Security plus application "Strategic system, and the completion of its mobile internet ecological chain to build, still need to observe.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.