Mobile Internet security, next Arena

Source: Internet
Author: User
Keywords Tencent

The 3Q Battle of the Year is still in the ear, the same is because of the security market, the difference is that today's focus has shifted from the PC side to the mobile terminal, the game swap roles, a siege of 360 war may begin.

If the 20 years of China's most successful internet companies, people have different answers, but if you use "those years, we fought together" to frame a person, I am afraid many people will say Zhou.

God-like Zhou, who had fought for the PC Security market and Jin Shankou for years, for the promotion of 360 security guards PC end with the horse teng rattling, for the promotion of 360 special machine with Lei choke, for the search market and Li became the enemy.

Once the West has sought to enter 360 of many areas, his old bank is now under threat.

At the 2012 Internet Conference, Tencent CEO Ma announced that it would set up 1 billion yuan security Fund to encourage more enterprises to join the mobile protection industry, while Qihoo 360 chairman Zhou stressed that three years want 360 for the PC, mobile terminals on the largest network security providers. and has been with Zhou saliva constantly jinshan also claimed to have full cabling mobile internet.

The 3Q Battle of the Year is still in the ear, the same is because of the security market, the difference is that today's focus has shifted from the PC side to the mobile terminal, the game swap roles, a siege of 360 war may begin.

Mobile Internet new Blue sea

A few days ago, Tencent Mobile Security Laboratory released the August mobile phone safety report. The report noted that since August, Tencent Mobile Security laboratory has intercepted a total of 27,756 virus packages, of which the Android platform to intercept 26,260, the chain growth of 43.7%, occupy 94.6% of the proportion of the virus.

Jinshan Network CEO Fu that the Android system because of its openness and freedom, has inevitably become a hotbed of malicious software and advertising. I do not know the source of the notice bar ads, frequent pop-up, unable to clear, and even in the background to steal the user's mobile phone number, address book, location and so on privacy information, not only caused users to use difficulties, but also to the user's mobile phone security poses great threat

The grim situation has ushered in the 2012 mobile security market in the rising period. Peng, senior grader at Analysys International, said that with cloud computing technology on the ground, some security vendors with new products to join, mobile security market importance further highlighted. On the other hand, the income scale of security manufacturers is increasing, with the development of mobile Internet platform, the mature profit model appears.

Can see, Qihoo 360, Tencent, Jinshan Network, NetQin, security butler, trend technology and other companies in the field of mobile security began to have a positive performance. The entire mobile security market has evolved from traditional killing services to universal security services to mobile cloud security services.

According to the Jinshan Software CEO Zhanghongjiang to reporters, basically Jinshan software all product lines have turned to mobile internet. Lin Yu, chief executive of NetQin, believes that the door to mobile internet has just begun because it sold 500 million smartphones worldwide last year, and may sell more than 700 million this year. Lin Yu said, "I often do an analogy, if we say that PC Internet is land, mobile Internet is an ocean, I think this is actually just beginning." ”

Cangian, an international senior analyst at Analysys, said that before 2010 was the initial stage of 3G network construction, all the security needs of mobile Internet are around SMS, or MTK and other non-intelligent platform security needs, is basically the needs of the killing category. With the evolution of the 3G process in China, the Chinese market has started to go. In the second half of 2011, different from the traditional demand for killing, the pan-security demand has become the main position of several manufacturers game. Security as the bottom of the mobile internet penetration rate of only 90% or more, whether the user's experience or the industry's policy standards, can really build up, the development of security markets, real to the end of 2013, or 2014 the entire market in the Battle of the horse race will end. Whether it's seating or the size of the user, it's likely to hit the ground by 2014.

According to the latest data from the mobile integrated mobile phone security base in Jiangsu Province, the base's mobile antivirus system recently monitored around 20000 of users infected with all kinds of mobile viruses, MMS virus, malicious software, Trojan virus. At present, with the further development of cloud computing, including operators and other industrial chain parties actively participate in, the entire mobile security market ushered in new opportunities.

The latest report, published by Juniper Research, a market researcher, entitled Mobile Security Strategy: Threats, solutions and market Forecasts (2012-2017), shows that, despite the growing threat of malware, fraud and device theft, globally, only 5% Smartphone and Tablet PC with security software installed. The report predicts that businesses and individual users will gradually recognize the need to protect their data, and that the demand for mobile security products will increase dramatically over the next five years, with one installation using Third-party security software for every five mobile devices. The report points out that security is not only the gateway to the mobile Internet, but also the next blue ocean, as security threats increase and users ' awareness of these issues grows.

Tencent 1 billion move security

On September 11, at the 2012 Internet Conference in Beijing, MA announced the establishment of a 1 billion-dollar security fund to encourage more companies to join the family of mobile security.

"Tencent attaches great importance to the safety of mobile phones and invests very much." "Ma stressed that security, especially in the area of mobile security, is not one of two companies, it's one thing that all industries, and even all developers, should be involved in."

For Tencent's move, Zhanghongjiang that, "Tencent cast 1 billion to do security fund, this is the same truth, we have seen the problem of mobile Internet security, with the popularity of smart phones, as well as mobile phone payments and other means of continuous improvement, more and more mobile virus will emerge, the user's property, Privacy will be greatly threatened. We and Tencent in PC security has a relatively close cooperation, on the phone we are also exploring ways of cooperation, I think Tencent's move is more of the response to the market. ”

According to the data of the Q2, the number of Chinese mobile phone users reached 390 million in 2012, and the proportion of netizens using mobile phone to Internet has reached 72.2%. At the end of 2012, 460 million Chinese mobile phone users are expected to use their mobile phones to access the Internet, and by 2014 the number of mobile netizens will reach 550 million. At the same time, 2012 Q2 China Mobile phone security users reached 162 million households, the chain growth of 26.6%, the mobile security market continues to grow at high speed.

But Tencent and 360 have become longtime rivals, although at the Internet Conference, MA announced the plan did not refer to the Zhou of the Qihoo 360, but the goal is self-evident.

"Android smartphone rapid growth, the security situation of Android platform is grim, users of mobile phone security just need to enhance the awareness of mobile phone security, for Tencent's broad market prospects, must seize strategic heights." "Analysys International analyst Peng Analysis, Tencent is" leading the industry resonance, led more enterprises to launch an attack on the 360 to shake 360 in the security field status.

"Safety is the core of 360, 360 of the product system is built around the safety of genes, in the mobile phone security market, 3,601 unique, always face the attack of new and old competitors, in the security market singles alone is a major feature of 360." "Peng Analysis 360 and Tencent in the mobile phone security market situation," said Tencent in the mobile phone security market in the second echelon of the leader position, is 360 of the direct opponents, Tencent and 360 different, it is more willing to work with Jinshan, Kabbah and other industrial chain security vendors, Tencent is currently in the mobile end has a large number of products, Increasing the investment in safety is conducive to the construction of its mobile internet ecological chain. ”

AI Media advisory issued the "2012 Q2 China Mobile Phone Security Market quarterly monitoring Report" shows that 2012 Q2 China Mobile phone security market share of active products, the current 360 mobile phone guards accounted for 63%, ranked first; QQ Mobile Butler 18.2% ranked second; NetQin security, safety housekeeper, Jinshan mobile phone guards to 5.4%, 3.1%, 3% of the shares separated third, fourth and fifth.

360 of the Enemy

Sogou CEO Wang Xiaoquan has told the media that 360 of many companies when the enemy, and even some people say Zhou is "militants." In recent years, the Internet because of competition caused by the endless war, several of the famous battles are related to 360.

In the field of mobile security, the first 360 campaign was against NetQin. In the Android system has just arisen, Symbian system is also at the zenith of the time, the Network Qin once in the field of mobile security, 360 after seeing the field, in CCTV 3.15 party on the criticism of the Network Qin.

Today, the old enemy of Ma Teng began to focus on mobile security, Robin Li began to focus on search security, Zhou the same concern.

In the 2012 Internet conference, although the 3Q did not name each other, but the point of discourse is not difficult to see that the 3Q war has begun to spread to the mobile security field.

"The biggest difference between smartphones and traditional terminals is that downloading software and downloading programs is a big problem," Ma said. "A recent report shows that there are seven popular app store applications for spot checks, and 300 of the balance application has 58% disclosure privacy behavior." ”

On the Tencent plan, Zhou said in a subsequent statement, "Thanks to Ma for doing a lot of publicity for me, mobile internet security is really a very important thing, is also what we 360 is continuing to do ..., three years hope 360 for the PC, mobile terminals on the largest network security provider. ”

3Q dispute again tide surging, but for Zhou, now the most important thing is search, although with Baidu's "3B war" by the government authorities to stop, but the industry in the search of the war has just begun.

And before that, Zhou and millet in the field of smartphone has been fighting for a long time, lei by virtue of the mobile phone in the mobility of the Internet in the field, and Zhou launched 360 special machine to launch the challenge.

Obviously, to have the domestic internet "Jag" said Zhou, now face Ma, Li, lei these three big Internet big guy competition, how to deal with will be a bigger challenge.

In fact, in addition to Tencent, Baidu and other big plans, the line just one months of the Jinshan mobile phone poison to intercept malicious advertising and formed a certain market effect, Jinshan has begun with 360 in the mobile Internet in the field of positive direct competition. has been focused on mobile security in the field of security Butler, NetQin and other emerging Internet security companies also continue to move in the field of mobile security to seek breakthroughs.

And for the collective denunciation of 19 enterprises, Jinshan Software CEO Zhanghongjiang said, "These 19 companies may be misunderstood, you can see that our products are not for all ads, but to help users deal with the mobile phone is malicious ads." Recently, our mobile phone poison tyrants also announced the four criteria for malicious advertising, those unknown source, no notification or can not clear the notice bar ads, theft of privacy, and even malicious charges of advertising and so will be directly judged as malicious ads, mobile phone poison PA can be a thorough removal of malicious ads, the right to use the phone back to the user. For the experience of good advertising we do not intercept, I do not believe that the developers will not be disgusted. ”

For a spat with 360, Fu said, "Mobile internet is a very big market, but also a just starting market, in a sense, we are all in the same starting line, the future everyone will have the opportunity, we will put more energy on the product, the product determines everything, Can be sure that any one of the industry a single big situation, neither beneficial to the user, nor conducive to the development of the industry. ”

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.