Absrtact: At the meeting of the Politburo of January 23, the review of the national Security Strategy outline, including the basic content of 10 aspects, in 2013, after the exposure of prism time, China's information security assurances to the degree of unprecedented height. This
At the meeting of the Politburo of January 23, the review of the national Security Strategy outline, including the basic content of 10 aspects, after the 2013 "Prism Time" exposure, China's information security assurances to the degree of unprecedented height. The meeting stressed that to ensure information security, the key is autonomous controllable, so the future of these five aspects will be from the national security of the height to support domestic leading enterprises.
State support information Security industry with the president revealed that "key Enterprise" title will bring 100 million revenue
Recently, the same side of the president of the Fan Wen to the "First financial daily" reporter said that the national information security policy, will give domestic autonomous control of it enterprises to bring opportunities, hope that domestic enterprises can fully seize this opportunity.
NI, academician of Chinese Academy of Engineering, believes that the premise of realizing "information security" is "autonomous controllable", and to fundamentally solve the national information security problem, we must develop safe and reliable information technology, and implement the domestic substitution project in the National key information infrastructure to foster local enterprises.
Recently, the Ministry of Industry and Information technology is also vigorously nurturing local enterprises. Up to now, the National Computer Information System integration enterprises nearly 30,000, with 1-4 qualified enterprises more than 5,000, at present, the Ministry of Industry to 8 companies issued "National Security and reliable computer information system integration key Enterprises", the same side of the shares is one.
Fan Wen to reporters that the same party shares to obtain "key Enterprises" title will give the same side of the computer recently can bring 80 million to 100 million of the operating income, will promote the same side shares of independent security controllable related industry development, at the same time to undertake international and domestic major projects more advantages.
In fact, before the Ministry of Technology has continued to continue to have input, chips, servers, operating systems, database research and development. But finally found such a huge industry, relying on the state that investment is far from enough, and eventually the ministry to choose some enterprises, "from the application end of the promotion, from the conditions can be promoted place to start pushing, select some have the ability to do these things business to do this." "Fan Wen to reporters that the application terminal here, not only office software, but including tablets, servers, operating systems, databases to achieve a full range of domestic."
"The size of the industry in the future is never to say how big the market is, how much you can make up, but how much you can do with your ability." Fan Wen stressed that the market is big enough, the key is to have independent research and development capabilities. He said that we have assumed the responsibility of the State, there is a huge industrial opportunities, the same side of the strategic pattern of shares, such a pattern is also more in line with the overall structure of the form.
Fan Wen also said that in the next few years the shares will be around the information security to start some mergers and acquisitions, from the security perspective, mainly in the acquisition of domestic, chip, hardware, software companies.
For the 2015 with the overall business plan, Fan Wen already has the goal: "In the information industry, we will put information security first, do their own business, but also for information security and related special arrangements and actions, and gradually build information security system." Based on information security, the same side do the existing business at the same time to do the increment, this increment based on the status quo, focus on the future. ”