Absrtact: Wave Group Information Security Division general Manager Zhang recently, the Tide held a press conference in Beijing, officially launched the Host Security Strategy, and released China's first set of hardware, operating system, security software trinity of the Host Security program. With the prism door thing
Wave Group Information Security Division general manager Zhang
Recently, the tide held a press conference in Beijing, officially launched the Host Security Strategy, and released China's first set of hardware, operating system, security software "Trinity" of the Host Security program.
With the continuous exposure and fermentation of the "Prism Gate" event, the attention of the industry users on information security continues to warm up. In the new period, information security as a whole concept, not only covers the industry well-known network security, terminal security issues, but also need to pay attention to and strengthen the host security links. Host system is mainly responsible for data processing and storage tasks, the most valuable information system of all kinds of key data and core business systems must rely on host systems, this link once attacked, the entire information system, the most valuable part of the risk of theft. Therefore, host security is the key link of information security.
Zhang, general manager of the Information Security division of the Wave group, said: "The data value has become more important than ever in the context of cloud computing and the application of large data. The host system carries the core business system data of the key industries, such as financial telecommunication, and its security is related to the national strategic problem. ”
The long-term dependence of key information systems on foreign hosts makes the problem of the information security uncontrollable becomes more and more prominent. In the financial, telecommunications, energy, transportation and other related to the country's lifeblood of the system areas, such as banking business Transactions system, securities trading system, telecommunications network management system, power dispatching system, etc., 90% of the business operation in the foreign host system. According to statistics, only 2012 China was controlled by the overseas computer to more than 14.2 million units, a large number of financial, transportation, energy and other key sectors.
Zhang said: "The core of information security in China is the lack of core technology, leading to the key information infrastructure long-term dependence on foreign host, the first prerequisite to solve this problem is autonomous controllable." He believes that the host system from the hardware logic, software source code and system operational dimension to achieve autonomous control to eliminate foreign host system security threats.
It is understood that the wave issued by the Host security solution for the first time assembled hardware, operating system and security software, by the Tide shuttle K1, K-ux operating system and SS Host Security Protection program. Among them, shuttle K1 is China's first key application host system, in the hardware board, System firmware, system maintenance management and other aspects to achieve security and control, while the K-ux operating system is one of China, the only country through the UNIX 03 certified host operating system. It was also revealed that the wave is expected to launch China's self-developed 64-way mainframe system in 2015.