Why is the 360 digital security solution a "reduction of dimension"?
Author:Yu Bin Time:2022.08.01
Edit | Yu Bin
Produced | Chaoqi.com "Yu See Column"
Recently, the global Internet security field has ushered in an industry event.
As the Tenth Internet Security Conference of ISC2022 was held in Beijing, the Internet security under the tide of digital economy became a topic that was particularly concerned about the entire Internet and the technology industry.
It is worth noting that the Internet security conference followed the pace of the times. It took the theme of "escorting digital civilization and creating a new era of digital security", gathered a large number of authoritative people to explore higher -dimensional "digital security" issues.
From the "network security" we often said in the past, to the latest and wider "digital security", huge changes are quietly occurring in the security field.
In the field of security, we all know that we can never turn around 360 and Zhou Hongyi.
So naturally, 360 and Zhou Hongyi became the protagonist of the ISC2022 conference. Zhou Hongyi also delivered a keynote speech at this conference as chairman of the ISC conference.
He said that digital security "should be placed in a large framework of digital civilization to explore and discuss" and "hopes to explore a set of" China Plan "that can truly respond to digital security challenges."
360 vs Microsoft, the cherishment below "s"
Interestingly, during this ISC2022, a Zhou Hongyi "bombardment" Microsoft also occurred, which once caused a stir on the Internet.
On July 30, at the ISC2022 conference site, Zhou Hongyi stated that "Microsoft as a technology giant and borrowed the security concept of 360 in the safety field, which also proves that our security concept is relatively advanced and on a correct road."
When companies such as Microsoft imitate 360 safety free antivirus, this will undoubtedly promote Microsoft in the direction of the most powerful security company in the United States, and the core driving force is because Microsoft can obtain massive C -side user terminal security data. Let it have a deeper understanding of the security situation of the entire network.
Obviously, Zhou Hongyi is still continuing his style of "rough words" as always. Although the language of Microsoft, the old predecessor of the "怼" technology circle, it looks a little sharp, but we can still see Zhou Hongyi's words in one language. With the core value of 360, it just wants to use external cases to prove the superiority of its own route.
In order to avoid misunderstanding of Zhou Hongyi's "eating melon", Zhou Hongyi also released a clarification Weibo in the back. He said, "I am not a bombardment of Microsoft, it is essentially a cherishment. Only the company can do a good job of security, because there are massive end users, because they can put big data in the cloud for security analysis, because they have the genes and advantages of 'see'. I think 360 and Microsoft are both future -oriented companies. "
In summary, the essence of 360 VS Microsoft, Zhou Hongyi wants to emphasize that it is nothing more than the view that it has always told the ISC2022 conference, that is, in the field of digital security, "invisible" is the biggest pain point.
But this pain point is easily solved by 360. It can "see" threats, thanks to the security big data accumulated in the field of C -end free anti -virus.
Today, as 360 and Microsoft choose the same route, this choice itself has proved the future development direction of digital security.
More importantly, today 360 and Microsoft's success in the security capacity and security market have proved that in the past, the saying that "C -end security companies cannot do TOB" in the field of security are actually the same. Great misleading.
Because the security company that only does TOB does not have the big data on the entire network, it is actually "blind", and the risk is completely invisible. In the era of digitalization, only C -end companies can do a good job of security because it has massive end users because it can put big data in the cloud for security analysis because it has the genes and advantages of "seeing".
From subverting the domestic network security industry in the past, to now leading the future digital security with the attitude of decreased dimensions, 360 shows the huge development space of future security business in the background of digital security. I believe that over time, a brand new 360 will appear in front of us.
Helps improve national security strength, 360 shows the core capabilities
The convening of ISC2022 fully demonstrates the accumulation and thinking of 360 at the digital security level over the years.
According to Zhou Hongyi, under the background of the Russian and Ukraine War and the frequent national disputes, the APT attack of the national background has become the mainstream of the confrontation of the country. The new and more complicated security environment is sweeping.
To this end, "network security" must be upgraded towards a higher -dimensional "digital security".
In the era of digital security, Zhou Hongyi proposed a concept of "seeing" and regarded the "seeing" ability as the core keyword in the ISC2022 conference.
In the field of digital security, what is "seeing"? Why is it so important?
Simply put, "seeing" is a safe watershed. Only with the "seeing" risk capabilities based on massive users and big data, can we master the passwords of the digital security era and provide reliable digital security guarantee for the country, enterprises, and individuals. To this end, Zhou Hongyi took 360's empowerment of national security strength as an example, showing the results of 360's safety operation service system with "seeing" as its core.
It is reported that in the past ten years, a certain national network army has continuously attacked key departments, including the government, finance, research institutes, military industry, aerospace, and medical industry, and other important infrastructures. Trace can be found, and now most of them have been successfully captured by 360, which contains a lot of safety accumulation and work.
据介绍,通过长达二十年、高达两百亿的时间与资金投入,360目前已经聚集了两千名安全专家,积累了2000PB的安全大数据,形成了一套“感知风险、看见威胁、 Resistance to attack "security ability, and to defend national network security to assist the party, government, military and enterprises to protect strategic asset security.
We can compare 360's security capabilities to the country's "radar" and "early warning aircraft" of digital space. Through these "weapons", to help the country solve the problem of "invisible", to achieve 99%of the national network attacks are 360 Discovery independently.
Under the core capabilities of this digital security field, 360 has been able to undertake a large number of national strategic research projects. From 2016, it has supported national real network offense and defense drills for 7 consecutive years. Cyber security guarantee at the industry, cities, and national levels It contributed its own strength.
"Multi -dimensional strikes" from the country to the industry
As a security company covering hundreds of millions of audiences in the C -side field, 360 further announced at this ISC2022 conference to enter the TOB market. It hopes to refine its own TOC to TON's powerful ability system into a "digital security brain framework" Then serve the broad B -end corporate customers.
It is reported that the core of the 360 "digital security brain framework" facing the B -end market is not a traditional selling products to customers, but to help customers build a safe operation system with "seeing" as the core. Its essence is digital security services.
This allows 360 to build a new industrial Internet market outside the C -end. This market "up" can help the country to solve digital security problems. Help TOB customers improve the digital strategy.
It can be seen that this is tantamount to a "dimension reduction strike" for other companies in the industry.
Because 360 from serving hundreds of millions of users and serving government and enterprise customers, both levels have the advantages of non -copying of peers, which means that 360 may continue to "subvert" the traditional security market, quickly seize the digital security incremental market, and the future The market development prospects cannot be estimated.
Specifically, the advantages of 360 in the field of digital security are mainly reflected in the following aspects.
First of all, 360 started from doing free safety. At the beginning of the development, the traditional anti -virus market was subverted, hundreds of millions of users accumulated, and became a defense line that foreign hackers invaded the Chinese network.
Secondly, 360 is the only company in the industry that has the ability to propose a "digital security China solution" in the era of digital civilization. This is because 360 is a real digital security company. It has the Internet and digital genes that have lack of peers. The industry -leading security big data, offense and defense knowledge bases, which are only available in the market for hundreds of millions of users, can only obtain the core barriers.
There is no doubt that 360 has already become a unique company. It has both digital genes and focuses on security. Based on the "seeing" capabilities, it creates a digital security service system, and then from selling soft hardware to operational and service -oriented transformation.
The transformation of 360 secretly coincides with the irreversible development trend of the security industry, and the operating service system based on the "seeing" capabilities represents the future of the development of the digital security industry.
Finally, for "security", industry cognition generally stays in the "network security" category, and it will inertia in the Internet business when giving value assessment. Many people have not realized the market development potential of 360.
Selling software and selling boxes will eventually become the past. With the deepening of digitalization, the forward -looking layout of 360 in the safe industry will be released soon. With the development of big data, cloud computing, and even the Yuan universe industry, the test experienced by 360 services at hundreds of millions of C -terminal users will allow 360 to accumulate, realize the transformation from C to N -end, to B -end, and in a certain certain way To the degree of redevelopment and dimensionality of the industry.
- END -
Don't hurt!Yesterday he left
From July 11th to July 17th, the three masters of the Republic went away.On July 1...
The first one in Hubei, it's God!
On July 4th, the full -carbon fiber composite material ZA800 light sports aircraft...