当前位置:网站首页>Tencent dongzhiqiang: network security construction needs to change from product driven to service driven
Tencent dongzhiqiang: network security construction needs to change from product driven to service driven
2022-06-24 02:43:00 【Tencent security】
In order to meet the network security requirements in more complex environments ,2021 year 10 month 22 Japan , Tencent has released a secure hosting service MSS, Relying on Tencent 20 Years of practical experience in attack and defense and industry-leading intelligence perception , Through self-developed service workflow scheduling system , Realize the standardization of service process 、 Automation and Visualization , With these abilities , It can provide users with 7*24 24x7 monitoring and analysis service and instant emergency response capability .
Vice president of Tencent security 、 Head of Tencent security Yunding Laboratory Dong Zhiqiang
conference , Dongzhiqiang, head of Tencent security Yunding laboratory, brought 《 Network security construction needs to change from product driven to service driven 》 Theme sharing . The following is a record of the sharing content :
Hello everyone , I'm dongzhiqiang from Tencent , Welcome to our media communication meeting today .
China is already the second largest digital economy in the world , Over the past few years , We witnessed , Also personally experience , Digitalization has brought great changes to our life and production , It has spawned many new industrial forms and new Unicorn enterprises , Many traditional enterprises have also achieved secondary development in the digital era .
Today's digital services , Whether it is consumer Internet or industrial Internet , From daily food, clothing, housing and transportation , To digital government 、 Medical care 、 Financial and other industrial applications , Most of them are “ Continuous online ” The state of . Support these services 7*24 Hours of continuous online , The required security technology 、 Safety capability 、 Safety talents 、 Safe Ecology , It is a completely different concept from the past . Black production is gradually organized 、APT turn , Today's network attack situation , Not only for many enterprises , Even for some traditional security vendors “ Superclass ” Of . For once DDoS Take attack as an example , The traditional security protection system may generate hundreds of thousands of security event alarms in a short time , The difficulty of handling is self-evident .
In recent years , China's network security legislation is accelerating ,“ Four laws and three regulations ” Release one after another , Network security has been raised to the level of national will , Many leading enterprises' investment in network security is also increasing year by year . But compared with the progress of system and safety awareness , The reform of the network security industry itself is lagging behind , The development of China's network security industry is close to 30 year , So far, the main thing is to buy hardware 、 Buy Software 、 The construction idea of human resources , Security service is often just a value-added service after purchasing security equipment , Enterprises put 80% The budget is used to purchase equipment ,20% Our budget is used to pay for security services , This seems to us to put the cart before the horse .
Network security is a practical type 、 The work of dynamic evolution , There are no products or solutions that can be done once and for all , We should take the result of safety guarantee , What kind of security products and solutions are needed for backward push . In today's security situation , The safety construction of enterprises needs to change from product driven to service driven . Secure hosting services , That is to say MSS, It is based on such changes in the external environment , Our core idea is to take service as the core , Products and technology as means , Experience of senior safety experts 、 Combat experience to automate 、SaaS The way of transformation , Encapsulated as reusable services , Build a solid safety foundation for the enterprise .
Tencent itself has gone through several stages in security construction , At first, we did security for Tencent's own business , So far 20 Years of experience in security offensive and defensive confrontation ;“930” after , Tencent began to cultivate the industrial Internet , In the process , A very important mission of Tencent security is to put the past 20 The security capabilities accumulated over the years have been opened up , For Tencent cloud 、 Cloud tenants and digital transformation industry users provide security .
On tencent cloud , We are facing 100 More than ten thousand servers , We need to deal with a large number of security incidents every day , Sustained high-intensity confrontation , It is impossible to adopt the traditional safe operation and maintenance mode , So we introduced a lot of machines 、 The ability to automate , A set of standardized safety research and operation system has been settled down , These experiences have also played a great role in many of our projects , Included in digital Guangdong 、 National annual 、 Canton Fair 、 The Seventh National Population Census and the recent COP15 In the work of safety protection , These standard processes and solutions can help customers deal with security issues more efficiently , The whole process is quantified 、 Traceable . A large private cloud customer we serve , its 80% At present, all security operations have been migrated to Tencent's service hosting platform , The overall safe operation efficiency has been improved 40%,50% Operational indicators are visualized .
Based on Tencent's own security operation requirements and our past experience in serving enterprise customers , Tencent security hosting service is also gradually taking shape . What we are proposing today is not an idea or concept , It is a set of mature service solutions , It is already in the daily security operation of our Tencent cloud 、 It has been verified in the security construction of a large number of enterprise customers , It solves the problem of traditional security system “ The process is not visible ” and “ The result is uncontrollable ” The problem of .
With the increasing volume of digital economy , The division of labor in each production link of the digital economy will be further refined , Enterprises will focus more on their own core business development and security management , Entrust some safety work that they are not good at to some professional service manufacturers for capacity supplement and system improvement . For our security vendors , Provide reliable 、 Worry free security services , So that enterprises can focus on their own core business development , It's the direction of our efforts ,MSS Service is an important step in achieving this goal . At the same time, we are also concerned about , Many small and medium-sized enterprises often do not have enough manpower and budget to do safety construction , Therefore, we are also working with the China Association of small and medium sized commercial enterprises , Through some mechanisms to help more small and medium-sized enterprises to fill the short board of security construction .
Digitalization has become a new driving force for economic development , For individuals , It is also an inevitable choice for high-quality development . In tencent “ Technology goodness ” Under the vision , Tencent security is committed to working with the vast number of enterprise customers to achieve security co construction and co governance , Jointly safeguard a better life in the digital age .
Thank you again for coming .
边栏推荐
- What is the domain name trademark? What are the registration conditions for domain names and trademarks?
- S2b2c platform of fresh food industry reshapes the ecosystem of agricultural products and builds a mobile fresh food comprehensive mall
- Case of data recovery by misoperation under NTFS file system
- Grpc: how to enable tls/ssl?
- How to build video websites? What are the types of video websites?
- Echo framework: add API logging Middleware
- Block
- SAP retail characteristic profile I
- How to transfer files from the server connected to the fortress machine and how to access the server through the fortress machine
- How to use nsfilemanager
随机推荐
Deep and shallow copy
What is the meaning of scdo? Is it comparable to bGH
How to use nsfilemanager
Is the IP of the fortress machine the IP of the server? How to deploy the fortress machine
How does [lightweight application server] build a cross-border e-commerce management environment?
Hungry? Remote dual live database practice
Opengl: how to use shader to convert RGBA to nv21 image format? (open source for the first time in the whole network)
Using the database middleware MYCAT to realize read-write separation (dual master and dual slave)
Coding helps Jiangsu high-speed information to achieve organizational agility and R & D agility, leading the new infrastructure of Intelligent Transportation
How to transfer files from the server connected to the fortress machine and how to access the server through the fortress machine
Internal reasons for cloud desktop unable to connect to the server and external reasons for cloud desktop connection failure
How to register a trademark? How to improve the passing rate of trademark registration?
More than 10 million Android users installed a fraud app and doubled the number of blackmail attacks in the UK | global network security hotspot
Wwise + GME game voice scheme: unlock more voice playing methods and let players "sound in their environment"
Tencent Ding Ke: the mission of Tencent security is to safeguard the beauty of digital
Gin framework: add Prometheus monitoring
Live broadcast Reservation: a guide to using the "cloud call" capability of wechat cloud hosting
What are the performance characteristics of cloud desktop? How to choose the most cost-effective cloud desktop server?
The 2021 Tencent digital ecology conference is coming
Afnetworking usage and cache processing
