当前位置:网站首页>Another authoritative recommendation! Tencent zero trust was recognized by omdia Report
Another authoritative recommendation! Tencent zero trust was recognized by omdia Report
2022-06-24 06:14:00 【Tencent security】
In recent days, , Internationally renowned market research institutions Omdia Publish research reports 《 The development of zero trust and its application in secure remote access 》( Hereinafter referred to as" 《 The report 》), This paper discusses many applications of zero trust in network security practice , And focus on zero trust access in the remote access scenario (ZTA), This paper introduces Tencent's zero trust security management system iOA Implementation in the platform ZTA The case practice of , In order to provide experience and reference for enterprises to establish a secure remote access system .
《 The report 》 Pointed out that , Due to the digital transformation 、 The application infrastructure is migrating to the cloud and more and more intelligent terminals can access enterprise resources remotely , The network security boundary has almost disappeared , The infrastructure that network security vendors need to protect has become more complex , The traditional network security architecture has become increasingly unable to meet this challenge .
With “ Never trust , Always verify ” The principle of zero trust , Different from the previous network security methods , It can avoid public attack surface 、 Fully record the access action and time 、 Continuously verify each connection 、 Minimum privilege access, etc , In the past three years, it has been valued by the industry , We have made great progress . In many fields , The concept and method of zero trust have been integrated into the network security technology .
For example, access management for privileged users (PAM) Follow the principle of minimum privilege , Avoid exposing the entire organizational infrastructure ; Permission in cloud (CPM) Use zero trust for data storage , Give advice on where access rights need to be reduced ; Adopt micro isolation method to isolate and protect the workload from each other , And implement zero trust access in remote access (ZTA) etc. .
《 The report 》 Specially pointed out , The COVID-19 has driven millions of workers around the world to work at home for a long time , It has aroused the attention of enterprises to secure remote access , And the more secure traditional virtual private network (VPN) Interest in method alternatives , Zero trust access (ZTA) So the rapid rise , It has broad development prospects .
Tencent from 2016 In, we began to develop zero trust based iOA edition , Decompose the whole office path into people 、 equipment 、 Application 、 Resources and other core elements . After more than ten years of practice and research , Set up a set of security 、 Stable 、 An efficient zero trust work environment . at present , tencent iOA And zero trust security architecture have been fully applied in the internal network architecture of Tencent , Including intranet access 、 Telecommuting 、 Small and medium-sized workplace access 、 Cloud resource access and other important scenarios .
As the foundation of Tencent's zero trust access product ,iOA It can be deployed through privatization or software as a service (SaaS) Two modes of delivery . The system is based on terminal security 、 Identity security 、 Application security 、 Link security and other core capabilities , For each session request to access enterprise resources , All users are authenticated 、 Equipment safety status 、 Software application security status check and Authorization , Full link encryption . While integrating global network acceleration capabilities , Solve the problem of cross-border cross operator access to Caton or excessive delay . No matter where the user is 、 Use any terminal 、 Any application can achieve any business goal safely and efficiently .
stay 2020 During the year of epidemic prevention and control , Face the inside 7 Million employees and 10 Ten thousand terminal servers cross the border 、 Across the city 、 Multi terminal remote office needs , tencent iOA Provides security 、 Stable 、 Efficient remote access environment , To ensure the smooth development of various internal businesses , Have fully proved their ability . Not only Tencent itself , tencent iOA It has also achieved external output and assistance , And has been in government affairs 、 Finance 、 Medical care 、 Many application cases have been accumulated in transportation and other industries , Service customers include a provincial company of an operator 、 Bohai University, etc .
Beyond product practice , Tencent security is also committed to leading the implementation of international and domestic zero trust standards , Accelerate the implementation and application of zero trust concept and related technologies :
l 2019 year 7 month , Led by Tencent “ Zero trust security technology reference framework ” a CCSA Industry standard project approval ;
l 2019 year 9 month , Led by Tencent 《 Service access process continuous security guide 》 Zero trust ITU The international standard was officially approved , It has achieved a breakthrough in domestic international standards in the field of zero trust ;
l 2020 year 6 month , Tencent cooperates with a number of authoritative industry university research institutions in the industry , The first zero trust industry standards working group in China was established under the industrial Internet development alliance ;
l 2020 year 8 month , The working group is the first in the industry to release 《 Zero trust white paper 》;
l 2020 year 10 month , The working group launched the zero trust product compatibility mutual certification program , Promote the compatibility and interoperability of zero trust related products among different manufacturers ;
l 2020 year 11 month , The working group promotes “ Zero trust system specification ” Alliance standard development work ;
l 2021 year 6 month , The working group released the first zero trust technology implementation standard in China , It has a strong reference significance and reference value for guiding the development of industrial technology and users' technology application .
The digital economy and the real economy are developing together , Spawned many new industries 、 A new model , It also puts forward new requirements for network security Ecology , The industry began to explore new ideas that can effectively solve security problems in the new network environment for a long time . future , Tencent security will continue to integrate its own security capabilities , Join hands with industrial partners to jointly build a new trust system in the digital era , Build a solid security base for the development of China's digital economy .
Click to download Omdia《 The development of zero trust and its application in secure remote access 》 The report original text
边栏推荐
- Semantic web, semantic web, linked data and knowledge map
- Load balancing on Tencent cloud
- "Adobe international certification" design white must understand the color theory, absolutely full of dry goods
- Introduction of frequency standard comparison measurement system
- Excel data extraction technique: a universal formula for extracting numbers from mixed text
- MySQL series tutorial (I) getting to know MySQL
- One line of keyboard
- What are the common network protocols
- 5 minutes, online from 0 to 1!
- How to use ffmpeg one frame H264 to decode yuv420p in audio and video development?
猜你喜欢

ServiceStack. Source code analysis of redis (connection and connection pool)

Technology is a double-edged sword, which needs to be well kept
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

What is the difference between a white box test and a black box test

Solution to the 39th weekly game of acwing

One line of keyboard

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing
随机推荐
Discussion on NFT Technology
Collateral damage from DDoS and hacktivism
At the beginning of the school season, use this template to improve the management level
Is the prospect of cloud computing in the security industry worth being optimistic about?
Multi objective Optimization Practice Based on esmm model -- shopping mall
Analysis on the influence of "network security policy issued successively" on Enterprises
The errorcontrol registry of the third-party service is 3, which may cause the system to cycle restart. For example, ldpkit introduced by WPS
What are the domain name registration query tools? What should be paid attention to when registering a domain name
Royal treasure: physical storage medium
TRTC applet custom message
C51 single chip microcomputer, an entry-level tutorial for lighting up small lights
text classification with RNN
Get the short video! Batch download of Kwai video (with source code)
The joint network security laboratory of runlian technology and Tencent security was officially unveiled
The website cannot be opened after windows installs the dongle
Load balancing on Tencent cloud
5 minutes, online from 0 to 1!
Comparison of common layout solutions (media query, percentage, REM and vw/vh)
CLB unable to access / access timeout troubleshooting
How to solve the enterprise network security problem in the mixed and multi cloud era?