当前位置:网站首页>Tencent dongzhiqiang: network security construction needs to change from product driven to service driven
Tencent dongzhiqiang: network security construction needs to change from product driven to service driven
2022-06-24 02:43:00 【Tencent security】
In order to meet the network security requirements in more complex environments ,2021 year 10 month 22 Japan , Tencent has released a secure hosting service MSS, Relying on Tencent 20 Years of practical experience in attack and defense and industry-leading intelligence perception , Through self-developed service workflow scheduling system , Realize the standardization of service process 、 Automation and Visualization , With these abilities , It can provide users with 7*24 24x7 monitoring and analysis service and instant emergency response capability .
Vice president of Tencent security 、 Head of Tencent security Yunding Laboratory Dong Zhiqiang
conference , Dongzhiqiang, head of Tencent security Yunding laboratory, brought 《 Network security construction needs to change from product driven to service driven 》 Theme sharing . The following is a record of the sharing content :
Hello everyone , I'm dongzhiqiang from Tencent , Welcome to our media communication meeting today .
China is already the second largest digital economy in the world , Over the past few years , We witnessed , Also personally experience , Digitalization has brought great changes to our life and production , It has spawned many new industrial forms and new Unicorn enterprises , Many traditional enterprises have also achieved secondary development in the digital era .
Today's digital services , Whether it is consumer Internet or industrial Internet , From daily food, clothing, housing and transportation , To digital government 、 Medical care 、 Financial and other industrial applications , Most of them are “ Continuous online ” The state of . Support these services 7*24 Hours of continuous online , The required security technology 、 Safety capability 、 Safety talents 、 Safe Ecology , It is a completely different concept from the past . Black production is gradually organized 、APT turn , Today's network attack situation , Not only for many enterprises , Even for some traditional security vendors “ Superclass ” Of . For once DDoS Take attack as an example , The traditional security protection system may generate hundreds of thousands of security event alarms in a short time , The difficulty of handling is self-evident .
In recent years , China's network security legislation is accelerating ,“ Four laws and three regulations ” Release one after another , Network security has been raised to the level of national will , Many leading enterprises' investment in network security is also increasing year by year . But compared with the progress of system and safety awareness , The reform of the network security industry itself is lagging behind , The development of China's network security industry is close to 30 year , So far, the main thing is to buy hardware 、 Buy Software 、 The construction idea of human resources , Security service is often just a value-added service after purchasing security equipment , Enterprises put 80% The budget is used to purchase equipment ,20% Our budget is used to pay for security services , This seems to us to put the cart before the horse .
Network security is a practical type 、 The work of dynamic evolution , There are no products or solutions that can be done once and for all , We should take the result of safety guarantee , What kind of security products and solutions are needed for backward push . In today's security situation , The safety construction of enterprises needs to change from product driven to service driven . Secure hosting services , That is to say MSS, It is based on such changes in the external environment , Our core idea is to take service as the core , Products and technology as means , Experience of senior safety experts 、 Combat experience to automate 、SaaS The way of transformation , Encapsulated as reusable services , Build a solid safety foundation for the enterprise .
Tencent itself has gone through several stages in security construction , At first, we did security for Tencent's own business , So far 20 Years of experience in security offensive and defensive confrontation ;“930” after , Tencent began to cultivate the industrial Internet , In the process , A very important mission of Tencent security is to put the past 20 The security capabilities accumulated over the years have been opened up , For Tencent cloud 、 Cloud tenants and digital transformation industry users provide security .
On tencent cloud , We are facing 100 More than ten thousand servers , We need to deal with a large number of security incidents every day , Sustained high-intensity confrontation , It is impossible to adopt the traditional safe operation and maintenance mode , So we introduced a lot of machines 、 The ability to automate , A set of standardized safety research and operation system has been settled down , These experiences have also played a great role in many of our projects , Included in digital Guangdong 、 National annual 、 Canton Fair 、 The Seventh National Population Census and the recent COP15 In the work of safety protection , These standard processes and solutions can help customers deal with security issues more efficiently , The whole process is quantified 、 Traceable . A large private cloud customer we serve , its 80% At present, all security operations have been migrated to Tencent's service hosting platform , The overall safe operation efficiency has been improved 40%,50% Operational indicators are visualized .
Based on Tencent's own security operation requirements and our past experience in serving enterprise customers , Tencent security hosting service is also gradually taking shape . What we are proposing today is not an idea or concept , It is a set of mature service solutions , It is already in the daily security operation of our Tencent cloud 、 It has been verified in the security construction of a large number of enterprise customers , It solves the problem of traditional security system “ The process is not visible ” and “ The result is uncontrollable ” The problem of .
With the increasing volume of digital economy , The division of labor in each production link of the digital economy will be further refined , Enterprises will focus more on their own core business development and security management , Entrust some safety work that they are not good at to some professional service manufacturers for capacity supplement and system improvement . For our security vendors , Provide reliable 、 Worry free security services , So that enterprises can focus on their own core business development , It's the direction of our efforts ,MSS Service is an important step in achieving this goal . At the same time, we are also concerned about , Many small and medium-sized enterprises often do not have enough manpower and budget to do safety construction , Therefore, we are also working with the China Association of small and medium sized commercial enterprises , Through some mechanisms to help more small and medium-sized enterprises to fill the short board of security construction .
Digitalization has become a new driving force for economic development , For individuals , It is also an inevitable choice for high-quality development . In tencent “ Technology goodness ” Under the vision , Tencent security is committed to working with the vast number of enterprise customers to achieve security co construction and co governance , Jointly safeguard a better life in the digital age .
Thank you again for coming .
边栏推荐
- The whole procurement process of the procurement mall website in the transportation industry is electronic to reduce the procurement cost
- Tidb HTAP Getting Started Guide - how to add a copy of tiflash
- November 1 global network security hotspot
- The dealer management and control platform in the leather industry simplifies the purchase approval process and easily controls agents
- Opengl: how to use shader to convert RGBA to nv21 image format? (open source for the first time in the whole network)
- How to build a speech synthesis server
- Can cloud computing scale flexibly? What are the characteristics of elasticity?
- Face recognition using cidetector
- How to bind EIP to access public network in tke cluster fixed IP mode pod
- LeetCode 205. Isomorphic Strings
随机推荐
Simple use of notification
How to transfer files from the server connected to the fortress machine and how to access the server through the fortress machine
Start tcapulusdb process
MySQL case deep excavation information_ Root causes of slow schema view query (Part 2)
2021 game security industry summit: Security Co Construction and healthy development of escort industry
Gartner released the magic quadrant of enterprise low code platform in 2021. Low code integrated platform becomes a trend!
Uipickerview show and hide animation
Kibana report generation failed due to custom template
The dealer management and control platform in the leather industry simplifies the purchase approval process and easily controls agents
How to change the cloud desktop domain server password if you forget it?
Deep and shallow copy
Go language starts again, go modules' past life, present life and basic use
File access methods on Fortress server how to log in to the server
The most comprehensive arrangement of safe operation solutions from various manufacturers
Live broadcast Reservation: a guide to using the "cloud call" capability of wechat cloud hosting
Pod abnormal troubleshooting
The 2021 Tencent digital ecology conference is coming
Uiscrollview add gestures show and hide keyboard
More than 10 million Android users installed a fraud app and doubled the number of blackmail attacks in the UK | global network security hotspot
What are the performance characteristics of cloud desktop? How to choose the most cost-effective cloud desktop server?
