当前位置:网站首页>New engine, new capability, new experience, Tencent host security flagship release

New engine, new capability, new experience, Tencent host security flagship release

2022-06-23 08:45:00 Tencent security

In the near future ,《2021 China's virtual machine Market Security Report 》 Release , Tencent host security is once again listed in the leading quadrant of the domestic cloud host market , And in the growth index 、 The innovation index ranks first in two indexes .

In the New Year , Tencent host security continues to run forward .2022 year 1 month 9 Japan , Tencent Security launched Tencent's flagship host security product . A new and upgraded flagship version , With a new engine 、 New capability 、 New experience is the core , Help enterprises create a closed loop of safety protection , Make security easier !

conference , Li Shaopeng, founder of several generations of consulting 、 Dulan, cloud native security expert of the ICT Institute 、 Zhang Yin, senior product expert of Tencent security 、 Renyilin, a security expert at Tencent security Cohen lab 、 Taofen, product expert of Tencent security Yunding laboratory 、 Bi Lei, a security expert at Tencent security anti-virus laboratory 、 Liaohanhui, head of pea thinking application safety 、 Xiaohua technology information security expert luodinghua and other senior security experts , Made a wonderful and forward-looking and technical speech .

( Guest of the host security flagship release conference )

Seven core engines

Build cloud native security capabilities

“ At present , Highlight the security threat of the native cloud ,‘ Cloud convergence 、 Cloud computing convergence 、 Cloud Intelligence Fusion ’ Continuous deepening , Cloud primordial enters the golden development period , Traditional border based security protection model , It can no longer meet the security requirements under the cloud native architecture , There is an urgent need to build a cloud native security protection system .” Du Lan, a cloud native security expert at the ICT Institute, said , With the leading force of security technology moving from unilateral to pluralistic , Cloud service providers and security vendors will strengthen in-depth cooperation , Further enrich and improve the cloud native security ecosystem .

Host security is the last line of defense for enterprise basic security , It is an important part of the cloud's native security ecosystem . Zhang Yin, a senior product expert of Tencent security, said , Tencent security is based on the core needs of users , from “ The prevention of → defense → testing → Respond to ” Build the host security protection system in four stages .

This release of Tencent host security flagship , Rely on the seven core engines 、 Million level terminal protection 、 Ten billion threat data , Help enterprises protect the security of core assets in real time , Meet the insurance compliance 、 Asset risk management and intrusion prevention requirements .

( Guest of the host security flagship release conference )

Tencent host security has been the leader in the domestic cloud host security market for two consecutive years , And in the growth index 、 The innovation index ranks first in two indexes . Now , The newly upgraded Tencent host security flagship , With a new engine 、 New capability 、 New experience is the core , Optimize users' cloud security protection while making security simpler !

The specific term , For security events at the virtual machine level , Tencent host security flagship relies on cloud native security capabilities , Support intrusion detection 、 The source of invasion 、 File killing 、 Vulnerability management and security warning . For example, in the area of vulnerability management , Ultimate Edition can effectively optimize scanning performance , Improve accuracy ; In terms of document checking and killing , Tencent self research TAV-Webshell The engine detection rate is as high as 99%+; In the aspect of intrusion automatic traceability , With threat detection 、 Two modules of threat analysis , Help users quickly restore intrusion events . Besides , It can also fully grasp the tactical characteristics of the attacker , And the authorized purchase of supporting assets 、 binding 、 Capacity expansion 、 renew 、 Upgrade and other functions .

Besides , New Tencent container security service TCSS It supplements the generation from image for container assets on cloud 、 Full lifecycle protection from storage to runtime , Provide asset management 、 Image security 、 Security services such as runtime intrusion detection , Help enterprises build container safety protection system , Meet the vulnerability defense at the container asset level 、 Intrusion detection 、 And other insurance compliance scenarios . Relying on the support of the expert team of Tencent security Yunding Laboratory , Tencent cloud container security service transforms Tencent's internal ten million level container cluster management experience into product best practices , Help enterprises quickly raise the level of safety protection .

( Introduction to new container safety products of Tencent )

Create a closed loop of enterprise protection

Make security easier

Tencent host security flagship in practice , By focusing on the core needs of users , Effectively solve the enterprise data leakage caused by hacker intrusion 、 Service interruption 、 Brand damage and other problems , Effectively deal with mining Trojans 、APT attack 、DDoS attack 、 Encrypted blackmail 、 Mainstream cloud security threats such as identity authentication and credential theft , It has been highly praised by customers , And obtained, including Gartner、 Leopard head & Sullivan 、MSTL、CSA CSTR、 International authoritative anti-virus VB100、AVC、 Seven authoritative certifications including Saida laboratory .

( Tencent's virtual machine security products have obtained seven authoritative certifications )

at present , Tencent host security products have been widely used in finance 、 The media 、 automobile 、 traffic 、 Online retailers 、 Education and pan Internet industries , More than... Can be detected every month 5.3 100 million times + Password cracking attacks , Identify 20 ten thousand + The number of various malicious Trojan virus files and 100 More than ten thousand malicious IP, Provide high-quality defense blocking and repair capabilities , Help enterprises create a closed loop of safety protection .

In the field of Education , By using Tencent's host security product cloud mirror , Discover malicious files in real time , With the help of asset fingerprint monitoring, we can quickly repair and dispose of security vulnerabilities , Meet the customer's need to know more security information , Automated asset management in a hybrid cloud environment 、 Asset visualization and richer vulnerability details 、 Label and repair solution requirements .

In Finance , Tencent container security service actively detects security vulnerabilities from the image layer , And in 5 Complete the repair and verification of all assets within minutes . Besides , There are various types of cloud assets for financial customers 、 A large number of , The security operation and maintenance team is unable to count assets in a timely and rapid manner , Tencent host security 、 Tencent container security services through asset management 、 Vulnerability and baseline risk detection capabilities help reduce enterprise operating costs while , Greatly improve the timeliness of safe operation 、 Accuracy and effectiveness .

Now , Cloud native security has entered a golden age of development , Host security brings new ideas and strategies to cloud security protection . future , Tencent host security will also integrate the native security protection capabilities of Tencent cloud and the best practices of thousands of customers , Uphold “ Technology goodness ” Idea , Provide more fine-grained security technology for cloud enterprises , So as to improve the overall cloud security level of customers .

原网站

版权声明
本文为[Tencent security]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/01/202201101446314686.html