当前位置:网站首页>New engine, new capability, new experience, Tencent host security flagship release
New engine, new capability, new experience, Tencent host security flagship release
2022-06-23 08:45:00 【Tencent security】
In the near future ,《2021 China's virtual machine Market Security Report 》 Release , Tencent host security is once again listed in the leading quadrant of the domestic cloud host market , And in the growth index 、 The innovation index ranks first in two indexes .
In the New Year , Tencent host security continues to run forward .2022 year 1 month 9 Japan , Tencent Security launched Tencent's flagship host security product . A new and upgraded flagship version , With a new engine 、 New capability 、 New experience is the core , Help enterprises create a closed loop of safety protection , Make security easier !
conference , Li Shaopeng, founder of several generations of consulting 、 Dulan, cloud native security expert of the ICT Institute 、 Zhang Yin, senior product expert of Tencent security 、 Renyilin, a security expert at Tencent security Cohen lab 、 Taofen, product expert of Tencent security Yunding laboratory 、 Bi Lei, a security expert at Tencent security anti-virus laboratory 、 Liaohanhui, head of pea thinking application safety 、 Xiaohua technology information security expert luodinghua and other senior security experts , Made a wonderful and forward-looking and technical speech .
Seven core engines
Build cloud native security capabilities
“ At present , Highlight the security threat of the native cloud ,‘ Cloud convergence 、 Cloud computing convergence 、 Cloud Intelligence Fusion ’ Continuous deepening , Cloud primordial enters the golden development period , Traditional border based security protection model , It can no longer meet the security requirements under the cloud native architecture , There is an urgent need to build a cloud native security protection system .” Du Lan, a cloud native security expert at the ICT Institute, said , With the leading force of security technology moving from unilateral to pluralistic , Cloud service providers and security vendors will strengthen in-depth cooperation , Further enrich and improve the cloud native security ecosystem .
Host security is the last line of defense for enterprise basic security , It is an important part of the cloud's native security ecosystem . Zhang Yin, a senior product expert of Tencent security, said , Tencent security is based on the core needs of users , from “ The prevention of → defense → testing → Respond to ” Build the host security protection system in four stages .
This release of Tencent host security flagship , Rely on the seven core engines 、 Million level terminal protection 、 Ten billion threat data , Help enterprises protect the security of core assets in real time , Meet the insurance compliance 、 Asset risk management and intrusion prevention requirements .
Tencent host security has been the leader in the domestic cloud host security market for two consecutive years , And in the growth index 、 The innovation index ranks first in two indexes . Now , The newly upgraded Tencent host security flagship , With a new engine 、 New capability 、 New experience is the core , Optimize users' cloud security protection while making security simpler !
The specific term , For security events at the virtual machine level , Tencent host security flagship relies on cloud native security capabilities , Support intrusion detection 、 The source of invasion 、 File killing 、 Vulnerability management and security warning . For example, in the area of vulnerability management , Ultimate Edition can effectively optimize scanning performance , Improve accuracy ; In terms of document checking and killing , Tencent self research TAV-Webshell The engine detection rate is as high as 99%+; In the aspect of intrusion automatic traceability , With threat detection 、 Two modules of threat analysis , Help users quickly restore intrusion events . Besides , It can also fully grasp the tactical characteristics of the attacker , And the authorized purchase of supporting assets 、 binding 、 Capacity expansion 、 renew 、 Upgrade and other functions .
Besides , New Tencent container security service TCSS It supplements the generation from image for container assets on cloud 、 Full lifecycle protection from storage to runtime , Provide asset management 、 Image security 、 Security services such as runtime intrusion detection , Help enterprises build container safety protection system , Meet the vulnerability defense at the container asset level 、 Intrusion detection 、 And other insurance compliance scenarios . Relying on the support of the expert team of Tencent security Yunding Laboratory , Tencent cloud container security service transforms Tencent's internal ten million level container cluster management experience into product best practices , Help enterprises quickly raise the level of safety protection .
Create a closed loop of enterprise protection
Make security easier
Tencent host security flagship in practice , By focusing on the core needs of users , Effectively solve the enterprise data leakage caused by hacker intrusion 、 Service interruption 、 Brand damage and other problems , Effectively deal with mining Trojans 、APT attack 、DDoS attack 、 Encrypted blackmail 、 Mainstream cloud security threats such as identity authentication and credential theft , It has been highly praised by customers , And obtained, including Gartner、 Leopard head & Sullivan 、MSTL、CSA CSTR、 International authoritative anti-virus VB100、AVC、 Seven authoritative certifications including Saida laboratory .
at present , Tencent host security products have been widely used in finance 、 The media 、 automobile 、 traffic 、 Online retailers 、 Education and pan Internet industries , More than... Can be detected every month 5.3 100 million times + Password cracking attacks , Identify 20 ten thousand + The number of various malicious Trojan virus files and 100 More than ten thousand malicious IP, Provide high-quality defense blocking and repair capabilities , Help enterprises create a closed loop of safety protection .
In the field of Education , By using Tencent's host security product cloud mirror , Discover malicious files in real time , With the help of asset fingerprint monitoring, we can quickly repair and dispose of security vulnerabilities , Meet the customer's need to know more security information , Automated asset management in a hybrid cloud environment 、 Asset visualization and richer vulnerability details 、 Label and repair solution requirements .
In Finance , Tencent container security service actively detects security vulnerabilities from the image layer , And in 5 Complete the repair and verification of all assets within minutes . Besides , There are various types of cloud assets for financial customers 、 A large number of , The security operation and maintenance team is unable to count assets in a timely and rapid manner , Tencent host security 、 Tencent container security services through asset management 、 Vulnerability and baseline risk detection capabilities help reduce enterprise operating costs while , Greatly improve the timeliness of safe operation 、 Accuracy and effectiveness .
Now , Cloud native security has entered a golden age of development , Host security brings new ideas and strategies to cloud security protection . future , Tencent host security will also integrate the native security protection capabilities of Tencent cloud and the best practices of thousands of customers , Uphold “ Technology goodness ” Idea , Provide more fine-grained security technology for cloud enterprises , So as to improve the overall cloud security level of customers .
边栏推荐
- 【云计算】GFS思想优势以及架构
- Generate code 39 extension code in batch through Excel file
- Single core driver module
- Multi-scale feature combination in target detection
- Integers and operators in go data types (3)
- ArcLayoutView: 一个弧形布局的实现
- [paper notes] catching both gray and black swans: open set supervised analog detection*
- C # advanced learning -- virtual method
- Pyspark on HPC (Continued): reasonable partition processing and consolidated output of a single file
- Leetcode topic analysis count primes
猜你喜欢

Basic use of check boxes and implementation of select all and invert selection functions

The most commonly used 5-stream ETL mode

Keng dad's "dedication blessing": red packet technology explosion in Alipay Spring Festival Gala

Analysis of JMeter pressure measurement results

PCB电路板特性检查项目都有哪些?

Why do we say that the data service API is the standard configuration of the data midrange?

297. Serialize and Deserialize Binary Tree

Point cloud library PCL from introduction to mastery Chapter 10

Le rapport d'analyse de l'industrie chinoise des bases de données a été publié en juin. Le vent intelligent se lève, les colonnes se régénèrent

Linux Mysql安装
随机推荐
6、 Web Architecture Design
自组织映射神经网络(SOM)
7-palette-calayer and touch
[advanced Android] kotlin notes
Use newbeecoder UI implements data paging
【云计算】GFS思想优势以及架构
Android kotlin coroutines KTX extension
Focus! Ten minutes to master Newton convex optimization
Map (set) operation in go language
523. Continuous Subarray Sum
USB peripheral driver - configfs
Talk about the implementation principle of @autowired
How to mine keywords and improve user experience before website construction?
Why do we say that the data service API is the standard configuration of the data midrange?
渲染效果图哪家好?2022最新实测(四)
Jetpack family - ViewModel
636. Exclusive Time of Functions
Arclayoutview: implementation of an arc layout
Single core driver module
Introduction to typescript and basic types of variable definitions