[51CTO.com original article] Recently, Aicrypt and Anbai Technology held a strategic cooperation press conference on "Insight into unknown risks and jointly build ecological security". Aicrypt CEO Guo Xunping and Anbai Technology CEO Kang Wei signed a strategic cooperation agreement on the spot, jointly announcing that the two parties will realize shared data/intercommunication technology and strive to create a new ecology of network information security. At the meeting, the two parties also launched the industry-leading "Application Security +" concept, aiming to create a new closed-loop ecology of application security. On the surface, the cooperation between these two domestic security companies is nothing surprising. But in fact, it is extremely rare for cooperation like that between Aicrypt and Anbai Technology to go deep into the level of underlying data interoperability. Perhaps people are used to threat intelligence sharing, situational awareness, and mutual exchange among alliance members, but do these "cooperations" really help customers? Do they really solve customers' pain points? The answer remains to be discussed. The strategic cooperation between Aicrypt and Anbai Technology has broken through the data barriers between the mobile and server ends of the application system, realized the deep collaboration and linkage between different security products of enterprise customers, and brought customers real overall security. For reporters, the far-reaching significance of such cooperation is to abandon the tradition of "single-soldier combat" in the security industry and provide more peers with a new security model that is more "down-to-earth", more favored by corporate customers, and has a higher level of security defense. How did such in-depth cooperation come about? What obstacles did Aicrypt and Anbai Technology overcome in their cooperation? What kind of prosperous business opportunities will future cooperation bring? The reporter interviewed Aicrypt CEO Guo Xunping and Anbai Technology CEO Kang Wei, and all the answers were revealed in the humorous, lively and passionate conversation between the two.
iCrypt CEO Guo Xunping (right) and Anbai Technology CEO Kang Wei (left) Two ants are enough to fight an elephant Anyone who has been in the security circle for a long time knows that customers' security needs are actually "fragmented". Security issues may exist in all aspects of business, production, warehousing, and operations. In order to solve these security risks, corporate customers often choose security products in multiple fields, such as mobile security, intranet security, data security, etc. The security industry covers a wide range of fields. Although there are "top brands" in each market segment, no security giant has the confidence to claim that its products are the best in all fields. For this reason, the deployment strategy of multiple security brands by enterprises has not achieved the effect of 1+1>2, but has been discounted. In the process of contacting customers, Guo Xunping and Kang Wei discovered this problem at the same time, and therefore had the idea of in-depth cooperation. In Guo Xunping's opinion, if security vendors do not cooperate deeply, it is actually no different from security integration, and it is difficult to bring core value to customers. Therefore, when both parties first discussed the cooperation, they were determined not to be satisfied with the phased business cooperation, but to do deeper technical cooperation. Kang Wei added that the product solutions of Anbai Technology and Aicrypt are particularly complementary in terms of technology and market. Due to the booming development of the Internet of Things and mobile Internet, the boundaries of security are becoming increasingly blurred. Even a small negligence in the application on the mobile phone of corporate employees may bring hidden dangers to the security of the enterprise. Therefore, if both parties can share data at the bottom layer, once AiEncrypt integrates some security behaviors of mobile users in the process of using the application system with the security information of Anbai Technology on the server side, and realizes the linkage and coordination from the server side to the mobile terminal, the resulting security protection capabilities will greatly exceed the existing security situation awareness platform. Facts have proved that such cooperation has brought considerable benefits to both parties. After the other party's data is integrated with their own database, it has brought great added value to corporate customers. Guo Xunping gave a vivid example. Both Aicrypt and Anbai Technology are start-up technology companies. The company's scale is not large. If the big security companies are compared to elephants, Aicrypt and Anbai Technology may only be considered two small ants. However, it is precisely because the two parties have achieved in-depth cooperation based on data exchange that the security protection level they ultimately demonstrate is not inferior to that of elephants. Application Security+: Giving people a wall is more important than giving them strength The concept of "Application Security +" is exactly what the two companies proposed in response to the increasingly blurred boundaries of the Internet environment and the new security situation. Based on this concept, Aicrypt and Anbai Technology will share data information, establish a joint laboratory, conduct in-depth technical cooperation, and jointly create a new product and service system that integrates the strengths of both parties. It will provide dual security protection for the mobile and server ends of the application system, create a closed-loop security fortress, and help enterprises establish a full-dimensional three-dimensional defense system for mobile/Web/server ends. Kang Wei hopes that more security vendors will join in and bring customers a higher level of security defense. He gave an example, some security risks may not be taken seriously in isolation, but a low-risk risk on the mobile side and a low-risk risk on the server side, once combined, are likely to become a high-risk risk. "This is just a combination of the server side and the mobile side, so if there are other fields combined with application security +, can a broader and more complete solution be formed?" Kang Wei said that the answer is yes, if there are entrepreneurial companies at the database, transmission, and operating system levels willing to cooperate in depth and provide more value in the future, this is what AiEncrypt and Anbai Technology hope to see most. Guo Xunping told reporters that the concept of "Application Security +" hopes to create a platform in the future, on which various security vendors will complement each other's resources. He also emphasized that from the perspective of the underlying construction technology, he hopes that the security capabilities of the vendors joining this platform are complementary, and that they are willing to connect the underlying data and provide external services through this platform. Then, when the underlying data is connected, for customers, if they want to add a new function, it is just like ordering food in a restaurant, just check the menu. More importantly, in the past, security functions were isolated, and problems were often investigated by their respective vendors, but now they can be linked together to locate the source of the problem more quickly and accurately, thereby solving the problem. During the interview, the reporter clearly felt that Guo Xunping and Kang Wei were very confident in the cooperation between the two parties. They revealed that the follow-up cooperation might not only be on the technical level, but also on the business and capital levels. The reporter also hopes that through their "experimental field", they can provide more new references and lessons for the cooperation model of security vendors. [51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites] |
<<: I've learned a lot! 5G is actually "changing society" in this way
Maxthon Hosting has been very low-key for a long ...
At present, 5G has become a hot topic in the indu...
iOVZ Cloud is a Chinese business. Although the do...
Edge computing focuses on placing computing and s...
The popularity of 5G networks, 5G mobile phones, ...
Back in September 2019, Apple officially released...
HostDare also released a Black Friday promotion p...
Since 2016, 5G has become increasingly popular. A...
As connected technology continues to advance, bus...
The Financial Times website recently reported tha...
This is the first time that Linveo has appeared o...
5G can bring technology and innovation into the e...
According to the Ministry of Industry and Informa...
There are almost too many data center infrastruct...
1. Introduction to IPv6 1. IPv6 was previously kn...