Joke Collection Website - Bulletin headlines - The history of information security technology
The history of information security technology
"Information security" is still a hot topic in the global IT field in 2005, on the one hand, because the security situation faced by commercial computing is more severe, on the other hand, because customers' demand for "high reliability computing" is escalating.
Three stages of information security industry development in China.
Information security industry can be regarded as a new industry in the process of information construction in China. Generally speaking, the development track of the industry includes three stages.
Germination stage (before 2005): The characteristic of this stage is that all industries and departments in China have begun to have awareness of information security-from "attaching importance to information construction but neglecting the construction of security system" to "realizing the importance of security" and "hoping to achieve internal security of enterprises", but they think that information security is mysterious and don't know where to start. At this stage, customers in various industries are consciously learning and accumulating information security knowledge, and have extensive exchanges with authoritative enterprises in this field to understand their technologies, concepts, products and services. At the same time, some enterprises and departments have also seen some small-scale and sporadic information security construction, but they have not achieved scale and systematization; Moreover, during this period, the government made more calls for information security in macro policies, but less specific promotion matters. Although it is very lively, there is little actual information security construction.
Outbreak stage (2005-2009): The characteristic of this stage is that the demand of domestic industries and departments for information security construction has changed from "spontaneous" to "conscious". Enterprise customers have basically understood the content and significance of information security construction-many industry departments have begun to plan and deploy internal information security construction, and enterprise leaders have also attached great importance to it, and their investment has been increasing. As a result, information security has become the top priority of enterprise IT construction at this stage. In a sense, the explosion of demand in the information security market can be said to be caused by the "debt" of enterprises in security for many years.
Pratt & Whitney stage (after 20 10): When information security construction is integrated with the overall informatization construction of enterprises, information security may lose its "hot spot effect" as a topic, but as one of the key links of enterprise IT construction, it is Pratt & Whitney-as important as air, ubiquitous, but not easy to be noticed.
2004 is the transition period from the first stage to the second stage of information security development. Since 2005, it has entered the second stage, and the information security industry will usher in a "blowout" of demand in 2005.
In three to five years from now, the information security market will maintain a high-speed and super-scale development momentum, and telecommunications, government and finance will be the industries with the greatest demand for information security in 2005. Because telecommunications and finance are industries with large investment, rapid development, high degree of informatization, complex demand and relatively severe security situation, and government departments are always playing a demonstration role (including domestic business and global political and economic circles) because of their high status and urgent security needs, they will also increase their investment in information security.
In 2005, customer demand was diversified and technology development was polarized.
In 2005, customers' demand for information security products will be manifested in four levels. First of all, the demand for security of customers in large industries will "develop from a single information security product to a comprehensive defense system" and "transition from a certain point of security construction to the construction of the whole security system". Secondly, the focus of information security deployment began to change from "network security" to "application security". The mode of "consulting+construction+outsourcing" will gradually become popular. Thirdly, from 2005, domestic information security enterprises will gradually occupy the mainstream of the market: on the one hand, domestic security enterprises have always had advantages in service and construction. As we all know, service is more important than product for information security construction. Due to the high labor cost, it is difficult for foreign security companies to meet customer needs through localization and customization. In this regard, domestic enterprises have obvious advantages. On the other hand, the products of domestic security enterprises will also occupy the mainstream of the market-at present, domestic enterprises have consolidated their advantages in the low-end market, and since 2004, products and solutions represented by Lenovo Super 5 series firewalls have been directly competing with foreign products in the high-end market. Finally, from the perspective of customer business, application security and security management will gradually become hot. Security outsourcing is still in the exploratory stage, but it may become a hot spot in future security construction.
In 2005, the development of information security technology will show a trend of polarization: manufacturers will visit both the exclusive road and the integrated road. Firewall, IDS, content management and other product solutions will become more and more specialized, because some industries with high security requirements (such as telecommunications and financial industries) have to deal with complex and changeable security threats. At the same time, integration is also a trend. In industries with low security requirements, there will be more and more demand for some comprehensive products, such as campus network.
Opportunities for domestic information security enterprises
In 2005, three factors will promote the development of domestic information security industry.
One is the informationization of enterprises and even the whole society. The client's demand for security will be higher and higher, and the demand for information security will be greater and greater.
The second is the leading and promoting role of the government. The publication of Document No.27 last year will inevitably directly promote the safety construction process of some national key information points and industries.
Third, increasingly mature security technologies and products. Before 2003, the technology of foreign security products was relatively advanced, but because of the high labor cost, it was difficult to serve customers personally and often needed to be solidified in the enterprise IT information system, so it was difficult to upgrade. In contrast, domestic products have a certain technical gap with them, but their service advantages are obvious; After 2004, the technical improvement of domestic information security products has been obvious, and the stability and reliability have been greatly improved. In addition, domestic products can often provide customized services, which will undoubtedly induce customers' enthusiasm for buying.
- Related articles
- Where can I pick grapes in Chongqing in 2022?
- Where is the license plate number of Ji G? Where is the license plate number of Ji G?
- How to write the notice that betel nut garden is forbidden?
- Japanese anti-Japanese slogan
- Ousheng Furniture Company Culture
- Slogan of corporate values
- Slogan for Father¡¯s Day promotion
- Summary and closing remarks of the property company
- 202 1 Many scenic spots in Hefei are temporarily closed to tourists from other provinces.
- Contents of handwritten newspaper for National Day and Mid-Autumn Festival