See Qingyun Security Development Ecology

See Qingyun Security Development Ecology

Due to the advantages of high security, high reliability, ease of use, easy maintenance, and low cost brought by cloud security, the industrial market and the civilian market have shown strong demand for the "cloud." Especially under the traction of the government, public security, transportation and other industries have successfully landed the case. The civil security market is a “gold mine” to be mined, naturally attracting many leaders, then in the cloud security, this game How many future nuggets will fall?

Over the past ten years, in the security market, with the large-scale construction of high-definition video surveillance systems in various industries, and the traditional security industry is facing the transformation of IP and high-definition, the construction scale of security projects has been increasing day by day, and it has brought a tremendous amount of Video data. According to IHS, the amount of data generated by the global video surveillance in 2011 exceeded 1500PB per day, and IDC expects that the total amount of global data storage will reach 40ZB by 2020 (1ZB = 1 billion TB).

In addition, the user's needs are gradually upgraded from the basic security requirements to management and application. In summary, traditional security technologies are increasingly difficult to meet the needs of transmission, storage, intelligent analysis based on big data, etc. Cloud storage and cloud computing are needed as technical support to build a more cost-effective, flexible, scalable, and more reliable system architecture. Bring benefits to users.

After entering the Internet era, cloud applications in various industrial markets have become more and more popular. Common users have already experienced the influence of various cloud technologies and cloud services in a subtle manner. The demand is no longer simply confined to hardware devices, but is transformed into The needs of various services, sharing, and experience.

Every technological change in the security market will activate the new round of development potential of the security industry, and it will also pose challenges for security companies. It can be said that with the integration of IT technology and the security industry more and more closely, and the era of cloud security has arrived.

First, the cloud security market "nurse"

Due to the huge market potential, large and small companies all hope to make the "cloud" reach the user market. These need the seamless cooperation of various types of companies: chip manufacturers, traditional IT companies, Internet companies, operators, and security companies.

From the perspective of the entire supply chain, with the improvement of technology supported by chip vendors in terms of data support, traditional IT companies and Internet companies have greatly promoted the deployment of cloud applications. The troika represented by IBM, Oracle, and EMC has quickly driven the application of cloud technology in various industries. At the same time, we have also seen local companies representing Huawei more actively deploy cloud applications.

Due to the different genes of several major players, seizing the “Blue Ocean” of the cloud security market has its own advantages and disadvantages.

Huawei's video surveillance service product planning expert Zhou Yuguang said: "As the security market gradually moves into the cloud era, new technologies such as cloud computing, cloud storage, and big data are becoming more and more important. This process requires related virtualization technologies, clustering technologies, and storage technologies. The accumulation of distributed technologies has pushed up the technical threshold, and it can be said that companies with IT technology background will have certain advantages."

In addition to IT companies, Internet companies are also actively deploying the cloud security market, such as Baidu launched a small degree i-view camera, based on Baidu cloud to provide the public with audio and video surveillance services. This is also the biggest advantage for Internet companies in terms of their ability to integrate and operate.

However, security companies know more about the business, more clearly the needs of users, can provide customized products and solutions, and have advantages in hardware product manufacturing and application development. Security companies represented by Yushi, Kodak, and Liwei actively launched cloud security solutions.

Therefore, in order to promote the development of the cloud market, all parties need to cooperate. For example, security companies do not apply IT technology deep enough and can be deeply complementary with IT vendors in terms of technology and business. Huawei Zhou Yuguang further said: "Big IT companies can push standardization or generalization of the application of hardware and software products, the lack of such professional security experience and products, cloud computing and security landing, certainly need IT vendors and security vendors Cooperation.” If Intel has already cooperated with security companies such as Hikvision, Dahua, Pokcon and others, it has launched an intelligent digital surveillance solution based on Intel architecture.

Second, the cloud era will create a new security ecosystem?

From the perspective of changes in the industrial chain, the rise of the cloud market will certainly have some impact on the original ecological chain of security. Huawei Zhou Yuguang believes that: "The development of cloud security, security cloud operators occupying the core value of the industrial chain will occupy a leading position. Combined with the Internet model, the business model of equipment sales in the industry will be transformed into service sales and equipment. Supplementary sales, or provide pure security services, VSAas, VPaas, VIaas and other services will coexist." Cloud operators are not limited to traditional operators, including Internet companies and so on.

The arrival of cloud security has particularly affected companies that lack core technology. Song Yuanwu, Demand Director of Shenzhen Zhongxing Liwei Technology Co., Ltd., said: “Cloud Security will have a greater impact on small and micro security companies. In the foreseeable future, the security industry will reshuffle. Internet companies with 'cloud' genes will With more advantages, eventually some of the traditional IT companies and Internet companies that have survived will also be assimilating."

In response, Wu Zhenwei, general manager of Haiwei Yunwei Technology (Shenzhen) Co., Ltd. holds a similar view, he believes that the security chain of Yunan Security should be subversive to the traditional security, the future security companies, Internet companies in this different industries The concept will become more and more blurred.

Lin Qing, the deputy general manager of cloud security technology division of Tongfang (Shenzhen) Cloud Computing Technology Co., Ltd., expressed another point. "After the cloud security, the original pattern may not be subverted. However, the concept of security will produce various extensions, or security may become a subsystem of a large-scale system, integrated with other industries, security is no longer An independent and closed industry."

Second, after entering the cloud era, the most critical is the operating model. Adopting the cloud operating model will significantly reduce the user's threshold, and therefore it will be more easily accepted by the civilian market. In this regard, the advantages of Internet companies and operators will be even greater.

Under this circumstance, how do security companies and Internet companies grab the largest cake in front of them? Tongfang (Shenzhen) Cloud Computing Lin Qing believes that when the concept of security is continuously expanding, there may be two situations: One is a security company In the process of transformation, security companies understand hardware products and know how to control manufacturing, even though they lack Internet thinking. However, by gradually accumulating IT-related technologies and platform construction, I believe there will be more advantages. Therefore, I am still very optimistic about the model of Hikvision; the second kind of Internet companies like Baidu have huge terminal data. Accumulated in the operating platform, but not familiar with the hardware, even through the integration of mergers and acquisitions, in the short term it is difficult to quickly grasp the core of the hardware, need to go a long way. ”

Moreover, from the perspective of the entire market, although the market has great potential, there are still many obstacles and challenges that need to be resolved to promote the development of cloud services. Xie Huibin, vice president of R&D of Zhejiang Yushi Technology Co., Ltd. summed up that “Cloud is the future of security, but there are still a lot of things to do to build security on the cloud. One is the business model problem. A good business model can promote the cloud. The development of the market, otherwise everything is futile; the second is the management and scheduling of the entire cloud resource; the third is information security and privacy issues, data leakage has become the biggest concern of consumers in the Internet era, can win public trust, this is very important."

In any case, in the long run, "because the cloud technology has obvious technical thresholds, if the traditional security companies cannot adapt to the trend of cloudization, they must be marginalized. In the benchmarking market, the mainstream market will gradually disappear," Suzhou Keda Technology shares Nie Ji-min, director of the company's monitoring product line solution department, said that "professional security companies with IT backgrounds are more likely to accumulate advantages in the industry market." Therefore, security companies that want to gain more market share in the industry market need to reserve more Cloud technology.

Food Additives Refers to the production of food by the food manufacturer in the process of adding some chemicals, used to change the color of food, smell, or adjust the food taste and prolong the preservation time (preservatives, antioxidants), but some will Leading to cancer, such as many of the meat material added by some of the substances in the stomach due to protein, stomach acid, additives generated by the interaction of nitrite, can lead to physiological and chronic lesions. These chemicals are known as food additives.

Food Additive

Food Additive,Natural Food Additive,Isolate Food Additive,Popular Food Additive

SHANDONG ZHISHANG CHEMICAL CO.LTD , https://www.zhishangchemical.com