Current location - Loan Platform Complete Network - Big data management - Big data three six zero
Big data three six zero
Text/assistance

Edit /gale

"Our opponents are not peers and friends, but a group of hackers with high IQ and national cyber warfare forces ..."

"Some people don't agree with me, and it doesn't matter if you spray me directly, but I hope we can openly discuss how to take the road of network security every year."

"360 was a free antivirus at first, but later young people just wanted to kill their opponents ..."

On July 27th, at the annual Internet Security Conference (), the long-lost founder and chairman of 360 (60 1360) Zhou. SH, hereinafter referred to as "360"), it seems difficult to equate it with the "red cannon" in the impression, so that some participants began to talk: Lao Zhou seems shy. Compared with those golden sentences that can be frequently exposed to "gunpowder" in the past, I feel that he has kept a low profile this time.

Zhou pointed out: "360 wants to realize a dream, that is, to open up the security brain system of various industries in various places, form mutual query of threat intelligence and data, build a national distributed security brain, and truly improve the security capability of the whole country."

When the muzzle of the "red cannon" is no longer aimed at peers, it will undertake the construction of national network security and resist foreign attacks with an open mind. What cards will Zhou and his 360 play this time?

"Our employees in this industry, like Sisyphus in Greek mythology, work hard to push the stone up the mountain every day, and the stone falls off the next day. Working in this industry will go from success to failure and then from failure to success. "

I never imagined that Zhou, who dared to go to heaven and earth, became rational. In his view, people who persist in this industry are idealists.

Today's security industry makes Zhou feel particularly difficult. Compared with other industries, the biggest feature of this industry is that it does not solve static problems, and the way of eating all over the world is not applicable. He has repeatedly stressed that the current opponents are no longer peers, friends, thieves and hackers, but a group of hackers with high IQ and national cyber warfare forces.

Nowadays, the network security environment is changing, and the network security threat will surpass the traditional security threat and become the biggest threat in the digital age. From last year to the first half of this year, major cybersecurity incidents occurred frequently around the world, and various attacks such as supply chain attacks, blackmail attacks, industrial control equipment attacks, APT attacks, and data theft emerged one after another. Cyber attacks have also become a hot topic of confrontation among great powers. In the future, cyber forces, APT organizations and organized cyber crimes under the national background will become the biggest threats to cyber security. The target, mode and degree of destruction of cyber attacks will break through the convention, and the threat will continue to escalate to the high end.

Zhou summed up three characteristics of digitalization: everything is programmable, everything must be interconnected, and big data drives business. The essence is that software defines the world, and cities, cars and networks will all be defined by software, which also means that security risks are more ubiquitous and the whole world is more vulnerable to attacks.

Therefore, no matter from ordinary people's eating, drinking, clothing, housing and transportation, the government's operation of social management, to the operation of cities, digitalization has made the whole environment more fragile.

For the increasingly severe network security environment, Zhou believes that there is no need for manufacturers to fight for who is the first brother now, because when other countries launch cyber attacks on China, it is meaningless if manufacturers can't help the country solve the problem, even if sales and profits reach the first place.

"You can't treat this industry as an industry that sells goods, because from the perspective of selling goods, you only need to sell it to customers. It's not important to see cyber attacks. But now cyber warfare is happening all the time, and it is no longer quiet. The most important task of a network security company is to protect the national network, "Zhou said.

Zinc Finance noted that Zhou said more than once that "the years are no longer quiet". In fact, since Zhou committed suicide and entered the anti-virus market, his 360 has never stopped. Even after the big wind and waves, they are still lamenting that "the years are no longer calm." Zhou is really shy. However, after leaving behind the personal struggle between enterprises, Zhou has a sense of mission to defend the national network and is more stable.

It is not enough to rely solely on the feelings of home and country, nor can it lack its own hard power. Zhou is very confident about this.

"Any hacker who wants to do bad things in China will take the 360 knife. The practical experience of being in the front line of attack and defense all the year round makes 360 a line of defense that hackers all over the world can't bypass." Zhou said to him.

According to him, although 360 became a monk halfway, it used to be a search engine and found attacks through search. There are two main types of attacks, one is the code running secretly in the background of the computer, and the other is the code networking secretly in the background. When the equivalence reaches a certain level, you can clearly see what is happening on the network. It can be said that 360 is the first company to collect safety behavior data in the cloud for analysis.

But big data alone is not enough. The most important thing is to understand the attack. At present, 360 users exceed 65.438+0 billion, forming the largest attack knowledge base in the world.

"Hackers want to kill 360,360 and wonder how not to be killed. We now have an in-depth understanding of the attack methods of cyber forces around the world. " In Zhou's view, our hard power needs actual combat experience. If you haven't seen how others attack, your product is behind closed doors.

All can have such confidence, can not be separated from years of sustained high investment.

It is reported that 360 invests 2-3 billion yuan in core technology research and development and high-level team building every year, and has invested tens of billions in the past decade. It is the company with the largest investment in Internet security in China. At present, the total storage capacity of 360 secure big data exceeds 2EB, and the increment exceeds 1.5PB/ day. It has 2 10 data centers, more than 200,000 servers, 1 10,000 CPU cores, 2300g export bandwidth, and handles 200 billion logs every day, with an annual maintenance cost of 500 million.

In addition, 360 has accumulated a unique attack knowledge base and knowledge sample base in the world. The total number of sample files reached 30 billion, increasing by10,000, and a team of 200 security elites and more than 3,800 security experts was built.

At present, 360 * * * has captured hacker organizations in 46 countries abroad, and monitored more than 3,600 attacks involving more than 20,000 targets. In the first half of this year alone, 360 captured 12 APT organizations that attacked China, including two organizations that were first discovered: Wuqiongdong and Pseudo Hunter.

All kinds of data show that years of huge investment have enabled 360 to practice world-class security capabilities. However, there are also difficulties.

Advertising revenue has always accounted for the bulk of 360' s total revenue. According to the company's 2020 financial report, the income from Internet advertising and services was RMB 756,543.8+0.2 million, accounting for 64.78% of the main business income.

In this regard, Zhou said without hesitation: "360' s business model is quite strange, and it has always earned the lowest advertising fee. It's a bit like waiting for the door to dive into the sea. Some actions are too radical, so there are many advertisement pop-ups. "

In order to return to the original heart, starting from the user experience, 360 security guards officially released the extremely fast pop-up advertisement on July 28, adding functions such as network security and data security. At the same time, 360 once again emphasized the commitment to users' permanent free.

On the other hand, in the past two years, 360 is also trying to transform and explore more profit models other than advertising, such as party, government and military enterprises. It is reported that 360 established the Government-Enterprise Security Group on 20 19 to provide security services and secure data positioning services for large enterprises and governments, and get rid of the dependence on the advertising model.

The financial report shows that in 2020, 360 security and other business income was 808 million yuan, a year-on-year increase of 70.73%, and the high growth trend showed the effect brought by the transformation.

Under the background of digitalization, the network security industry has been redefined and needs new tactics and new framework.

According to Zhou, 360' s new tactics will be guided by "thinking of fighting, confrontation, attack and defense", integrating the security system with the digital system, and integrating the ability of attack and defense with the ability of management and control. In his view, since it is a war, it is unrealistic to win only by a single weapon. What is needed is a systematic combat capability. "If we sell a lot of products to users with the idea of selling goods, but having products does not mean having the ability and fragmentation is very serious, then how to form a systematic operation is very important."

The main function of the new framework is to provide a reference framework for the party, government, army and enterprises to build their security capabilities. Specifically, the new generation security capability framework includes four parts: first, the security brain of regional/industry/enterprise headquarters; Second, the security infrastructure system; Third, an emergency system operated by security experts; Fourth, the security basic service authorization system.

Zhou said that the biggest difference between the current security industry and other industries is that it does not kill friends, but unites to form ecological development.

So, what is 360' s dream? "The positioning of 360 is to do radar. Others are anti-aircraft guns, anti-aircraft missiles, or other weapons and equipment. After my radar detects suspicious attacks, it will transmit the data to them through data links and threat intelligence, so that everyone can form a coordinated defense. " Zhou said to him.

He said that 360 hopes that based on the new generation security capability framework, it can open up security brain systems in various places and industries, form mutual query of threat intelligence and data, build a national distributed security brain, and truly improve the security capability of the whole country.

No longer aim at doers, but concentrate on defending the enemy with peers. Zhou keeps a low-key and open mind. He understands that 360 must be upgraded in order to fight the cyber security war in the digital age. Perhaps, when the muzzle of the whole industry is really consistent with the outside world and needs a protagonist, Zhou is still that week.