(ChinaIT.com News) Recently, the “Commercial Cryptography Application Security” roundtable dialogue jointly created by Tsinghua Unigroup’s New H3C Group and the vertical network security media Shushuo Security was launched. Tan Xiaosheng, Chairman and Founder of Beijing Saiboyingjie Technology Co., Ltd., Jiang Hai, Chief Engineer of the National Information Technology Security Research Center, Wang Yan, Director of Government Enterprise Cloud Technology of China Mobile Beijing Branch, Wang Qiyong, Chief Technology Officer of New H3C Information Security Technology Co., Ltd.commercial cipherIn-depth discussions on hot topics such as the current status of the industry and future development trends. Wang Qiyong shared H3C’s exploration and achievements in commercial encryption construction, providing new ideas for building a network security system for all industries.
Opportunities and challenges coexist in the commercial encryption industry
In recent years, relevant laws and regulations such as the “Network Security Law” and “Data Security Law” have been promulgated. From July 1, the newly revised “Regulations on the Administration of Commercial Encryption” was officially implemented, and the security assessment of commercial cryptography applications was officially changed from “recommended” to “mandatory”. The importance of commercial cryptography construction has been pushed to a new height.
Driven by the promotion of various policies and the new trend of network security such as big data and artificial intelligence, the application of commercial encryption in finance, government affairs, telecommunications, Internet and other fields continues to deepen, ushering in opportunities for rapid industrial growth. Statistics from Shushuo Security’s commercial data platform show that since 2020, my country’s secret reform and secret review market has maintained rapid growth. In 2022, the market size of secret reform and secret review will be about 4.2 billion, a year-on-year increase of 91.3%. Among them, the number of government industry project procurement accounts for 49% of the secret reform and secret review market.
In stark contrast to the rapid development of the commercial encryption industry, various industries still face many difficulties and challenges in the promotion of commercial encryption.Wang Qiyong, Chief Technology Officer of H3C Information Security Technology Co., Ltd. said, “First of all, it isAwareness problemAt present, some enterprises have not fully realized the importance of commercial passwords in maintaining data security; secondly,data problemAt present, there are still many industries that do not have a clear classification of their own data assets, and cannot accurately match commercial encryption products; finally, it isperformance problem, the deployment of commercial ciphers involves the transformation of the original system of the enterprise, the engineering volume is relatively large, and it will cause a certain loss in performance, thus affecting the stability of delay-sensitive services. “
How to provide high-performance commercial encryption products and solutions has become a difficult problem that industry manufacturers must overcome.
Safeguard the first line of defense
As an innovator and leader in the field of network security, New H3C Group has built an integrated cloud-on-cloud commercial encryption security system based on customer application needs, and provides full-process password security services from planning to operation and maintenance, including password security consulting, password construction guidance, secret evaluation process and result control, etc., and ultimately ensures that password applications are correct, compliant, effective and safe, and build a solid foundation for users.
Talking about H3C’s commercial encryption application security assessment solution, Wang Qiyong said that H3C conducts unified planning and design based on dimensions such as physical and environmental security, network and communication security, device and computing security, application and data security, key management security, and password management system. By building basic password resources and cloud-based password resources, the legality, compliance, and password application security of user local and cloud-based business system password construction can be realized, and the security and compliance experience of the entire process of commercial password application can be satisfied. Through the H3C password resource pool, it can realizeCryptographic service virtualization, integration, centralization and visualizationThe ability to deploy cryptographic cloud to solve the demand for cryptographic services of cloud applications.
Relying on the full-stack digital capabilities of H3C Group, H3C’s password transformation planComprehensive integration of cloud-network-security-secret, fully cloud-based high-reliability password strength, architecture compliance design, professional and caring secret evaluation consulting teamand other significant advantages to help industry customers build the first line of defense for safety.
Comprehensive integration of cloud-network-security-secret:The base cloud platform, network resources, computing resources, and storage resources have been docked with encryption products. They have national secret capabilities, provide a variety of password security services, and form the ability to integrate “cloud-network security”, bringing users money-saving, time-saving, and trouble-saving security experiences.
Fully cloud-based and highly reliable encryption strength: The cloud password unified service platform fully covers the four dimensions of “operation and maintenance, tenants, supervision, and operation” from the perspective of cloud operations; the full range of password service capabilities fully cooperates with core functions such as signature, SSL offloading, unified identity authentication, and certificate authentication.
Architecture compliance design:Based on the standard design of GB/T 39786-2021, the system construction resources are optimized and deployed, and it can be easily implemented to meet the needs of users for one-time private evaluation.
Professional and considerate private review consulting team:With experienced and certified secret reviewers and a professional secret review plan delivery team, we provide professional secret review services throughout the process, from pre-renovation assessment, to business classification, to transformation implementation and operation.