2014-06-12

China Will Announce Information Security Policy In Second Half

First related news:
China computer congress to highlight information security
The 2014 China National Computer Congress(CNCC) will focus on information security issues, the China Computer Federation announced on Wednesday.

The annual congress, from Oct. 23 to 25, will be held in Zhengzhou, provincial capital of central China's Henan. It will discuss information security challenges in the "big data" era and explore solutions, according to the federation.

The government is planning to unveil its information security policy later this year.
"信息安全装备国产化"下半年望打头炮
Sources revealed to the China Securities Journal reporter, in view of the urgent need to address the current information security issues, fired the first shot of the relevant policy is expected in the second half of this year. Currently, relevant departments are preparing the research and drafting of "information security equipment made" special support program.

  The source said, and had support for the integrated circuit industry compared to this policy is no longer covered by a particular technology node, the scope will be broader, and localization issues servers and routers will likely be the focus of the current round of research .

 Policy into the gestation period

  "Information security, software and hardware to achieve localization of core self-control," is to improve the national level to unprecedented heights. Analysts pointed out that, for the field of information security, the national level has been or will be introduced multiple measures, the market placed great expectations on the dividend policy.

  May 20, the central state organs of government procurement center notification requirements, the central procurement authority for all computer products are not allowed to install Windows 8 operating system; May 23, the news from the State Internet Information Office said, to safeguard national security, protect the legitimate interests of Chinese users, China is about to launch a network security review system, the system provides an important technology products and services to national security and public interest system used by the network security should be reviewed.
  
Sources revealed to the China Securities Journal reporter, the late-related information security policy is expected to be carried out, the second half of this year or kicks. Currently, the department is working on the drafting of the relevant research and related policies. The source said that the theme of this policy will be "Information security equipment inside," the fastest program will be drafted in the early fourth quarter, finished submitted to higher authorities.


  In response to this news, analysts said the China Securities Journal reporter Overall, this special action is still in the preliminary stages of gestation, the specific time to promote the progress remains to be seen. However, under the State-level information security attention background landing point in time relevant policies to move forward at a faster rate, is a high probability event.

  Or to focus on two areas
  Industrial and information security involves extremely broad, from upstream software technology to hardware manufacturers downstream were indeed affect the whole body, to choose which segments of the cut will be a major part of this special action. The sources said the China Securities Journal reporter, the current round of survey work, servers and routers are two areas where there is likely to be the focus.

  After decades of development, despite domestic and foreign leading hardware and software products is still a gap, but has been able to achieve useful levels available, including the wave of Tissot K1 server YHFT series of large-scale supercomputers, including a series of domestic the strength of the domestic hardware and software technology to meet the needs and meet the world.
 
 Control network router as the central part of the data flow, pre-"Cisco preset back door" incident caused great concern in the industry. Related reports that after prism door incident, relevant departments of the government, finance, telecommunications, electricity, energy, security, railway, military and corporate information systems, such as safety inspection, found a large number of network attacks espionage activities, a variety of mining Device "back door" or vulnerabilities. America's pre-Cisco routers are widely used in China, involving government, police, customs, taxation, financial and other critical sectors, and testing found that the presence of Cisco routers can be remotely controlled preset style "back door."

  It is understood that the router's main chip in the short term to achieve a comprehensive localization, there is still no small difficulty. But from a technical perspective, the implant is not limited to the main areas of the back door of the chip, including all aspects, including the motherboard are backdoor hotbed. How effectively through domestic means to effectively attempts to prevent the back door, it will be a very important issue.
 
 Since last year, with the go "IOE" voice gradually, the server has been in the field of localization speed. Lenovo will acquire IBM announced last year that the X86 server business this year, after the formal completion of the merger, the strength of domestic X86-based servers will be strengthened. Latest data show that, thanks to domestic alternatives, the first quarter of 2014, the domestic leading enterprise server wave of information ( 34.95 , 1.050 , 3.10% ) of server shipments reached more than 80,000 units, the market share of 19 percent, the highest in China market first.
 
 Industry consolidation trend
 
 The industry believes that, with the national level of information security industry will continue to follow the introduction of the policy, will have a more profound impact on the industry, the biggest trend in the industry is the integration of high-quality resources will enter the acceleration phase, the market will gradually towards more powerful Information security enterprises are concentrated.
 
 Since 2008, the domestic competition in the information security industry fragmented situation has changed, many of the industry's high-quality enterprises to enter into the capital market. There are information security professionals expected in the next few years, the gap between the first tier companies within the industry and the second-tier companies will gradually widening.
 
 Integrate information security industry is also quietly, take advantage of the products made by primitive accumulation and rapid development of the enterprise, the business began to expand its product line to enhance the overall solution capabilities, complementary acquisitions become an important means to gain a competitive advantage, and this momentum will continue. Lack of technical innovation, service capabilities and unique business model of the enterprise applications will be phased out, the number of small and medium manufacturers weaker competition will be significantly reduced, industry concentration will be further enhanced.
 
 Statistics show that China's information security market size of 200 billion yuan. In accordance with the laws of development of the industry, the future is bound to generate tens of billions of market capitalization.
 
 The sources also pointed out that at present, the downstream market competition in the field of information security has been very full, escort policy is only one aspect of domestic enterprises in product quality and price are still many tough need to deal with.

No comments:

Post a Comment