RK | enterprise | new | stable | city | Comprehensive |
---|---|---|---|---|---|
1 | Huawei | 95.37 | 95.59 | 95.89 | 95.62 |
2 | Convinced | 94.67 | 95.43 | 95.98 | 95.36 |
3 | Tianrongxin | 94.91 | 94.78 | 94.73 | 94.81 |
4 | Blue shield | 93.55 | 95.86 | 93.89 | 94.43 |
5 | Meyerbaaceae | 93.46 | 92.25 | 96.24 | 93.98 |
6 | Qi Anxin | 93.79 | 92.67 | 94.02 | 93.49 |
7 | Anheng Information | 92.34 | 93.01 | 93.98 | 93.11 |
8 | Hillstone Net Branch | 91.76 | 93.76 | 92.64 | 92.72 |
9 | NSFOCUS | 91.29 | 91.42 | 94.67 | 92.46 |
10 | Ali | 91.08 | 93.32 | 91.69 | 92.03 |
11 | Westone | 91.46 | 90.26 | 93.66 | 91.79 |
12 | Three six zero | 90.86 | 90.98 | 92.28 | 91.37 |
13 | New H3C | 90.44 | 91.12 | 92.12 | 91.23 |
14 | Venus Star | 90.41 | 90.88 | 90.98 | 90.76 |
15 | Tencent Security | 90.02 | 90.48 | 91.46 | 90.65 |
16 | Ambton | 90.32 | 90.65 | 90.12 | 90.36 |
17 | Bang Bang Security | 89.98 | 90.75 | 89.63 | 90.12 |
18 | JD Security | 89.85 | 89.23 | 90.18 | 89.75 |
19 | DP Technology | 89.72 | 89.13 | 89.79 | 89.55 |
20 | Kita Shingen | 89.01 | 88.55 | 90.59 | 89.38 |
21 | Zhongfu Information | 90.44 | 87.36 | 89.76 | 89.19 |
22 | Li Sichen | 88.76 | 87.11 | 90.65 | 88.84 |
23 | ZTE | 89.41 | 87.69 | 89.04 | 88.71 |
24 | Xin’an Century | 89.59 | 86.64 | 89.25 | 88.49 |
25 | Zhongke Jiangnan | 89.35 | 86.68 | 87.84 | 87.96 |
26 | Telecom Cloud Bank | 87.75 | 88.01 | 87.56 | 87.77 |
27 | Geer Software | 87.63 | 86.73 | 88.26 | 87.54 |
28 | Dongfangtong | 87.89 | 87.14 | 86.69 | 87.24 |
29 | Masamoto Yoshidai | 86.97 | 87.45 | 87.02 | 87.15 |
30 | Youxuan Software | 87.42 | 85.94 | 87.39 | 86.92 |
31 | Digital authentication | 87.38 | 86.41 | 86.33 | 86.71 |
32 | NetEase Easy Shield | 86.02 | 86.94 | 86.55 | 86.50 |
33 | Kolai | 85.72 | 85.77 | 87.64 | 86.38 |
34 | Feitian Integrity | 86.29 | 85.29 | 87.04 | 86.21 |
35 | Ren Zixing | 85.74 | 86.14 | 86.25 | 86.04 |
36 | Hengan Jiaxin | 85.91 | 86.03 | 85.39 | 85.78 |
37 | Love encryption | 85.71 | 85.05 | 85.17 | 85.31 |
38 | Ming Dynasty Wanda | 85.25 | 84.29 | 85.79 | 85.11 |
39 | Know Chuangyu | 85.87 | 83.94 | 85.06 | 84.96 |
40 | Liansoft Technology | 83.49 | 85.16 | 85.02 | 84.56 |
41 | Byzoro | 83.77 | 84.26 | 84.21 | 84.08 |
42 | Neusoft Security | 83.97 | 83.54 | 84.27 | 83.93 |
43 | Ever sincere | 83.45 | 83.02 | 84.61 | 83.69 |
44 | Metron Technology | 82.95 | 83.71 | 82.11 | 82.92 |
45 | Qingteng Cloud Security | 82.27 | 81.07 | 83.91 | 82.42 |
46 | Easy to know | 81.99 | 82.66 | 82.13 | 82.26 |
47 | Toll shield | 83.18 | 81.62 | 81.53 | 82.11 |
48 | Sky Guardian | 82.57 | 81.06 | 81.43 | 81.69 |
49 | Anshin Tenkou | 81.64 | 81.25 | 80.85 | 81.25 |
50 | Winut | 81.65 | 80.68 | 80.77 | 81.03 |
A few years ago, the first domestic network security themed TV feature “The Fifth Space”, through the three chapters of “A Time of Transparency”, “Secret Threats” and “Real Contest”, corresponding to the three dimensions of individual, society and the country , Presented a relatively shocking network security investigation report for the people of the country.
It can be said that the “fifth space” is like a double-edged sword, bringing unprecedented development opportunities to mankind. At the same time, many challenges also follow. The recent series of events and the new policies introduced have made the development of cyber security even greater. Become one of the focal points.
The rapid development of information and communication technology, or in the Internet era, has made every individual with different attributes (such as cities, enterprises, social groups, and individuals) become “transparent”. Privacy is the most “secret corner”, but the issue of information protection is the “corner” that has been forgotten.
Regarding the description of the characteristics of digital cities, digital cities have some characteristics, such as: everything is programmable, everything must be interconnected, big data drives business, etc., in the final analysis, it is a software-defined city, and the urban architecture is based on software.
“Everything is programmable” means that loopholes are everywhere. Every system that supports a city will inevitably have loopholes. When there are loopholes, there will be attacks. For example, the power outage in Ukraine five years ago had a greater impact on urban development. For another example, the information system of Hunan Children’s Hospital was attacked by hackers three years ago, which caused the in-hospital diagnosis and treatment process to fail to operate normally. For another example, the major oil pipelines in the eastern United States were recently attacked by hackers, causing 17 states in the United States and the District of Columbia to enter a state of emergency.
“Big data drives business” means that data security has never been more important to the operation of a city. Once data is attacked, it means that the business stops, causing serious economic losses and social consequences. For example, after the Iranian railway system was attacked by hackers on July 9, the computer system of the Ministry of Roads and Urban Development of Iran was attacked on the 10th, causing several official websites to be paralyzed.
When the entire city is built on data, network security is a particularly important infrastructure. It is necessary to plan the city’s digital construction and network security construction simultaneously to create a safe base for escorting digital cities and smart cities.
Recently, Didi, which has just been listed on the New York Stock Exchange, ushered in a cybersecurity review by the Cybersecurity Review Office of the Cyberspace Administration of China. The focus of the review is mainly on the national security risks that may arise from the procurement of network products and services by key information infrastructure operators, and data security is the top priority. Immediately afterwards, a series of domestic applications “Yunmanman”, “Truck Gang”, and “BOSS Direct Employment” have also received cyber security reviews.
This round of intensive review of relevant parties once again proved the importance of basic data for national information security. Data security has become a major issue related to national security and economic and social development.
With the development of information technology and changes in the network security situation, the requirements for security protection have shifted from focusing on passive defense to establishing an active security system.
The relevant laws and regulations in the field of network and data security in my country are constantly improving, and data security has risen to the level of national security, and the level of network security protection will usher in new and higher demands.
On July 12, the Ministry of Industry and Information Technology issued the “Three-Year Action Plan for the High-Quality Development of the Cybersecurity Industry (2021-2023)” (Draft for Solicitation of Comments). Among them, it is proposed that by 2023, the scale of the network security industry will exceed 250 billion yuan, with a compound annual growth rate of more than 15%.
The gushing network security demand will lead to a new sunrise in the network security industry. The test of industry enterprises is not only technology, but also attitudes or values.
.