Four Trends In Pparent Document Encryption
Foreword: data security has been paid more and more attention by government, army, military units and enterprise users.
Various types of encryption software have been gradually used, to a certain extent, reduce the risk of data leakage, and play a role in protecting data security.
However, data leakage is not just an encryption software, but it can solve the problem.
The improvement of information level and the increase of data leakage risks coexist. Users have already put forward more, higher and higher demands on data security. Only by grasping the needs of users can we clearly see the future of pparent encryption industry.
Transparent encryption is just the beginning.
Since 2002, a software industry that aims to encrypt core data and prevent insider leaking has begun to rise and develop rapidly. This is often referred to as the "electronic document security industry", or "encryption industry".
The encryption industry usually adopts pparent encryption technology to enforce mandatory, real-time and pparent encryption of different types of electronic documents, and protect them from the whole process of file creation, storage, use, circulation and destruction.
Even if the document is lost to the outside, it can not be opened because of encryption, ensuring that core secrets are not leaked.
This industry is often referred to as the "pparent encryption industry".
Encryption software has been widely used.
In China, a large number of users, such as government, army, military industry, manufacturing industry, communication industry, R & D and design industry, have adopted encryption software.
A group of influential users such as the Ministry of foreign affairs, the Jiuquan satellite launch center, the Second Artillery Force of the people's Liberation Army, China Mobile group, CHINT group, BYD, Chinese communications, and BOE, etc., after using encryption software, have very high evaluation of the encryption software.
There are also a large number of encryption software companies headed by a large number of Beijing Internet company, which is estimated to have nearly 300.
From the sales situation, the encryption industry was less than 100 million yuan in 2006, and it reached 110 million yuan in 2007. In 2008, the estimated total market will reach 170 million yuan, which is expected to reach 380 million yuan in 2010.
The annual growth rate of encryption software market is over 50%, and sales account for 6.34% of the total information security market.
Although the development of encryption software industry is booming, encryption software is only one of the core components of data leakage protection. It is impossible for encryption software to assume all functions of data leakage protection.
From the perspective of the development of information security, encryption software is only the beginning of data security.
One of the trends is:
Intelligent dynamic encryption and decryption
Will become the development direction of encryption software.
There are two ways to encrypt the encryption software. One is automatic, compulsory and pparent encryption. The other is manual encryption. The latter is mainly determined by the content of the document's author or document administrator to encrypt the documents manually.
Although the two encryption methods satisfy the needs of users to some extent, they are not the final solution.
For users, encryption software also needs the following functions:
1, the system automatically identifies the contents of the document and determines whether it belongs to the classified document. This is because, for mandatory encryption software, only file types are encrypted.
The encryption for file types will encrypt all types of files, but the core data of most enterprises only account for 5% to 10%. If you want to encrypt files of the file type, there must be a large amount of decryption work when the files need to be sent to the outside world. This will reduce the work efficiency. If you use second encryption methods and manually encrypt, you will not be able to prevent the author or file administrator from divulging the documents before encrypting them.
2, the system automatically encrypt documents that are classified as classified. For manual encryption, encrypted files can only ensure that the next user of the document will not divulge secrets, but can not prevent the document's creator or document manager from divulge.
To prevent manual encrypted leak, encryption software must have the function of automatically encrypt confidential documents.
Integrating the functions of the existing encryption software and the needs of users, the existing encryption software still can not fully meet the needs of users, so the next generation of encryption software should be intelligent and dynamic encryption software.
{page_break}
Trend two:
Document encryption will integrate with the functions of document storage, backup and disaster recovery, and become the overall solution of document management.
Symantec CEO John Thompson said: "I believe we will find that the boundaries between archiving, backup and disaster recovery are getting blurred."
He added: "the individual products you purchased in the past will come together. As a whole solution, you will have better performance and will enable you to manage your information more effectively."
Mr. John Thompson's prediction is correct, but there is still one missing point, that is, document encryption.
Document encryption will also be integrated with document archiving, backup, disaster recovery and other functions into a document management overall solution.
Document encryption and backup of documents and disaster recovery are the same as solving data security problems. Therefore, backup and disaster recovery of documents have natural affinity with document encryption.
Under the new security threat situation, content based deep security analysis has become a hot topic of data security at present, including depth analysis based on feature matching and content analysis technology based on behavior recognition.
From the creation, use, circulation, storage and destruction of the entire life cycle of documents, it inevitably includes the protection of documents.
The means of document security protection can be subdivided into: document encryption processing, document backup, document storage management, document disaster recovery and so on.
Judging from the current market applications, for small and medium users, it is still the majority of users who purchase encrypted software separately.
But for large enterprise users, generally do not directly purchase encryption software, but through the system integrator, corresponding to the entire document management needs, to develop a complete document management solution.
In the long run, the integration of document encryption and document management is a big trend.
Trend three:
Encryption software is integrated into the data leakage protection (DLP) system and becomes part of the DLP solution.
The basic idea of early encryption software is to encrypt the core documents, control the use of documents from the source, and prevent disclosure.
However, with the development of information technology and management concepts, the single encryption function can no longer meet the needs of current users.
Many encryption software vendors are still at a fairly elementary stage in the product design concept. They consider the encryption software as a product only, and think that as long as the function of the encryption software is more complex, the stability and security will be higher enough.
However, judging from the trend of the development of information security, this idea is rather primitive.
{page_break}
In terms of information security management, the concept of multi-level protection is already the mainstream.
In many areas of a network, layered protection of various schemes is usually adopted to ensure information security. This method can avoid the failure of single point security defense.
Although the encryption software combines the functions of authentication, permission management, automatic backup, log audit and so on, it already has the rudiment of hierarchical protection. However, from the products in the market, these functions are relatively simple and have not been thoroughly done.
From the perspective of international and domestic information security vendors, the integration of document encryption software into data leakage protection (DLP) system has become the mainstream.
This can be seen from the increasing tide of mergers and acquisitions among foreign information security vendors.
Sophos acquired Utimaco, McAfee, a German data security company, and bought SafeBoot last autumn.
At home, China's earliest encryption software company and leader, Beijing Internet company, also foresaw this trend, and rapidly developed its product line since 2007. From a simple encryption software company, it has become the first provider of the overall solution provider of data leakage protection products in China.
Trend four:
With the wide application of virtualization technology, data leakage protection (DLP) will become the best solution for data security.
Virtualization
It is the pformation of physical resources into logically manageable resources, breaking the barriers between physical structures, and physical resources running pparently on all kinds of physical platforms. The management of resources will be carried out in a logical way, thus fully realizing the automatic allocation of resources.
Virtualization is the trend of IT, including server virtualization, storage virtualization, network virtualization, terminal virtualization, desktop virtualization, and so on.
Encryption software
Most of them use C/S framework to encrypt documents on physical location such as hosts, servers and terminals.
Virtualization technology will have a huge impact on encryption software, first of all, the virtualization of terminals.
Because the terminal no longer stores documents, all documents will be stored on the virtual server. The documents operated by the terminal are only virtual image files, so they do not need to manage the local documents.
The influence of storage virtualization is more direct.
Virtual storage will store the document in a virtual area, no longer stored like the old one or uploaded to the server.
Network virtualization will make great changes in the way of document circulation. The virtualization of servers will make the storage location of documents more disorder.
Taking all these factors into account, the document management and encryption software in the era of virtualization will be useless, instead of data leakage protection (DLP).
DLP is a complete data security protection system. It will intelligently filter documents, distinguish documents from secret or ordinary documents, and then encrypt confidential documents automatically, compulsorily and pparently.
In the creation, use, pfer and storage of documents, the technology of "tracking encryption" will be adopted.
At the same time, DLP will prevent illegal users from connecting to virtual servers through effective terminal management, network boundary management, e-mail management and network access management, and prevent secret information from illegally exporting internal networks.
And when confidential documents are pferred to the internal network, they can also manage classified documents.
- Related reading
- Industrial and commercial tax | Ministry Of Commerce: China'S Rare Earth Export Quotas Will Not Drop Sharply In 2011.
- travel arrangement | Outbound Travel With Caution
- Industrial and commercial tax | Ministry Of Commerce And Industry: China'S Textile And Apparel Trade Is Still Facing Many Challenges.
- travel arrangement | Health Tourism Starts On The Road
- Industry stock market | November 3Rd International Financial Media Headlines
- travel arrangement | Guide To Travel: Health Exercises To Help You Relieve Fatigue
- Industrial and commercial tax | The Two Sector Issued A Tax Policy To Support Employment Promotion.
- financial news | Central Bank: Continue To Implement Moderately Loose Monetary Policy &Nbsp; Pay Attention To Inflationary Pressure.
- Local hotspot | Labor Shortage Plagued PRD Footwear Enterprises, The Boss Looked At The Single Sigh.
- travel arrangement | Beauty Knowledge In Tourism
- Chinese And Foreign Forklift Trucks Will Gather At Shenzhen Logistics Equipment Exhibition.
- A Woman Must Have A Bag 02 A Year.
- 100 Thousand Dollars Per Second Advertising Business.
- Women Must Have Bags A Year.
- Status Of Document Management In Knowledge Management
- Fashion Shop Lady _02
- Interview With General Manager Li Jianxiang Of Guangzhou Step Sky Shoes Co., Ltd.
- Differences Between Knowledge Management And Document Management
- Beautiful Beauty &Nbsp; 20110310 Fashion Shop Lady, _01
- Using Bi Culture Talents To Improve Enterprise Performance