2024-09-25
한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina
recently, idc, a leading global it research and consulting company, released the "idc marketscape: china zero trust network access solution 2024 vendor assessment" (doc#chc51540924, september 2024) report, and sangfor technologies was once again ranked in the "leader" category.
in recent years, more and more users have begun to gradually build zero-trust network access systems to solve the problems of dynamic access control and unified security management of enterprises, thereby helping them improve the overall security protection level. china's zero-trust network access market has entered a period of rapid development.
idc data shows that the scale of china's zero-trust network access solution market will reach rmb 2.33 billion in 2023, and the market will achieve rapid development with a growth rate of 25.5%. sangfor zero trust network access solution ranked first with a market share of 13.8% and continued to lead with a growth rate of 54.2%.
idc conducted an assessment from two dimensions: zero trust solution capabilities and development trends. the solution capabilities mainly cover zero trust gateways, terminals, identities, data security, application security, security management, and security operations.
sangfor's zero trust solution ranks first in the industry with its excellent solution capabilities:
fast access, leading access speed across the entire network
based on the x-tunnel 2.0 high-performance tunnel architecture, it integrates the self-developed local-handshake and early data technologies to deeply reduce access latency; innovative driver-level diversion technology to greatly improve tunnel throughput; and protocol-level weak network acceleration technology to greatly optimize the connection effect under weak network conditions.
three lines of defense, leading defense system
use zero-trust sdp to build "three lines of defense" (identity, terminal, and device) to provide full-link protection for the business access process, and based on the innovative fourth-generation spa "one-time one-code" technology, reduce the device exposure and achieve secure business access.
innovatively expand the active defense capabilities of x-sdp, and through the two core capabilities of threat trapping and security radar, continuously strengthen and upgrade the capabilities of active defense and active early warning, achieve native zero false positive blacklisting, and self-blocking in seconds, and enhance the trust assessment and access control operation capabilities in actual attack and defense scenarios.
high concurrency, high reliability, and leading compatibility across all platforms
it uses the self-developed x-performance 2.0 distributed cluster technology to easily handle over one million concurrent requests, ensuring high reliability and continuity of business. it is fully compatible with tongxin, kylin and other operating systems and trusted chips, and is compatible with mainstream trusted terminals.
trinity, leading detection and response accuracy
the combination of 7-layer application proxy and 4-layer terminal network access provides three core value capabilities for b/s applications, including application exposure convergence, web business fine-grained control, and business operation analysis, based on the native access experience without any end or feeling, to achieve in-depth protection of the trinity of protection, control, and analysis.
driver-level isolation mechanism, leading terminal security isolation capability
it is worth mentioning that with the rapid development of information technology and the complexity of network environment, sangfor's zero-trust solution is increasingly widely used in the field of terminal security. through zero-trust security sandbox technology, users can build a unified terminal security isolation capability for mobile terminals and pc terminals. while hiding the business exposure and protecting the business access process, they can also generate a secure workspace on the personal desktop, isolate the work network from the internet, and effectively protect the terminal data security and prevent the terminal from being remotely controlled.
idc believes that there are several development trends for zero-trust solutions in the future:
the evolution from a single scenario to an integrated solution has put forward higher requirements on the coverage capability and wide adaptability of zero-trust solutions in different scenarios under the normal hybrid office environment. technology service providers that can provide "one-stop" solutions are the users' first choice.
artificial intelligence is becoming increasingly important in zero-trust network access solutions. currently, many machine learning and ai-related technologies have been used in zero-trust network access solutions to solve problems such as dynamic access control of permissions and threat detection and response. the continuous improvement of automation and intelligent capabilities will truly help zero-trust network access solutions achieve dynamic access control and help end users reduce costs and increase efficiency.
data security remains the core goal of building a zero-trust architecture. when users access different enterprise resources, a large amount of data usage, circulation, and exchange are involved. protecting the security of data throughout its life cycle is crucial to building a zero-trust security access system.
in addition to continuously iterating and updating the capabilities of zero-trust core components and integrating various security capabilities under the zero-trust concept, sangfor's zero-trust network access solution is also actively promoting the integration of ztna and secure access service edge (sase) to provide users with an integrated office security solution.
focusing on enterprise data protection, it integrates multiple data leakage prevention technologies such as vdi, uem sandbox, xdlp, etc., to provide users with a full range of "layered leakage prevention" solutions for data of different levels of confidentiality.
through the empowerment of secure gpt, automation and intelligence are fully integrated into the zero-trust system.
looking ahead, sangfor will continue to promote the evolution and iteration of user security construction towards cloud-based, intelligent, and integrated development, helping users to flexibly respond to rapidly changing external security threats and internal business needs.
about idc marketscape
the idc marketscape vendor assessment model is designed to provide an overview of the competitiveness of information and communication technology (ict) vendors in a specific market. the research methodology uses a rigorous qualitative and quantitative standard scoring method to illustrate the position of each vendor in a specific market in a single graphic. idc marketscape provides a clear framework in which the products, services, capabilities and strategies of it and ict vendors, as well as current and future market success factors, can be meaningfully compared. the framework also provides technology buyers with a 360-degree strengths and weaknesses assessment of current or potential vendors, providing a reference for technology buyers.
source: china daily
【advertise】