{"id":5563,"date":"2024-03-15T09:26:04","date_gmt":"2024-03-15T01:26:04","guid":{"rendered":"https:\/\/www.1ai.net\/?p=5563"},"modified":"2024-03-15T09:26:04","modified_gmt":"2024-03-15T01:26:04","slug":"%e8%b5%9b%e8%bf%aa%e9%a1%be%e9%97%ae%ef%bc%9a360%e5%ae%89%e5%85%a8%e5%a4%a7%e6%a8%a1%e5%9e%8b%e7%bb%bc%e5%90%88%e5%ae%9e%e5%8a%9b%e4%bd%8d%e5%b1%85%e6%a6%9c%e9%a6%96","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/5563.html","title":{"rendered":"CCID Consulting: 360 Security Big Model ranks first in comprehensive strength"},"content":{"rendered":"<p>Recently, CCID Consulting released the China<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e5%ae%89%e5%85%a8%e5%a4%a7%e6%a8%a1%e5%9e%8b\" title=\"[Sees articles with labels of the [Security Large Model]]\" target=\"_blank\" >Safety big model<\/a>Technology and Application Research Report (2023)\u201d, the report draws a framework of China\u2019s security big model, and conducts a comparative analysis of the main market players based on this framework.<strong>3<\/strong><strong>60<\/strong><strong>With its outstanding technical capabilities and business layout, the security big model<\/strong><strong>Top of the chart,<\/strong><strong>The company&#039;s comprehensive strength leads the industry.<\/strong><\/p>\n<p class=\"article-content__img\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5565\" title=\"2024031417403857440\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2024\/03\/2024031417403857440.jpg\" alt=\"2024031417403857440\" width=\"650\" height=\"508\" \/><\/p>\n<p>The report investigated<a href=\"https:\/\/www.1ai.net\/en\/tag\/360\" title=\"_Other Organiser\" target=\"_blank\" >360<\/a>Digital Security, Ahnheng Information, Qi&#039;anxin, Green Alliance Technology, Sangfor, Topsec, Venusstar, Knowsec, and other major domestic security big model manufacturers use a multi-level analysis framework to comprehensively evaluate the comprehensive strength of security big model manufacturers from three dimensions: technology, capability, and application.<strong>3<\/strong><strong>60<\/strong><strong>The comprehensive capabilities of the safety large model ranked first.<\/strong><strong>and<\/strong><strong>In the number<\/strong><strong>Data and computing power<\/strong><strong>aspect<\/strong><strong>Possess outstanding advantages<\/strong><strong>.<\/strong><\/p>\n<p><strong>3<\/strong><strong>60<\/strong><strong>Big security model leads intelligent security services<\/strong><\/p>\n<p>As digital transformation deepens, digital technologies represented by big models are developing rapidly, bringing relatively rare challenges to the security field. Traditional security defense methods can no longer meet the needs of rapid response and emergency response. The report points out that with the emergence of big security models, the security industry is facing relatively rare opportunities and challenges.<\/p>\n<p>In order to cope with new threats from the development of artificial intelligence, empower the process of digital transformation and intelligent improvement, and promote the digital development of the industry, 360 adheres to the strategy of &quot;helping small and micro businesses in the mountains and the sea&quot;, implements the two main development lines of security and AI, and builds a natively secure general artificial intelligence large model 360 Smart Brain based on national-level security capabilities.<strong>Based on intelligent brain, we have created the first<\/strong><strong>Implementation A<\/strong><strong>I<\/strong><strong>Practical Application<\/strong><strong>Security industry big model<\/strong><strong>\u2014\u2014<\/strong><strong>3<\/strong><strong>60<\/strong><strong>Large safety model.<\/strong><\/p>\n<p class=\"article-content__img\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5564\" title=\"2024031417403857441\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2024\/03\/2024031417403857441.jpg\" alt=\"2024031417403857441\" width=\"650\" height=\"315\" \/><\/p>\n<p>The report suggests that the architecture of the big model in the security industry can be divided into three levels: technology, capability, and application. The technology level focuses on the three core elements of the model: data, computing power, and algorithms. The capability level, based on the general big model, further expands the ability to understand specific tasks in the security field. The application level realizes specific applications in the field of network security by combining and expanding the underlying functions and algorithms. 360 Security Big Model is in a leading position at all levels, and ranks first in comprehensive data.<\/p>\n<p>At the technical level, the 360 security big model is based on the 360 Intelligent Brain. It extracts high-quality corpus from the security big data such as attack and defense tactics, vulnerability database, virus database, etc. accumulated by 360 in the past 20 years for training. It uses big data, high computing power, and strong algorithms to create a moat barrier that is difficult to copy and has no replacement.<\/p>\n<p>At the capability level, the security intelligence system built around the 360 security big model can provide capabilities such as target understanding, logical reasoning, effect evaluation, and knowledge memory, and support the connection, configuration, driving, and coordination of various products. Through the accurate calling of security tools, it can realize functions such as alarm analysis, attack link drawing, threat intelligence comparison, victim asset analysis, attacker attribution analysis, tracing, and security report generation.<\/p>\n<p>At the application layer, the 360 Security Big Model fully leverages its generation capabilities and the practical experience of security experts to flexibly and adaptively orchestrate task plans and gradually form automated security operation capabilities. At present, it has broken through the difficult steps of scenarios such as automated threat hunting and automated security operations, and achieved scenario automation.<\/p>\n<p><strong>Large model + safety,<\/strong><strong>Create A<\/strong><strong>I<\/strong><strong>New practical applications<\/strong><\/p>\n<p>The report pointed out that the security of big models themselves has attracted attention. The big model security capability framework built by 360 is based on the principles of &quot;safety, goodness, trustworthiness, and controllability&quot;, and comprehensively guarantees the security of big models themselves with five major capabilities: training safety, operation safety, goodness of content, trust enhancement, and controllable framework.<\/p>\n<p>The continuous improvement of the capabilities of the security big model will bring revolutionary changes to the industry and promote the development of new market space. CCID pointed out in the report that in the future, the security big model will accelerate the empowerment of existing security products, continue to promote intelligent security operations, and will be implemented in more security scenarios.<\/p>\n<p>As a security big model for domestic AI practical applications, 360 Security Big Model enables the full product matrix, and can effectively and conveniently complete security problem consultation, situation indicator analysis, security incident processing, attack threat tracing, etc. In addition, 360 is based on the &quot;small incision, deep&quot; methodology, and uses &quot;security scenario applicability&quot; as an indicator to construct high-value security scenarios suitable for the characteristics of big models, and promote the implementation of security big models.<\/p>\n<p>Since the release of version 1.0 in August 2023, the 360 Security Big Model has been undergoing training and optimization, while continuously improving the &quot;AI content&quot; of all 360 security products, making it the only company to realize the practical application of AI.<\/p>","protected":false},"excerpt":{"rendered":"<p>Recently, Saidi Consultant released \"China Security Large Model Technology and Application Research Report (2023)\", the report draws the framework of China's security large model, and the framework as the basis for the major players in the market to carry out a comparative analysis, 360 security large model by virtue of outstanding technical capabilities and business layout, ranked first in the charts, the overall strength of leading the industry. The report researched 360 Digital Security, ACE Information, Qi Anxin, Green Alliance Technology, SZSS, Tianrongxin, Qixingchen, Knowledge Chuangyu and other major security model vendors in China, and adopted a multi-level analysis framework to comprehensively assess the comprehensive strength of security model vendors in three major dimensions, namely, the technology layer, the capability layer, and the application layer. 360 security model ranked the first in terms of comprehensive capability and had an outstanding advantage in terms of data and computing power. The 360 security model ranked first in terms of comprehensive capability, and had outstanding advantages in data and computing power. 360 security model, leading the intelligent<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[146],"tags":[337,1692],"collection":[],"class_list":["post-5563","post","type-post","status-publish","format-standard","hentry","category-news","tag-337","tag-1692"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/5563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=5563"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/5563\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=5563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=5563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=5563"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=5563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}