The cyber security industry is growing rapidly. Is it a popular unicorn that is unanimously optimistic?

Recently, it has been disclosed that the China Securities Regulatory Commission will open a "green channel" for four types of unicorn IPOs including biotechnology, cloud computing, artificial intelligence, and high-end manufacturing. As the regulatory authorities continue to release positive signals, more domestic "leaders" in subdivisions are ushering in new opportunities.

Where will the next wave of popular unicorns appear? Cybersecurity, which is currently unanimously optimistic by the venture capital circle, is one of the most popular.

The cyber security industry is growing rapidly. Is it a popular unicorn that is unanimously optimistic?

Cyberspace Security Industry "Small and Beautiful"

As a "small and beautiful" industry, network security has ushered in a period of rapid growth in recent years.

Last year was a year of explosion of financing in the field of cyber security. According to the safety cow data, in 2017, the total financing amount of domestic startups in the security field exceeded 3.5 billion yuan, several times that of previous years. Terminal security, cloud security, mobile security, data security, identity authentication, etc. are all hot areas for investment. Among them, more than 10 start-up companies have raised billions of yuan in financing.

"Cloud computing, Internet of Things, big data, blockchain and other new technologies have brought about the continuous upgrading of the industry. Huge and dispersed users and ubiquitous access make the enterprise data boundary no longer exist, the amount of data is increasing, and the value is greater. The higher you come, the more security challenges you face." said Dr. Wu Haisang, co-founder of Zhixiang Technology.

As the industry’s top network and operating system expert, he said that the current network security is changing to cyberspace security: traditional network security focuses on pipelines, and cyberspace security includes all aspects of cloud management, such as cloud service security, risk control security, and material security. Network access security, workflow security, and even citizen privacy, etc., all belong to the scope of cyberspace security.

Has been in the stage of catching up with business and services

Wu Haisang has first-hand experience of the market's feedback. With the increase in network security risks, the demands of the four major categories of customers, the government, operators, enterprises, and financial institutions, continue to rise.

From the Snowden incident that shocked the world to the WannaCry ransomware that has attracted countless recruits, the frequent cyber security incidents in recent years have sounded alarm bells for "big data users", prompting them to reflect on their own cyber security status with an unprecedented positive attitude. "The security industry can be said to be the hero of the times." Wu Haisang said with a smile.

However, he also admitted that security has been in the stage of catching up with business and services. "The security of equipment in various fields has been breached, privacy has been leaked, cloud services have been stolen, etc. from time to time. The security field has been trying to keep up. But the business iteration is far faster than imagined, and it takes time to find new problems. Solution." Wu Haisang said. He cited the example of shared bicycles. Users seem to be "scanning and walking" shared bicycles. In fact, it is a very complex application scenario involving bicycle equipment safety, QR code safety, timing billing system safety, payment safety, Wireless and Bluetooth communication security, etc. "Walking on the road, the streets are full of security challenges and opportunities." Wu Haisang, who has worked in the United States for many years, was excited about this and chose to return to work in China a few years ago.

In the industry, he clearly felt the changes: "In recent years, mergers and acquisitions and investments in the field of virtual space security have been very active. When we were financing, we could clearly feel that the heat was increasing."

Security is a whole field topic

When asked whether the challenge of the cyber security industry is the first technology, Wu Haisang shook his head. "It's not just the challenge of technology, but policy, technology accumulation, innovation, public safety awareness, corporate acceptance...Security is a topic in the entire field." He said.

The policy environment continues to improve. The Cyber ​​Security Law, which came into effect on June 1 last year, has given the cyber security industry a law to follow, and imposes rigid requirements on the data security of enterprises. The data security of enterprises no longer just stays at At the compliance level, it is responsible for the results. On the other hand, the original traditional security is gradually failing, and product technology that takes into account both security and efficiency and can truly solve data security issues makes companies willing to pay for security.

"But the protection mechanisms for innovation, the reinforcement of cloud computing infrastructure, and general security awareness still need to be improved." Wu Haisang said bluntly.

First of all, in the past, China relied to a large extent on the restructuring of the open source community on basic tools, and the technology accumulation was insufficient. The problem of talent shortcomings is also more prominent. In addition, Wu Haisang emphasized that the integration of industry, politics, education, and research can provide more powerful support for network security publicity, qualified personnel training, technological innovation, and patent protection.

For the prospects of the domestic network security industry, Wu Haisang is very confident. "Our country has the most complex network environment, the most complex Internet application environment and young people who accept innovative ideas the most." He said.

ZGAR GenkiIppai Pods 5.0

ZGAR GenkiIppai Pods 5.0

ZGAR electronic cigarette uses high-tech R&D, food grade disposable pod device and high-quality raw material. All package designs are Original IP. Our designer team is from Hong Kong. We have very high requirements for product quality, flavors taste and packaging design. The E-liquid is imported, materials are food grade, and assembly plant is medical-grade dust-free workshops.

From production to packaging, the whole system of tracking, efficient and orderly process, achieving daily efficient output. WEIKA pays attention to the details of each process control. The first class dust-free production workshop has passed the GMP food and drug production standard certification, ensuring quality and safety. We choose the products with a traceability system, which can not only effectively track and trace all kinds of data, but also ensure good product quality.



We offer best price, high quality Pods, Pods Touch Screen, Empty Pod System, Pod Vape, Disposable Pod device, E-cigar, Vape Pods to all over the world.

Much Better Vaping Experience!



Pods, Vape Pods, Empty Pod System Vape,Disposable Pod Vape Systems, Japanese culture style

ZGAR INTERNATIONAL(HK)CO., LIMITED , https://www.zgarvapor.com