Cloud Map of Cloud Security Vendors’ Product Competitiveness | Container Security Topics



There is no doubt that the new crown epidemic has brought about tremendous changes in global network, digital and industrial informatization. In the post-epidemic era, overall network security has developed rapidly in the direction of cloud security, quickly becoming the core of future development. Different from traditional security, cloud security is difficult to describe in a single word, and it is truly “to the vast and subtle”.

According to the data of 42 recovered questionnaires from the Howler Security Industry Research Institute, under the category of container security, the first mention rate of product names of competing products is Qingteng Honeycomb Container Security Platform, and the second is Xiaoyou Technology Mirror World. The container security platform, the third name is Hillstone Technology Yunge.

Cloud Map of Cloud Security Vendors’ Product Competitiveness | Container Security Topics

The above picture is the cloud map of container security competition and synergy, in which the red circle represents the product with the first mention of the product name of the competing product, the yellow circle represents the product with the second mention of the product name of the competing product, and the blue circle represents the product with the second mention rate. The product with the third mention rate of the product name of the competing product.

Container technology is a kind of virtualization technology. Unlike traditional virtual machines, containers are lighter and more convenient to deploy. However, there are also attack problems caused by image vulnerabilities and improper configuration. The entire life cycle of the container (create, distribute, run, stop) is considered for container security protection.

At present, domestic container security products focus on the following functions: 1) image security; 2) vulnerability scanning; 3) fine-grained access control; 4) intrusion prevention. Different manufacturers have their own emphasis on the direction of publicity, some from the perspective of technology or architecture, some from the support environment, and some from the direction of combining with AI + big data.

Let’s take a look at what the container security provider has to offer from its own product perspective, typical customers and years of service!

  Tianrongxin container security protection system

● Product introduction

Tianrongxin container security protection system is a container protection product launched by Tianrongxin based on the concept of full life cycle protection of containers. The product takes the four dimensions of container environment security, container image security, container network security, and workload security as the starting point to help customers solve security risks such as container escape attacks and malicious images.

● Typical customers

Zhejiang Energy Group (2019)

  Qingteng Honeycomb Container Security Platform

● Product introduction

Qingteng Honeycomb Container Security Platform focuses on the field of container security. Through continuous monitoring and analysis of container security status, it visualizes enterprise risk scenarios, and dynamically Displays changes in enterprise container environment security indicators and security trend analysis for security decision makers. Secure the container environment throughout the entire life cycle of the program (build, distribute, run). By providing powerful real-time monitoring and response capabilities, Qingteng Honeycomb helps enterprises discover and resolve risks and ensure the security of their container environment.

● Typical customers

Waterdrop Company, Geely Group

  Rose Smart Hive Adaptive Micro-Isolation Security Platform

● Product introduction

Rose Smart Honeycomb Adaptive Micro-Isolation Security Platform combines micro-isolation technology with adaptive technology to perform fine-grained access control between workloads through software-defined methods. The product adopts the overlay mode. Compared with the micro-isolation technology implementation method based on cloud platform and virtual firewall technology, it can be independent of the infrastructure, with extremely low performance consumption and a larger number of access points. By combining with the adaptive policy engine , which can automatically adjust security policies according to the environment. It is the only micro-isolation product that supports hybrid environments (physical server + hybrid cloud + container) in China.

● Typical customers

Lufax (2019); CNOOC (2020)

  Hillstone Network Keyunge

● Product introduction

Shanshiyun·Ge is an innovative distributed network-side micro-isolation product. Through patented traffic drainage technology, virtual machine micro-isolation and visualization technology, it can provide users with a full range of cloud security services, including traffic and application visualization, and threats between virtual machines. Detection and isolation, network attack, network application audit and traceability, etc., help the government, finance, operators, enterprises, etc. to build a safe and compliant “green” cloud platform.

● Typical customers

Nanjing Military Region General Hospital (2020)

  Tencent Security Container Security Service

● Product introduction

Container Security Service (Tencent Container Security Service, TCSS) provides security services such as container asset management, image security, and runtime intrusion detection.

  Security Dog Cloud Container Adaptive Security Management System

● Product introduction

New technologies such as Yunjiyu automatic learning can perform adaptive security protection and unified management for the entire life cycle of containers. Yunjia adopts the technology of combining host security agent and security container, which can not only fully protect the container but also flexibly combine with the container orchestration system. During the security lifecycle of a container, automatic detection, analysis, and processing are used to defend against security threats encountered throughout the container lifecycle. Advanced methods such as intelligent detection, machine learning and threat prediction are used in protection technology to ensure the security of containers and applications in containers.

● Typical customers

Xiamen University School of Oceanography and Earth (2020), Wanlian Securities

  NSFOCUS Container Security Management System NCSS-C

● Product introduction

NSFOCUS Container Security Management System NCSS-C is a cloud-native security product based on the DevSecOps concept and with the help of container orchestration technology to ensure the security of the entire lifecycle of container construction, deployment and operation. The product uses detection, scanning and other means to discover security risks from the various stages of container image, container orchestration environment, and container runtime. Provide repair solutions for vulnerabilities, block the startup of risky images through strategies and other means, and provide customers with a safe and stable container operating environment.

● Typical customers

Zhongyuan Bank (2021), Fujian Provincial Economic Information Center (2021)

  Venustech Group Container Security Management Platform

● Product introduction

Venustech’s container security management platform builds end-to-end security capabilities based on the entire life cycle of containers, namely construction, distribution, and operation, and can achieve security capabilities through advanced technologies such as container asset discovery, global visualization, and seamless integration into DevOps processes. Security behaviors such as globalization, automatic control, detection, and defense of the container life cycle.

  concluding remarks

In recent years, container security has attracted more and more attention and attention. The Howler Security Industry Research Institute believes that Party A’s customers still need to consider a few points when purchasing container security products that are suitable for them: 1) Container product providers Do you have the ability to build an enterprise-level container security system under the zero trust model; 2) With the deployment of large-scale containers on the business side, how to solve the follow-up guarantee of security capabilities? Such as the provisions on shared responsibility for security on the cloud? Another example is how to ensure the supply chain problems of applied products?

In addition to the consideration of the product capability side, Party A also needs to choose and purchase according to the actual needs. Comprehensive cloud security providers have mature container security services, but sometimes they cannot fully meet the customized individual needs of enterprises; traditional cloud security providers such as terminal security, edge computing, etc. can be packaged and purchased for trial use in non-Internet enterprise security Special products, but you need to think long-term when buying as a package.

The Links:   SKIIP22NAB12IT46 LP150E07-A3K1