Workflow
网络安全
icon
Search documents
Omdia:2024年TSD市场总账单额达166亿美元 同比增长14.5%
智通财经网· 2026-02-04 06:32
智通财经APP获悉,Omdia研究显示,2024年技术服务分销(TSD)市场在IT和电信渠道的总账单额达到166亿美元,同比增长14.5%。前六大TSD占据72.3% 市场份额,并实现13.4%的同比增长。连接性销售依然占主导,但其增长速度低于云/托管、网络安全及 UC/CCaaS 解决方案。随着市场成熟,TSD 必须优 化合作伙伴组合、扩大与 MSP(托管服务提供商)和 VAR(增值经销商)的合作,以提升平均合同价值(ACV);并通过提升赋能支持来提高技术顾问的留存 率。风险投资和私募股权投资正在重塑执行策略,推动合作伙伴分级、供应商优化以及更完善的数据/AI 内部工具。 TSD市场正在经历由创新、战略性投资和不断演变的合作伙伴动态驱动的变革性增长。对于IT和电信供应商及渠道合作伙伴而言,理解市场的发展轨迹和 关键参与者,对抓住未来机遇至关重要。 市场概览:增长、规模与主导地位 2024年,TSD市场表现亮眼,总账单额达到166亿美元,同比增长14.5%。这一增长体现了市场的韧性,以及对持续性收入模式的长期需求。 前六大TSD ——Telarus、Intelisys、AVANT Communications ...
2026矿业AI驱动转型基础白皮书-微软
Sou Hu Cai Jing· 2026-02-03 03:56
人工智能正深刻重塑采矿业发展格局,全面渗透从勘探、开采到加工、回收的全价值链,同时为供应链物流等辅助环节带来效率革新,成为推动行业经济效 益与可持续发展融合的核心力量。在全球能源转型背景下,2040 年清洁能源技术相关矿产需求预计增长四倍,人工智能为矿业应对资源短缺、减排压力等 挑战提供了关键解决方案,其在勘探阶段可降低 20%-30% 的时间与成本。 采矿业的 AI 应用实现了多维度突破:资源层面,能有效回收低品位矿产,延长矿山运营寿命;价值回收方面,针对复杂矿石系统优化加工技术,提升多种 贵重矿物的回收率;可追溯性上,通过数字护照、微量元素指纹识别等技术实现全流程监控;安全领域,尾矿库近实时监测技术降低环境风险,爆破测绘技 术提升作业安全与矿石利用率,冶金厂智能药剂混合系统保障产品质量稳定。 生成式 AI 时代下,网络安全挑战日益复杂,国家行为体与网络犯罪组织的攻击手段不断升级。微软推出 "安全未来计划",倡导以威胁情报策略、行业政府 合作等方式强化防御,为 AI 应用筑牢安全基础。 企业 AI 转型成功需依托五大核心驱动因素:组织和文化上,需构建敏捷创新的环境,强化领导层认同与跨领域合作;商业战略要明确 ...
山石网科2月2日获融资买入305.34万元,融资余额8475.21万元
Xin Lang Cai Jing· 2026-02-03 01:42
资料显示,山石网科通信技术股份有限公司位于江苏省苏州高新区景润路181号,成立日期2011年7月20 日,上市日期2019年9月30日,公司主营业务涉及网络安全领域前沿技术的创新,提供包括边界安全、云 安全、数据安全、内网安全在内的网络安全产品及服务,致力于为用户提供全方位、更智能、零打扰的 网络安全解决方案。主营业务收入构成为:边界安全产品75.09%,其他安全产品18.93%,云安全产品 5.09%,其他(补充)0.88%。 2月2日,山石网科跌1.97%,成交额5502.27万元。两融数据显示,当日山石网科获融资买入额305.34万 元,融资偿还510.11万元,融资净买入-204.77万元。截至2月2日,山石网科融资融券余额合计8475.21 万元。 声明:市场有风险,投资需谨慎。本文基于第三方数据库自动发布,不代表新浪财经观点,任何在本文 出现的信息均只作为参考,不构成个人投资建议。如有出入请以实际公告为准。如有疑问,请联系 biz@staff.sina.com.cn。 融资方面,山石网科当日融资买入305.34万元。当前融资余额8475.21万元,占流通市值的2.70%,融资 余额超过近一年90% ...
香港外汇基金去年赚3310亿港元
Sou Hu Cai Jing· 2026-02-02 23:13
r n 图 H E EV ULTURED I m all min 命命 t 2017-01-11 . . TI And II Home ITCHE 电影 Children 香港外汇基金是香港作为国际金融中心稳健运行的根基。图是位于九龙半岛的环球贸易中心。 1月28日,香港金融管理局(以下简称"香港金管局")公布了香港外汇基金截至2025年12月底未经审计的 财务状况。香港外汇基金在2025年录得3310亿港元的投资收入,创下历史新高。值得留意的是,香港外 汇基金的各组成部分,包括股票、债券以及"长期增长组合"(包括私募股权及实物资产投资等),全部实 现正回报。香港金管局形容这个情况"非常特殊",在过去15年仅出现过两次。 香港金管局分析称,这主要是因为在2025年全年,环球金融市场表现强韧。全球主要股票市场普遍上 升,并在2025年年内录得创纪录新高。其中香港股市受惠于资金流入,恒生指数全年上升28%,而债券 市场也有不错的表现。至于外汇市场方面,美元兑其他主要货币贬值约9%,美元走弱也为香港外汇基 金的非港元资产,带来了外汇估值上调。 市场 AI快速发展带动资本投入 从香港金管局公布的香港外汇基金分类投资报 ...
【环球问策】派拓网络六大预测警示:AI经济驶入“防御之年”,2026谁先失守AI身份谁先输
Huan Qiu Wang Zi Xun· 2026-02-02 11:21
Core Viewpoint - Palo Alto Networks defines 2026 as the "Year of Defense," highlighting new security challenges and responses in the context of the accelerating native AI economy [1] Group 1: Security Landscape Changes - In 2025, significant security incidents surged, with 84% of major events leading to business interruptions, reputational damage, or financial losses [1] - The introduction of autonomous AI agents is fundamentally changing the attack-defense dynamics, necessitating a shift from passive interception to proactive empowerment in defense systems [1][2] Group 2: Identity and Internal Threats - Identity authentication is predicted to become the main battleground in cybersecurity by 2026, with realistic AI deepfake technology making it difficult to distinguish between real and fake information [1] - The ratio of humans to AI agents in enterprises is expected to reach 82:1, increasing the risk of identity theft and automated malicious actions [2] Group 3: New Attack Vectors - Data poisoning is anticipated to become a new frontier in cyberattacks, where attackers covertly alter AI training data to create untrustworthy AI models, leading to a "data trust crisis" [4][5] - The introduction of AI agents, while addressing the shortage of cybersecurity talent, also creates a new type of internal threat, as these agents can be targeted by attackers [4] Group 4: Accountability and Legal Implications - A significant gap exists between the rapid adoption of AI and the lag in security capabilities, leading to potential legal consequences for corporate executives [6] - By 2026, the first major lawsuits related to uncontrolled AI are expected, emphasizing the need for executives to take personal responsibility for AI security [6] Group 5: Quantum Computing Threats - The rise of quantum computing poses a long-term challenge, as traditional encryption methods may become obsolete, leading to "retrospective insecurity" [6][8] - The commercialization of quantum computing could be accelerated by AI, reducing the expected timeline from ten years to three [8] Group 6: Browser Security Innovations - The browser is evolving into a critical operational platform for enterprises, yet it remains largely unprotected [9] - Palo Alto Networks has introduced the Prisma Browser, which integrates robust security features to protect sensitive data and prevent malicious code injection [9] Group 7: Future Defense Strategies - The traditional approach of using fragmented security tools is inadequate for addressing rapid attack speeds, necessitating a shift to a platform-based, proactive, AI-driven defense system [9]
古巴反对美国将其视为“安全威胁”
Xin Hua She· 2026-02-02 08:40
公告说,古巴不会支持任何针对美国的敌对活动,也不会允许本国领土被用于针对其他国家。古巴愿在 捍卫国家主权和独立的前提下,重启并扩大与美国的双边合作,共同应对跨国安全威胁,并建议恢复两 国在反恐、反洗钱、打击毒品贩运、网络安全等领域的技术合作。 新华社哈瓦那2月1日电(记者蒋彪)古巴外交部1日发布公告,坚决反对美国将古巴描述为"对美国安全 构成威胁"。 公告重申,愿意在共同利益和国际法的基础上,与美国政府保持对话,推动取得切实成果。 美国总统特朗普1月29日签署行政令,称古巴政府的政策和行为对美国国家安全和外交政策构成不寻常 和特别的威胁,据此宣布进入国家紧急状态。 ...
2026网络安全趋势报告-绿盟科技
Sou Hu Cai Jing· 2026-02-02 08:03
Core Insights - The "2026 Cybersecurity Trends Report" by NSFOCUS highlights four core areas: AI security, data security, network security, and critical scenario security, identifying ten key trends to guide industry development [1]. Group 1: AI Security - AI-related security has become a focal point, with generative AI and autonomous agents pushing network defense into an "intelligent confrontation" phase, necessitating a shift from traditional defense systems to dynamic intelligent defenses [1]. - The security risks associated with AI are shifting to system behavior and decision-making levels, with potential misuse of intelligent agent permissions leading to severe data breaches, making the construction of a comprehensive AI security perimeter essential [1]. - In security operations, by 2026, a framework of "trusted limited autonomy" will be implemented, achieving controllable automation through confidence grading and interpretability optimization [2]. Group 2: Threat Landscape and Defense Systems - The rise of proxy-based botnets poses challenges to traditional threat intelligence systems, requiring a shift in defensive thinking from "blocking nodes" to "insight into links" [2]. - AI empowerment enhances threat intelligence capabilities, transitioning from "information piling" to intelligent decision-making engines [2]. - The proliferation of deep synthesis technology has led to a "crisis of authenticity," with "AI detecting AI" becoming a core preventive paradigm by 2026, driving demand for deep forgery detection [2]. Group 3: Cloud and Data Security - The migration of AI applications to the cloud and the introduction of open-source components have increased risks related to configuration flaws and vulnerabilities, making the exposure of AI assets on the internet a primary defense line for cloud data security [2]. - By 2025, the establishment of trusted data spaces will accelerate, leveraging cryptography and trusted hardware to ensure secure and controllable data "external circulation," evolving towards an ecological and intelligent direction [2]. Group 4: Emerging Scenario Security - The scaling of the low-altitude economy presents dual challenges of physical and data security, with a new security system based on "endogenous immunity + data protection" being constructed to ensure sustainable industry operations by 2026 [2]. - The cybersecurity industry will focus on the application of intelligent technologies and the expansion of emerging scenarios, continuously enhancing risk prevention, technological innovation, and compliance construction to build a more resilient security defense system [2].
天溯计量:公司在网络安全领域尚处于前期业务拓展中,该部分营收占公司总体收入比例较小
Mei Ri Jing Ji Xin Wen· 2026-02-02 01:23
Core Viewpoint - The company is currently in the early stages of business development in the cybersecurity sector, with this segment contributing a small proportion to the overall revenue [1]. Group 1: Business Overview - The company's main business includes metrology calibration, testing, and certification services [1]. - The testing services primarily focus on consumer batteries, power batteries, and energy storage battery testing [1]. Group 2: Cybersecurity Revenue - The company has not yet generated significant revenue from the cybersecurity field, indicating that it is still in the initial phase of market expansion [1].
奇安信科技集团股份有限公司 2025年年度业绩预告
Zheng Quan Ri Bao· 2026-01-30 23:37
Core Viewpoint - The company anticipates a revenue of approximately 4.391 billion yuan for the year 2025, with a projected net loss narrowing compared to the previous year, indicating a potential improvement in financial performance despite ongoing market challenges [1][3]. Group 1: Performance Forecast - The company expects to achieve an operating revenue of around 4.391 billion yuan for the year 2025 [1]. - The projected net profit attributable to the parent company is estimated to be between -1.3588076 billion yuan and -1.1344174 billion yuan, representing a reduction in loss of 20.5643 million yuan to 244.9545 million yuan, or a year-on-year improvement of 1.49% to 17.76% [1]. - The net profit attributable to the parent company after deducting non-recurring gains and losses is expected to be between -1.5953308 billion yuan and -1.3318817 billion yuan, with a reduction in loss of 16.5099 million yuan to 279.9590 million yuan, reflecting a year-on-year improvement of 1.02% to 17.37% [1]. Group 2: Previous Year Performance - In the previous year, the company reported an operating revenue of 4.349 billion yuan [2]. - The total profit for the previous year was -1.4348133 billion yuan, with a net profit attributable to the parent company of -1.3793719 billion yuan, and a net profit after deducting non-recurring gains and losses of -1.6118407 billion yuan [2]. - The basic earnings per share for the previous year was -2.02 yuan [2]. Group 3: Reasons for Performance Changes - The network security market is still in the recovery phase, with intense competition, but new policies and technologies are creating opportunities [3]. - The company anticipates a sales collection of approximately 5.14 billion yuan for 2025, representing a year-on-year growth of about 8.03% [3]. - The net cash flow from operating activities is expected to be around -61 million yuan, showing an improvement of approximately 281 million yuan, marking the best cash flow level since the company went public [3]. - The company is focusing on major clients and core products, successfully implementing new products like AISOC and large model guardians, and has reduced operating expenses by about 16% [3]. Group 4: Asset Evaluation - The company has conducted a preliminary assessment of its assets and has made provisions for asset impairment based on prudence, which has impacted the current period's profit [4].
齐向东:聚焦“三个认识”解析网络安全变局
Yang Zi Wan Bao Wang· 2026-01-30 13:33
Core Insights - The speech by Qi Xiangdong emphasizes the need for enhanced understanding of vulnerabilities, attackers, and losses to effectively address new threats during the 14th Five-Year Plan period [1][2] Group 1: Understanding Vulnerabilities - The core of cybersecurity issues lies in vulnerabilities, which can be categorized into six types: software, hardware, machine, human, system, and operational vulnerabilities [1] - Machine vulnerabilities are particularly concerning as they can proliferate with extended scenarios, such as vulnerabilities in drone management systems that could lead to significant public safety incidents [1] - An analysis by Qi Anxin revealed that 93.3% of major domestic automotive manufacturers' cloud platforms have security vulnerabilities, with 76.7% of these being classified as critical or high-risk [1] Group 2: Understanding Attackers - Current attackers include cyber armies, government intelligence agencies, gray market organizations, and individual hackers deeply embedded in attack chains [2] Group 3: Understanding Losses - The urgency of recognizing losses from cyberattacks is highlighted, with examples including military-grade losses from power outages due to cyberattacks, and significant financial impacts on companies from ransomware and data breaches [2] - The economic impact of cybersecurity incidents is substantial, with examples such as the loss of billions in market value due to compromised training models and ransomware extracting billions in ransom annually [2] Group 4: Strategic Recommendations - The primary task for cybersecurity upgrades during the 14th Five-Year Plan is to abandon outdated security perceptions and to build a robust defense system supported by four platforms and five red lines [2]