Since the separation from qi’anxin last year, 360 has focused more on the security of government and enterprises at the to B end. Zhou Hongyi, the founder of 360, has also made public speeches related to the security business of government and enterprises. Another focus is network warfare. < / P > < p > for a long time, the public seldom have the awareness of “cyber war”, which seems to be “nothing to do with yourself, hanging high”. However, this year’s international situation is complicated. Some people in the industry told China Business Daily that “cyber warfare is often fought.” At this year’s ISC conference, Zhou Hongyi said that cyber warfare will surpass hot war and become the most possible form of war in the digital era, from the auxiliary means of traditional warfare to the first choice. This seems to be reflected in the fact that 360 was added to the list of entities by the United States this year. In any case, from the perspective of the current environment, cyber warfare is also worthy of attention. In 360’s business strategy of government and enterprise security, defending the homeland security of cyberspace, that is, cyber warfare, is a focus of its attention recently. In a brief history of today, Israeli historian herali mentioned that nuclear war and cyber war are high damage, low profit technology, and these tools can destroy the whole country. “Malware and logic bombs could disrupt air traffic in Dallas, crash trains in Philadelphia and paralyze Michigan’s power grid.” At the recent ISC conference, Zhou Hongyi explained that the reason why traditional nuclear war can’t be fought is that nuclear weapons can destroy human beings. Therefore, in the era of nuclear war, all the five permanent members have nuclear weapons, which forms a terrible nuclear balance. “So today, I believe that no country will launch a nuclear attack rashly. In fact, great changes have taken place in other people’s operational concepts. For example, the US military’s operational concept is called global operations, and the five fields of sea, land, air and sky net are carried out at the same time. < / P > < p > I’m not a military expert, I don’t evaluate the sea, land and air, and I’m not an aerospace expert. But I believe that once we fight, maybe satellite war will be the main theme. ” As a senior engineer in the field of network security, Zhou Hongyi believes that if there is a war, cyber warfare will certainly become the first choice for today’s operations from the original auxiliary means of traditional warfare. < / P > < p > “in peacetime, others take advantage of the preset vulnerability, advanced threat attack, Trojan horse and virus penetration, lurking in the infrastructure of some important cities of our country. Once the order is given, our important cities may be cut off from power, water and network, and the whole social order will be in chaos. Therefore, a big country should strive to maintain its advantage in network attacks Because cyber attack is a better way to fight than a nuclear bomb. ” Zhou Hongyi believes that in today’s cyber warfare era, the most important thing is how to establish China’s strong network defense system, so that other countries can not easily use cyber warfare to launch attacks. This is the proposal that should be put forward to the country in the new era. Public information shows that the U.S. military has a huge network warfare force, the average intelligence quotient of its members exceeds 140, which is known as the 140 force by the outside world. However, no matter how high the intelligence quotient is, it can not make up for the three shortcomings of “huge and fragile infrastructure”, “easy invasion of advanced equipment” and “large gap of network talents”. For example, in terms of infrastructure, the U.S. military and the government increasingly rely on national information infrastructure to perform their functions. A large number of logistics socialization support has to rely on civil communication networks. The U.S. Department of defense has 2 million computers, 10000 local area networks and more than 100 long-distance networks. According to the report of the US Department of defense, the information systems of the government and the army have suffered 38000 attacks, with a success rate of 88%. However, only 4% of them have been detected, and 95% of these 4% can not take any emergency measures. Zhou Hongyi believes that in the face of various potential crises, the traditional security protection system urgently needs to be changed. It is necessary to consider all aspects of the battlefield, strategy, tactics and products, abandon the “patching” protection measures, and form collaborative defense and joint operations under the top-level security design. In addition to defending the homeland security of cyberspace, the new strategy of government enterprise security business is to provide services to the government and enterprises in 360’s to B business strategy. In particular, after the separation of qi’anxin last year, 360 began to expand the security business of government and enterprises. To this end, Zhou Hongyi also personally led a team to Laos to build the league. < / P > < p > although he has been involved in the field of government and enterprise security, new methods must be used in the new battlefield. Whether in the past free anti-virus, or today’s government and enterprise security business, disruptive innovation is Zhou Hongyi’s consistent style, but also his most proud place. For example, Zhou Hongyi said in public last year that the proportion of current network security in China’s informatization is too low. Most companies have homogeneous and low-cost competition, so many products have no innovation. “360 has to be different in this industry,” he said < / P > < p > the reporter learned that in 360’s business layout of government and enterprise, there are self construction, investment and M & A to expand the market. Among them, from the perspective of self built projects, unlike most of the companies engaged in enterprise security services, its government enterprise security business is not based on hardware products, but in the form of a comprehensive industrial base. For example, 360 recently won the bid in Chongqing, Tianjin, Qingdao and other cities, with the bid winning amount of 240 million yuan, 251 million yuan and 250 million yuan respectively. From the perspective of operation, an engineer from the green alliance told our reporter: “the consensus in the industry is that selling hardware products alone is not profitable, it’s a one-off deal. Therefore, it is necessary to change to safe operation, so as to obtain continuous income. For example, sell a set of solutions, including hardware of various security functions and security big data platform, hardware collection real-time information release platform, and platform for various security big data analysis. ” In addition, from the perspective of product operation, Zhou Hongyi once said at this year’s ISC conference that network security can’t cope with cyber attacks in the digital era only with stacked products. It must also have ten security infrastructure with network security brain as the core, including asset mapping, vulnerability management, threat intelligence, endogenous security, security operation, supervision and command, and so on Emergency response, actual combat range, talent training base, and security development center. The new positioning of 360 enterprise security group is to be a network security operator in the new era. “After the establishment of the whole system, the perception ability, intelligence ability, training level and coping ability of the whole team can be improved.” Zhou Hongyi said, “Why build a security infrastructure? In the next 5-10 years, the user investment can not be changed. At the same time, through the security infrastructure, the operation of the security team can be established on it.” In addition, Zhou Hongyi thinks that the real ecology should be like his old friend Lei Jun’s millet model. We should do different links in an industry chain, rather than oligopoly competition. Many products can be obtained by investing in external start-up companies. In recent years, 360 has invested in Shanshi Wangke, Hanshi technology and other companies, among which Shanshi Wangke has been listed on the science and technology innovation board. This year, it also acquired yifangyun and Zhiyu ccwork, which are collaborative office enterprises, to develop the government enterprise office market. Subsequently, 360 announced that it would complete its equity investment in Jincheng bank and subscribe for 30% of the shares, with the transaction amount of 1.28 billion yuan. Jincheng bank is one of the first five private banks approved by CIRC. Whether defending homeland security in cyberspace or providing network security services to government and enterprises, a series of actions show 360’s determination to deepen the layout of security strategy for government and enterprises.