Securities code: 688225 securities abbreviation: CICA security
AsiaInfo Security Technology Co., Ltd
Record of investor relations activities
No.: 2022011
√ research on specific objects \uf0a3 analyst meeting
Investor relations \uf0a3 media interview \uf0a3 performance briefing
Activity category \uf0a3 press conference \uf0a3 roadshow activity
\uf0a3 site visit \uf0a3 one-to-one communication
\uf0a3 others (please describe other activities in words)
Shenwan Hongyuan Group Co.Ltd(000166) Ning Keyu, Liu Yang, Wang Shuguang and Shi Zhixu of Huaxia Fund
Name of participant: Taibao asset management Wang Zhe, Taiping assets Feng Baolong
Name and personnel: huitianfu fund Xia Zhengan PICC assets Tang Qi
(regardless of ranking) Penghua Fund Dong Weichuang jinhexin Zhou Zhimin
Ping An assets Fu Yifan Danshui spring Ren Yu
Time: 9:30, March 24, 2022
Place online communication
Investment and customs staff of the office of the board of directors of listed companies
Name of receptionist
1、 Introduce the basic information of the company
The state attaches great importance to network security. In recent years, the rapid launch of the two laws, Tesla and didi have also given birth to a large number of new hot opportunities. All kinds of blackmail, data leakage, mining and other events, including the recent local geographical conflict, will stimulate the network security industry to change in deep investor relations activities, which has an extremely far-reaching impact. The development of the network security industry into a new generation of national defense industry is the main content of the general trend. The data connection and endpoint connection brought by 5g, AI and other new technologies have increased exponentially, and the digital system has become a new production network, facing more security challenges. Therefore, the traditional “fence” border defense idea is unsustainable. It is necessary to build the “overall defense” idea, connect all security equipment, data-driven security, and realize monitoring, analysis, response Overall defense system for disposal. In the long run, the future growth space of network security is large enough. As one of the leading manufacturers, CICA security inherits CICA’s nearly 30-year experience in network construction
In 2015, it integrated the business of trend technology in China, made great progress in the past few years, maintained the first position in the operator industry, ranked well in the market of terminal security, virtual machine security and identity security, and was rated as the first in China’s network software in 2019. In terms of track layout, the selection space is large enough, the height increases, and has technical advantages and market reputation in relevant tracks. These tracks will become the main source of rapid growth of CICA security in the next three years. The core technical concept of CICA security: the products to be laid out should focus on the cloud, network and end. Based on data-driven, identity security should be the first gateway of the data world, supported by threat intelligence, atomized security capabilities, connected and supported the security center, and build an overall defense solution with dynamic ideas, starting from terminal access to cloud applications and data access. Advantages of CICA security: a network security software company that understands the Internet and cloud. On the one hand, the network is not only the internal network of the enterprise, but also the large network of operators, because the backbone networks of the whole society are carried by operators. CICA security has a large number of system deployment in the core network, access network and support network of operators, including Internet access authentication, DNS and a series of network capabilities and data, which will be of great help to the whole network security. On the other hand, AsiaInfo security has inherited the technical and talent advantages of trend technology and carried out several rounds of iterations on its products after absorption. The product capacity has exceeded the absorbed version and is in a relatively advanced position in the field of cloud host protection in China. In the future, AsiaInfo security will continue to invest in research and development and maintain its leading position in the industry. Overall, our core advantage products are not chimney deployment, but can implement product linkage and follow the core idea of platform. All products are virtualized and deployed, and can be arranged. At the same time, we can get through all the data and instructions to realize automatic linkage disposal. Based on data aggregation, we can intelligently analyze the strategy of each product and issue it intelligently. This is our core strategy of all cloud, all connection and all intelligent platform. 2、 Q & a session: how to view the homogenization trend of the safety industry? A: it is normal that there are similarities in the promising directions, but each company will make its own development strategy and strategy based on its own enterprise endowment. The final development direction or path is related to each company’s gene, history and ability. When AsiaInfo Security launched its network security business in 2015, many friends had been ahead of us for many years. They were already very strong in border security, network security, firewall and other fields. Therefore, AsiaInfo security combined with its own advantageous products and chose security software to overtake in corners. Q: for products with large differentiation, will the degree of customization be higher?
A: it has something to do with the type and characteristics of customers themselves. If the scale of enterprise customers is large, the system is complex, and the production system, business system and it system are closely integrated, they will tend to use overall solutions or some customized products to meet personalized needs. If the customers are small and medium-sized enterprises, they prefer standardized products to meet their needs.
Q: if you expand to other industries, is there no way to avoid customization?
A: some security products are closely related to business, it system and production and operation, so there will be natural customization needs. Customization can be divided into two levels. One level requires products to be more developed or customized according to customer needs, or customers find that the stacking of original products leads to more deficiencies in product coordination, which requires a solution to meet the overall security requirements; The second level is the construction, consultation and operation services of the network integrated defense system.
Q: can the products sold during the service period continue to be used before the contract expires and has not been renewed? A: it can only be used after the contract is renewed.
Q: what is the driving force of CICA’s security growth?
A: the growth drivers of the company mainly include: first, the driving force of the sales side. We expand the growth space through the increase of sales; The second is the driving force of product capability. We meet the market demand by expanding our product line and improving our capability. In fact, this is a double spiral way, so that the two driving forces drive the growth of performance alternately.
Q: what is the turnover rate of accounts receivable of CICA security?
A: the turnover rate of accounts receivable is better than the industry average. More than 80% of our accounts receivable are within one year.
Q: why should the company increase the investment of sales personnel?
A: originally, the company mainly focused on operators. In the past, the scale of sales personnel was small. In order to achieve faster development, the company began to expand to finance, power, government and other industries, increasing the number of sales personnel in order to better contact and serve customers.
Annex list (if any) none
Date: March 24, 2022