Securities code: Beijing Vrv Software Corporation Limited(300352) securities abbreviation: Beijing Vrv Software Corporation Limited(300352) Announcement No.: 2022027 Beijing Vrv Software Corporation Limited(300352) 2021 annual report summary
1、 Important note: the summary of this annual report comes from the full text of the annual report. In order to fully understand the company’s operating results, financial status and future development plan, investors should carefully read the full text of the annual report in the media designated by the CSRC. The directors of the company personally attended the meeting of the board of directors to consider this annual report. The audit opinion of ZTE caiguanghua Certified Public Accountants (special general partnership) on the company’s financial report this year is: standard unqualified opinion. Changes in accounting firm during the reporting period: the accounting firm of the company was changed from ZTE financial Guanghua accounting firm (special general partnership) this year. Tips of non-standard audit opinions □ applicable √ not applicable when the company is listed and is not profitable at present □ applicable √ not applicable to the profit distribution plan of ordinary shares or the plan of converting accumulation fund into share capital in the reporting period considered by the board of directors □ applicable √ not applicable. The company plans not to distribute cash dividends, bonus shares or convert accumulation fund into share capital. Preferred stock profit distribution plan for the reporting period adopted by the board of directors □ applicable √ not applicable II. Basic information of the company 1. Company profile
Stock abbreviation Beijing Vrv Software Corporation Limited(300352) stock code Beijing Vrv Software Corporation Limited(300352)
Shenzhen Stock Exchange
Contact person and contact information secretary of the board of directors securities affairs representative
Name: Wang Xiaona, Zhang Yueying
Room 1602, block C, science and technology development building, No. 34, Beijing Centergate Technologies (Holding) Co.Ltd(000931) South Street, Haidian District, Beijing; Room 1602, block C, technology development building, Haidian District, Beijing; Floor 3, building 3, yuquanhuigu phase 2, No. 3 minzhuang Road, Haidian District, Beijing
Fax: 01062147259
Tel: 010621404858073 010621404858073
E-mail [email protected]. The [email protected].
2. Introduction to main business or products during the reporting period
(I) main business of the company
The company is a leading enterprise in the field of terminal security management in China and a leading solution provider in the field of network and information security in China. It provides customers with industry-level and city-level systematic information service solutions covering software development, operation and maintenance management and system integration of network and information security. Users involve tens of thousands of units in important industries such as government, military, military industry, finance, energy and some cities. At present, the company’s product system has completed the creation of three patterns of “information security and information creation, mobile office and secure communication applications, smart community and health care”, making the company gradually become a comprehensive product provider and solution provider of smart security in the era of digital economy from a traditional terminal security leader. At the same time, as one of the important development strategies, Xinchuang platform security has launched complete Xinchuang platform security products and solutions, integrated many Xinchuang platforms, built a complete ecological chain, worked together to build an information technology application innovation system, provided safe and reliable integrated software and hardware solutions for industrial customers and urban customers, and provided more comprehensive and flexible information security guarantee from technology The area of products and solutions strongly supports the national information technology application and innovation development strategy, contributes more to the national information security construction and the development strategy of information innovation platform, and escorts the development of China’s digital economy.
During the reporting period, there was no significant change in the company’s main business.
(II) main products and uses
1. Information security and information creation
With the evolution of information and communication technology and the rapid development of the Internet, there is a trend of coexistence and development of PC terminals, mobile terminals, virtual terminals, industrial control terminals, special terminals for various businesses and other types of terminals in the field of daily office. The diversity of network access and massive data storage further expand the scope, connotation and extension of network security management, Beijing Vrv Software Corporation Limited(300352) comply with the market trend, The terminal security management system is extended from the traditional PC management to the unified management of intelligent terminals and pan terminals of various IP devices. It is the first security manufacturer in the industry to establish a “pan” terminal security management system, realizing the integrated management and control of various types of terminals; While establishing the “pan” terminal security management system, it has comprehensively laid out the boundaries and network security products such as network access control, firewall, intrusion prevention and monitoring, network security audit, etc. with the rapid development of Xinchuang market, Beijing Vrv Software Corporation Limited(300352) all products have released stable versions under Xinchuang platform, and provided customers with Pan terminal host security, data security The overall solutions for border and network security and a full range of security products have maintained a sustained and rapid growth trend in the industry.
1.1 full range of security products and solutions based on Xinchuang platform
In the field of information technology application and innovation (hereinafter referred to as “Xinchuang”), the company always attaches great importance to independent innovation, gives full play to its technical advantages, actively responds to the national strategic deployment, follows the requirements of relevant national technical specifications, constantly innovates and actively adapts to the hardware and software environment of independent innovation. At present, the stable operation versions of Beijing Vrv Software Corporation Limited(300352) all products have been released under the Xinchuang platform, Many important products have passed the tests of national competent authorities, and many of the key products have passed the tests of national competent authorities. They are the Kyland Technology Co.Ltd(300353) 53535353535 electronic document classification mark management system Beijing Vrv Software Corporation Limited(300352) electronic document sending information steganography traceability system, Beijing Vrv Software Corporation Limited(300352) electronic document security management system, etc.
The popularization of independent innovation software and hardware platform has brought new opportunities for the further development of the company’s information security product system. The company will work with many enterprises in the ecological chain of the information innovation platform to create an innovative and reliable ecosystem, provide industry customers with safe, reliable and applicable integrated software and hardware solutions and more perfect and reliable information security guarantee, and contribute more to the national information security construction and the development strategy of the information innovation platform.
1.2 boundary and network security system
The boundary and network security system is the basis of the overall solution of Beijing Vrv Software Corporation Limited(300352) information innovation platform, and constructs a basic defense environment for the Intranet environment. The boundary and network security product system is committed to ensuring the integrity of the network boundary and the security of the network environment. It mainly effectively detects and controls the access network equipment and the data flow in and out of the network boundary. The effective detection mechanism includes network-based intrusion detection, boundary content access filtering, etc. the effective control measures include network access control, intrusion protection, scanning detection, audit traceability, etc, The main products include network access control system, network boundary monitoring system, video security monitoring system, web application firewall, anti denial of service system, disaster recovery backup system, security operation and maintenance audit system, security log audit system, risk monitoring and scanning system, network security audit system, second-generation firewall, intelligent intrusion prevention monitoring system, Internet behavior management system and other products.
1.3 “pan” terminal host security system
Relying on the leading position in China’s terminal security management market, the company actively innovates and forge ahead, takes the lead in establishing a “pan” terminal security management system and brings all kinds of terminals into the scope of integrated control; It also develops the terminal security management from event driven to active defense, covering the full-featured closed-loop management system of terminal discovery, security configuration verification, host reinforcement, security management, detection and response, off-line audit and so on. The main products include intranet security management system, anti-virus system, host monitoring and audit system, server audit system, terminal security login system, security configuration verification management system, operating system security reinforcement system, terminal detection and response system (EDR) and other products; Among them, the host monitoring and audit system, terminal security login system and anti-virus system continue to be in the leading position in the market, and have also made great achievements in the field of information innovation. “Pan” terminal host security is the protection subject of the overall solution of Beijing Vrv Software Corporation Limited(300352) Xinchuang platform, and its main purpose is to build a defense mechanism for the terminal host system itself.
1.4 data security system
Data is the core asset of enterprise informatization, so the data security product system is the real protection focus of the overall solution of Xinchuang platform Beijing Vrv Software Corporation Limited(300352) data security product system is committed to ensuring the security of intranet data assets. It mainly focuses on the intelligent identification of content, takes the intranet as the scope, takes the whole network data protection as the main protection goal, and takes detection, control, warning and analysis as the means to carry out accurate analysis and protection of enterprise data, know the data distribution and risks, and then protect data assets. The main products include computer terminal confidentiality inspection system, data leakage protection system, electronic document security management system, printing and recording control system, document sending information steganography traceability system, database audit and security protection system, data backup and recovery system, data desensitization system, mobile storage management system and secure USB flash disk. Data security products have been widely promoted in many industries and recognized by the market.
1.5 industrial control safety
Beijing Vrv Software Corporation Limited(300352) continues to pay attention to the field of industrial control security. Over the years, it has devoted itself to the research and development of innovative industrial control security products. Now it has formed a complete industrial control network security integration scheme Beijing Vrv Software Corporation Limited(300352) industrial control network security integration solution is a completely independent and innovative network security integration solution, which is suitable for the construction of enterprise industrial control network and the security protection of industrial control core area. The integration scheme is realized through the network boundary security control system. The system includes four parts: key platform, authentication client, boundary authentication machine and management control server. All parts cooperate with each other to realize industrial control network construction, network boundary construction monitoring, equipment authentication and access, unified asset management and unified strategy control. Based on the principle of social control and the concept of zero trust, the network boundary security control system adopts the support of state secret technology, and is independently designed on the basis of widely absorbing the advantages of advanced security protection models such as PDR, P2DR and IATF. The network security boundary is uniformly constructed through the boundary authentication machine with embedded security function, and the authentication access and access control of computers, dumb terminals and other equipment entering the network are carried out at the unified network boundary, Comprehensively manage and control the network access and equipment. The server side, boundary authentication machine, authentication client and other components of the system cooperate with each other to build a new security defense line at the network boundary, and embed the functions of security authentication and access on the main path of the network to realize the security protection of the core area of the industrial control network; The system adopts state secret technology to open, integrate and integrate the security capabilities of various plug-in security applications to form a unified network security intelligent brain, network resource management platform, network resource control platform and security policy management platform. With unified and integrated security intelligence, comprehensive and fine security strategy and fast and active security control, the system can truly build a network security collaborative defense system and realize active, dynamic and collaborative protection of network security, Substantially improve the organization’s network security technology and management level.
During the reporting period, we achieved innovative breakthroughs in theory and technology, and developed a variety of innovative industrial control security products: industrial control security guards, industrial security switches, network boundary detection systems, etc., forming an overall industrial control network security solution. The products have established demonstration projects in many industries, which have been recognized by the market and have a promising future. 1.6 big data security
With the concept of “big data drives intranet security and big data improves management efficiency”, the company speeds up the deep integration of big data technology and existing products. Make full use of big data technology, constantly strengthen the breadth and depth of terminal security management, and strive to build a new generation of intranet security product ecosystem guided by “big data” technology. The company’s big data platform is an enterprise level big data processing, analysis and mining platform. Combined with the new regulatory and management requirements, it analyzes and evaluates user behavior and business data by collecting data such as terminal behavior, network traffic and security equipment, relying on artificial intelligence algorithms and in-depth learning engine, so as to help enterprises actively respond to threats and risks and master the security situation and business status of the whole network at all times. The products are mainly for the government, wechat, public security, industry competent units and enterprises and institutions in important industries. The main products include network security management system, security situation analysis system, operation and maintenance management system, dynamic access control system (environment awareness system), comprehensive audit platform and confidentiality self-regulation platform.
During the reporting period, the company’s big data security technology and products were widely recognized by the industry, and the bidding projects were repeatedly won. Based on the background that the company’s terminal security management products have been deployed in tens of millions of terminals in government, energy, finance and other important industries on a large scale, Beijing Vrv Software Corporation Limited(300352) big data security products can be deployed quickly and provide security guarantee for national key information infrastructure and important information systems.
1.7 blockchain and related security
Relevant strategic R & D teams of the company have carried out R & D work in the field of blockchain, including the research and development of digital wallet. The company is actively exploring cooperation opportunities with relevant financial institutions and expanding the research and development of related technologies between digital wallet and Xinyuan Doudou. The blockchain machine independently developed by the company and Hangzhou Ancun Network Technology Co., Ltd. integrates China’s independently developed Beidou technology and blockchain technology, which is of great significance for the deposit of data information. Blockchain can help enterprises get on the blockchain simply and conveniently. As long as enterprises deploy the blockchain machine on the computer room server (or cloud server), they can turn electronic data into blockchain data. The blockchain machine also records the generation time of electronic data and the geographical location of the server that generates electronic data, so as to ensure the authenticity of data before and after being on the chain. Blockchain machines have been applied and deployed in some industries, including aerospace, environmental protection