Company code: 360 Security Technology Inc(601360) company abbreviation: 360 Security Technology Inc(601360) 360 Security Technology Inc(601360)
Summary of annual report 2021
Section I important tips
1 the summary of this annual report comes from the full text of the annual report. In order to fully understand the company’s operating results, financial status and future development plan, investors should go to www.sse.com com. cn. The website carefully reads the full text of the annual report. 2. The board of directors, the board of supervisors and the directors, supervisors and senior managers of the company guarantee the authenticity, accuracy and completeness of the contents of the annual report, and there are no false records, misleading statements or major omissions, and bear individual and joint legal liabilities. 3. All directors of the company attend the board meeting. 4 Deloitte Touche Tohmatsu (special general partnership) has issued a standard unqualified audit report for the company. 5. The profit distribution plan or the plan of converting accumulation fund into share capital in the reporting period adopted by the resolution of the board of directors
After deliberation at the 8th meeting of the 6th board of directors of the company, the profit distribution plan of the company for 2021 is drawn up as follows: Based on the number of share capital that can be distributed on the equity registration date when the profit distribution plan for 2021 is implemented (the total share capital deducting the share balance of the company’s special repurchase account) as the base, a cash dividend of RMB 1 (including tax) will be distributed for every 10 shares. The above profit distribution plan has been approved by the independent directors of the company and needs to be submitted to the general meeting of shareholders for deliberation and approval.
Section II basic information of the company
1 company profile
Company stock profile
Stock type stock exchange stock abbreviation stock abbreviation before stock code change
A-share Shanghai Stock Exchange 360 Security Technology Inc(601360) 360 Security Technology Inc(601360) Jiangnan Jiajie
Contact person and contact information secretary of the board of directors securities affairs representative
Name: Zhao Luming, Hu Xiao
Office address: block a, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing block a, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing
Tel: 0105682181601056821816
E-mail Q- [email protected]. q- [email protected].
2. Introduction to the company’s main business in the reporting period
In recent years, with the deepening of the digitization of the whole society, the wave of industrial digitization with “digital twin” as the core will become an important driving force for the evolution of human society from the era of industrial civilization to the era of digital civilization. In the “14th five year plan” and 2035 long-term goal outline released in March 2021, the central government clearly put forward the strategic goal of “developing digital economy and building digital China”, meet the digital era, activate the potential of data elements, promote the construction of network power, accelerate the construction of digital economy, digital society and digital government, and drive the transformation of production mode, lifestyle and governance mode with digital transformation as a whole. In January 2022, the State Council issued the “14th five year plan” for the development of digital economy, which clearly proposed to take data as the key element and the deep integration of digital technology and real economy as the main line, strengthen the construction of digital infrastructure, improve the digital economy governance system, jointly promote digital industrialization and industrial digitization, enable the transformation and upgrading of traditional industries, and cultivate Shenzhen New Industries Biomedical Engineering Co.Ltd(300832) new business forms and new models, Continue to strengthen, optimize and expand China’s digital economy, so as to provide strong support for the construction of Digital China. The plan also points out that by 2025, the added value of core industries of digital economy will account for 10% of China’s GDP. Looking forward to 2035, we will strive to form a unified, fair, orderly competition, mature and complete modern market system of digital economy, and the development level of digital economy ranks among the top in the world. Digitization has become the consensus of our country from top to bottom and from inside to outside. Under the background of such a big era, the importance of security is more prominent. Only by solving the problem of security, can the country’s digitization develop rapidly and steadily. In the era of computer security, in the mainstream virus defense strategy, collecting samples mainly depends on manufacturer exchange and user feedback. The core competitiveness of enterprises is the capacity and update frequency of virus database. In essence, it is the installed capacity of anti-virus software. In the era of network security, the number of threats faced by users has increased exponentially, and its complexity and concealment have also deepened simultaneously. The protection ability provided by the existing system based on scanning and defending against malware is often a passive protection system set in the user’s IT architecture, just like building traditional fortifications to protect the security of the city, which can not solve the modern new complex attacks. Only when the protection system has the ability of continuous evolution, such as sending “scouts” on the basis of traditional defense fortifications to find potential attacks ahead and send back intelligence to help the defense system make more accurate decisions, can it be invincible in modern network security threats. Crowdstrike of the United States is a successful pioneer of this concept in a sense. The company’s core product, crowdstrikefalcon, is a set of terminals that can evolve continuously. By transforming security capabilities into a series of single lightweight agents, users can protect against malware without updating their signatures every day. At the same time, its new protection mechanisms such as machine learning, behavior analysis and continuous monitoring can also better adapt to the current situation of fast iterative network security threats.
In the 1920s of the 21st century, 5g, IOT, industrial Internet and other rapidly advancing digital processes showed an important trend – the era of consumer Internet in the first half, in the form of changing Lbx Pharmacy Chain Joint Stock Company(603883) lifestyle and carrying demographic dividend, has ended, and the era of industrial Internet in the second half has come. The core foundation of all this is digital twinning, that is, using the perception ability of the Internet of things and a large number of sensors to digitize every state of the physical world, transmit massive data to the cloud through various protocols of the wireless Internet, manage these big data in the cloud through powerful cloud storage and cloud computing capabilities, and make the unmeasurable physical world measurable after digitization.
At the same time, because the digital twin is the real-time mapping of the physical world in the virtual world, the unpredictable chaotic development state in the physical world can be simulated by modeling in the virtual world. Through the self-learning ability of artificial intelligence, we can make some speculation on the development state of the physical world and provide some reference for the decision-making of the physical world.
However, while new technology improves the efficiency of various industries and people’s living standards, it will inevitably bring potential unsafe factors. Everything can be programmed, everything should be interconnected, and big data-driven business will become the characteristics of the future digital era. Generally speaking, software defines the world.
“Everything is programmable” means that there are loopholes where it can be programmed. According to incomplete statistics, every 1000 lines of code written by programmers will inevitably produce 4-6 vulnerabilities. With the deepening of digitization, the number of vulnerabilities will increase at the rate of geometric progression if the codes are related to each other in the form of matrix;
“Everything should be interconnected”, which means that the attack on virtual space can be transformed into damage to the physical world. Such negative events have emerged one after another in recent years. For example, the oil supply system on the east coast of the United States has collapsed and almost entered a state of emergency. Once a similar event occurs, it will have an irreparable impact;
“Big data driven business” means that the value of data expands rapidly. In the past, big data may be able to build user portraits for Internet enterprises, so as to improve the efficiency of traffic realization to some extent. In the digital age, through the mining of big data, especially the intervention of national hacker organizations, we can even have insight into the strategic decision-making of a country, the development trend of a city or an industry. This is the core reason why the regulations on the protection of key information infrastructure need to be issued after the promulgation of the network security law;
“Software defines the world” means that the physical world we live in is inseparable from software. People use the intelligent perception of the Internet of things and the huge number of sensors of the Internet of things to digitize every state of the physical world, transmit the data to the cloud in real time through 5g and other wireless Internet protocols, and simulate and measure the contents that cannot be estimated in the real world through the powerful computing power of the cloud big data platform, enabling the development of the physical world. In the rapid development stage of China’s digital process, national governance, social operation, government management, infrastructure and industrial operation, as well as people’s daily life, will be built on software, network and data. These software, networks and data will be presented in digital form, which will aggravate the vulnerability of the digital society.
The above shows that in the future digital era, the security threats of cyberspace will be integrated with various scenes of our real world. The security problems in the past showed the characteristics of fragmentation, which can be simply classified into boundary security, traffic security, terminal security, etc. then you can apply the right medicine to the case, and buy equipment or install software to solve the problems; The future security problems will be extremely complex. Artificial intelligence, cloud, communication links and so on. Each scenario may not exist independently and can not be solved by traditional security products or security technologies. Therefore, the security industry needs to be upgraded to digital security to match the national digital strategy and the process of mankind entering the stage of digital civilization.
360 company has seen the new trend of the development of the network security industry. Through continuous security R & D investment and technological innovation, 360 company has launched a distributed intelligent security system – “360 security brain”, trying to build an overall defense strategy system that can serve users at different levels and scales, aiming to grow together with China’s network security industry and work together to improve the comprehensive network defense capability.
For details, see “discussion and analysis of operation” in Section III, part I of the company’s annual report 2021. 3 main accounting data and financial indicators of the company 3.1 main accounting data and financial indicators in recent three years
Unit: thousand yuan currency: RMB
20212020 compared with 2019 of the previous year
Increase or decrease (%)
Total assets 4203948444261773 -5.0233751570
Net assets attributable to 3500652136825916 -4.9428700288 shares of listed companies
Operating income 1088583211614731 -6.2812841095
The net profit attributable to the listed company shares 9022392912505 -69.025980435 East belongs to the listed company shares
East’s net profit after deducting non recurring 6083042546767 -76.113524621 profits and losses
Net cash flow from operating activities 1655821942970 -91.482759929
Weighted average net assets closed at 2.50 9.61, decreased by 7.11 percentage points and 22.95 profit rate (%)
Basic earnings per share (yuan / 0.13, 0.43 -69.77, 0.88 shares)
Diluted earnings per share (yuan / 0.13, 0.43 -69.77, 0.88 shares) 3.2 main accounting data by quarter in the reporting period
Unit: thousand yuan currency: RMB
First quarter second quarter third quarter fourth quarter
(January March) (April June) (July September) (October December)
Operating income 2552029306740229195682346833
270417301634431618 (101430) attributable to shareholders of listed companies