Tag

zero-trust

0 views collected around this technical thread.

iQIYI Technical Product Team
iQIYI Technical Product Team
Jun 12, 2025 · Operations

How iQIYI’s “Qijing” Platform Revolutionizes Testing Across Devices and Teams

This article explores iQIYI’s comprehensive testing ecosystem, detailing industry trends, the platform’s multi‑terminal challenges, fragmented legacy solutions, and the unified, cloud‑native “Qijing” environment that streamlines test access, zero‑trust security, and real‑world validation for rapid product delivery.

Cloud NativeiQIYIoperations
0 likes · 20 min read
How iQIYI’s “Qijing” Platform Revolutionizes Testing Across Devices and Teams
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureComplianceData Security
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Dec 13, 2023 · Information Security

XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation

XiaoHongShu’s award‑winning Zero‑Trust SASE Office Security Solution integrates all‑in‑one DLP, anti‑virus, identity‑bound access and distributed POPs to replace fragmented agents, delivering real‑time risk control, data‑non‑landing protection, multi‑level disaster recovery, and achieving 100% device coverage, an 80% reduction in data leakage and a 70% internal NPS after one year.

Data SecurityOffice SecuritySASE
0 likes · 14 min read
XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation
Cloud Native Technology Community
Cloud Native Technology Community
Jul 20, 2023 · Information Security

Implementing Zero‑Trust Security in Kubernetes with Service Meshes (Linkerd)

This article explains how to achieve zero‑trust security in Kubernetes by using a service mesh such as Linkerd, covering workload identity, mTLS, certificate management, policy definition with CRDs, and the practical limitations of mesh‑based protection.

KubernetesLinkerdService Mesh
0 likes · 11 min read
Implementing Zero‑Trust Security in Kubernetes with Service Meshes (Linkerd)
JD Tech
JD Tech
Apr 26, 2023 · Information Security

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

Digital TransformationInformation securityJD.com
0 likes · 6 min read
Overview of JD.com's Five‑Element Zero Trust Security Framework
DevOps
DevOps
Mar 20, 2023 · Information Security

2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability

The 2023 DevSecOps forecast highlights five major trends—including prioritizing software supply‑chain security, embedding security education in DevOps, pervasive AI/ML across the SDLC, deeper value‑stream analysis, and left‑shifting observability—while emphasizing zero‑trust, SBOM adoption, and the growing role of security in cloud‑native environments.

AI/MLDevSecOpsObservability
0 likes · 7 min read
2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability
Cloud Native Technology Community
Cloud Native Technology Community
Sep 9, 2022 · Cloud Native

Istio Ambient Mesh: A New Data Plane Model That Eliminates Sidecar Overhead

Istio's ambient mesh introduces a shared‑node ztunnel and optional waypoint proxies to provide zero‑trust security and optional L7 features without sidecar injection, reducing invasiveness, resource waste, and operational complexity while maintaining full mesh functionality.

Ambient MeshIstioKubernetes
0 likes · 13 min read
Istio Ambient Mesh: A New Data Plane Model That Eliminates Sidecar Overhead
AntTech
AntTech
Jun 21, 2022 · Information Security

Zero Trust Security Model and Technical Architecture for Ant Financial Office

This article examines the evolution from traditional perimeter‑based security to zero‑trust models, compares their advantages, presents industry case studies, and details Ant Financial’s integrated zero‑trust architecture—including SDP, IAM, and micro‑segmentation—along with implementation practices and future outlook.

Enterprise SecurityIAMMicro Segmentation
0 likes · 17 min read
Zero Trust Security Model and Technical Architecture for Ant Financial Office
DataFunSummit
DataFunSummit
May 17, 2022 · Information Security

Data Security Governance Practices and Frameworks: A Comprehensive Overview

This article presents a detailed overview of data security governance in China, covering policy milestones, major security incidents, current challenges, a three‑layer governance model, practical workflow steps, classification methods, emerging zero‑trust concepts, and real‑world case studies, offering actionable insights for organizations seeking robust data protection.

Big DataComplianceData Security
0 likes · 11 min read
Data Security Governance Practices and Frameworks: A Comprehensive Overview
58 Tech
58 Tech
Apr 28, 2022 · Information Security

Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System

The article presents a comprehensive case study of the Magic Butler system—a zero‑trust security management solution developed by 58 Group’s TEG department—detailing its business drivers, design principles, architecture, key technical features, deployment scale, and future outlook for enterprise network security.

Access ControlEndpoint ManagementEnterprise Security
0 likes · 14 min read
Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System
Top Architect
Top Architect
Apr 18, 2022 · Information Security

Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience

This article provides a comprehensive overview of zero‑trust security, explaining its core principles, architectural models such as SDP, various implementation approaches (application‑layer proxy, traffic‑layer proxy, hybrid), deployment patterns for office and multi‑branch environments, practical rollout experience, and how zero‑trust integrates with existing security products.

Access ControlSDPSecurity Deployment
0 likes · 15 min read
Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience
Architecture Digest
Architecture Digest
Apr 14, 2022 · Information Security

Zero Trust Architecture: Concepts, Implementation Models, and Deployment Practices

This article provides a comprehensive overview of zero‑trust security, explaining its core principles, SDP‑based architecture, three main implementation models (application‑layer proxy, traffic‑layer proxy, and hybrid), various deployment scenarios, and practical guidance for enterprise adoption.

Access ControlEnterprise SecuritySDP
0 likes · 13 min read
Zero Trust Architecture: Concepts, Implementation Models, and Deployment Practices
DevOps
DevOps
Mar 30, 2022 · Information Security

BeyondProd: Google’s Cloud‑Native Security Model for Microservices

This whitepaper explains Google’s BeyondProd security framework, detailing how cloud‑native microservice architectures replace traditional perimeter models with zero‑trust principles, mutual authentication, service mesh, and automated tooling such as ALTS, Binary Authorization, and gVisor to protect workloads across shared infrastructure.

BorgCloud NativeGoogle
0 likes · 27 min read
BeyondProd: Google’s Cloud‑Native Security Model for Microservices
Architects' Tech Alliance
Architects' Tech Alliance
Dec 17, 2021 · Operations

Overview of Data Processing Units (DPUs) and Their Role in Modern Data Centers

This article provides a comprehensive overview of Data Processing Units (DPUs), tracing their evolution from smart NICs, explaining their architecture, advantages such as workload offloading, zero‑trust security, and compute‑storage separation, and discussing future trends and NVIDIA's roadmap for integrated CPU‑GPU‑DPU solutions in data‑center and edge environments.

DPUData Centercloud computing
0 likes · 15 min read
Overview of Data Processing Units (DPUs) and Their Role in Modern Data Centers
Architects' Tech Alliance
Architects' Tech Alliance
Oct 12, 2021 · Cloud Computing

2021 Cloud Computing Top Ten Keywords and Development Trends

The 2021 Trusted Cloud Conference in Beijing unveiled ten key cloud computing trends—including cloud native, high‑performance computing, chaos engineering, hybrid cloud, edge computing, zero‑trust, optimized governance, digital government, low‑carbon cloud, and enterprise digital transformation—highlighting the strategic direction of China's cloud industry.

Cloud NativeDigital TransformationEdge Computing
0 likes · 8 min read
2021 Cloud Computing Top Ten Keywords and Development Trends
Architects' Tech Alliance
Architects' Tech Alliance
Jul 27, 2021 · Cloud Computing

2021 Cloud Computing Top Ten Keywords and Emerging Trends

At the 2021 Trusted Cloud Conference, the China Academy of Information and Communications Technology released the top ten cloud computing keywords—cloud native, high performance, chaos engineering, hybrid cloud, edge computing, zero trust, optimized governance, digital government, low‑carbon cloud, and enterprise digital transformation—highlighting their significance and future development directions.

Cloud NativeDigital TransformationEdge Computing
0 likes · 9 min read
2021 Cloud Computing Top Ten Keywords and Emerging Trends
Beike Product & Technology
Beike Product & Technology
Jun 18, 2021 · Information Security

Zero Trust Network Architecture: Components and Implementation

This article details the design and implementation of a zero‑trust network architecture, covering policy modeling (SARE), management realms, decision center components, L4/L7 gateways, security clients, risk assessment, and integration with SIEM for continuous trust evaluation.

Gateway ArchitectureSARE ModelSIEM Integration
0 likes · 13 min read
Zero Trust Network Architecture: Components and Implementation
Beike Product & Technology
Beike Product & Technology
Jun 18, 2021 · Information Security

Zero Trust Network Architecture: Challenges, Principles, and Implementation Overview

This article outlines the limitations of traditional perimeter‑based IT security, introduces the Zero Trust philosophy and its six core principles, and presents a practical, layered architecture with components and prioritized steps for building a Zero Trust network in modern enterprises.

Access ControlRisk Assessmentarchitecture
0 likes · 12 min read
Zero Trust Network Architecture: Challenges, Principles, and Implementation Overview
Cloud Native Technology Community
Cloud Native Technology Community
Dec 1, 2020 · Information Security

Cloud Native Security Whitepaper – A Comprehensive Guide to Securing Cloud‑Native Development, Deployment, and Operations

This whitepaper provides a detailed, end‑to‑end framework for organizations and technical leaders to understand, implement, and continuously improve security across the cloud‑native lifecycle—covering development, release, deployment, runtime, supply‑chain protection, zero‑trust architecture, and compliance—while emphasizing automation, observability, and cross‑functional collaboration.

Cloud NativeContainerDevSecOps
0 likes · 58 min read
Cloud Native Security Whitepaper – A Comprehensive Guide to Securing Cloud‑Native Development, Deployment, and Operations
Python Programming Learning Circle
Python Programming Learning Circle
Feb 8, 2020 · Artificial Intelligence

Nine Recommended Programming Books for Home Learning

During the stay‑at‑home period, this article suggests nine concise programming books covering Python neural networks, web crawling, deep learning with PyTorch, machine learning fundamentals, zero‑trust network security, classic programming pearls, Python mathematics, AI algorithms, and Vim text processing, each with brief descriptions and images.

AIPythonVim
0 likes · 9 min read
Nine Recommended Programming Books for Home Learning