|
With the popularity of internet applications, various application systems use the TCP/IP protocol (Transmission Control Protocol/Protocol) being a standard signal transmission, such as electricity, water, air conditioning, temperature control, lighting control, etc. The advantage is the standardization and simplification among various application systems. The disadvantage is that the network hackers and virus attack application systems via TCP/IP. In order to deal with hackers, network information security industries continue to improve their anti-hack technique. Although a variety of information security devices can prevent hacker from attacks, but not every enterprises or government unit is affordable of all the information security protective equipment. This study utilizes the theory of destructive innovation (Christensen 1997) as a tool to analyze the competitive advantage in three aspects: technology, price, innovative business model Finally, the findings of the study are : 1. Firewall to the UTM Firewall is a way of disruptive innovation, and is also the information security device trend; 2. through the disruptive innovation of middle and low-end UTM firewall devices, the device can be more popular; 3. Customers can benefit from a lower price of a high-end UTM firewall through the disruptive innovation of business model.
|