• Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

ZTE a major international provider of telecommunications, enterprise and consumer technology solutions for the Mobile Internet, today releases its 2019 Cybersecurity White Paper, which elaborates on ZTE's insights, principles, strategies, and practices concerning cybersecurity. The white paper concentrates on ZTE’s multi-layer security system and commitment to providing customers with end-to-end security assurance for products and services.

 In the 5G era, technologies like cloud computing, the Internet of Things (IoT), big data, and AI bring about a new industry revolution, which, in the meantime, has resulted in increasingly serious and rampant cybersecurity threats across the globe.

ZTE’s Cybersecurity White Paper elaborates its cybersecurity governance architecture based on three lines of defense. The first line of defense is managed by each business unit, which is responsible for implementing self-control over cybersecurity.

The second line of defense is operated by the company's Product Security Dept. which is in charge of the independent security assessments and supervision. The third line of defense is the company’s Internal Control & Audit Dept, which checks and audits the effectiveness of the first and second lines of defense. At the same time, ZTE accepts the security audits organized by customers and external third parties.

Meanwhile, the white paper also describes ZTE's end-to-end product security practices, covering a wide range of practices from R&D security, supply chain security, delivery security and personal data protection to security incident management, independent security assessment and cybersecurity lab building. In the white paper, ZTE reviewed its milestones in cybersecurity and its vision for the future as well.

“Cybersecurity is one of the highest priorities of ZTE's product R&D and delivery practices, ZTE attaches utmost importance to our customers' security values.,” said Zhong Hong, Chief Security Officer of ZTE. “Currently, cybersecurity threat is one of the most common threats that customers are faced with along with us. Customers are most concerned if we have sufficient security measures to ensure the secure operation of their equipment and services.”

“The company abides by the relevant laws and regulations within the realm of cybersecurity, and ensures end-to-end delivery of secure and reliable products and services,” continued Mr Zhong Hong.

ZTE continues to communicate and cooperate with operators, regulatory agencies, partners, and other stakeholders in an open and transparent manner with respect to continuous improvement in its cybersecurity practices. Furthermore, the company respects legitimate rights and interests of users and end users, and keeps innovating and improving its management and technical practices.

ZTE has been committed to providing customers with secure and trustworthy products and services, while creating a secure cyber environment together with all stakeholders and maintaining a sound security order for cyberspace.

Pin It