<!--网页结构化数据标签--> <meta property="og:title" content="ZTE Releases 2019 Cybersecurity White Paper - ZTE Press Release"> <meta property="og:description" content="3 April 2019, Shenzhen, China - ZTE Corporation (0763.HK / 000063.SZ), a major international provider of telecommunications, enterprise and consumer t......"> <meta property="og:url" content="20190403e1.html"> <meta property="og:type" content="website"> <meta property="og:locale" content="en"> <link href="../../../Asserts/Global/images/common/zte.ico" rel="Shortcut Icon" /> <link href="../../../../res-m.51javac.com/Asserts"/>宅男影院-宅男在线-宅男影院在线视频-宅男影院高清观看-宅男影院免费观看 - 八戒影视-八戒影视在线-八戒影视免费观看

ZTE Releases 2019 Cybersecurity White Paper

Release Time:2019-04-03
宅男影院-宅男在线-宅男影院在线视频-宅男影院高清观看-宅男影院免费观看 - 八戒影视-八戒影视在线-八戒影视免费观看
Cancel
Date:2019-04-03 ZTEClick:2118

3 April 2019, Shenzhen, China - ZTE Corporation (0763. HK / 000063. SZ), a major international provider of telecommunications, enterprise and consumer technology solutions for the Mobile Internet, today releases its 2019 Cybersecurity White Paper, which elaborates on ZTE's insights, principles, strategies, and practices concerning cybersecurity. The white paper concentrates on ZTE’s multi-layer security system and commitment to providing customers with end-to-end security assurance for products and services.   In the 5G era, technologies like cloud computing, the Internet of Things (IoT), big data, and AI bring about a new industry revolution, which, in the meantime, has resulted in increasingly serious and rampant cybersecurity threats across the globe.   ZTE’s Cybersecurity White Paper elaborates its cybersecurity governance architecture based on three lines of defense. The first line of defense is managed by each business unit, which is responsible for implementing self-control over cybersecurity 八戒影视免费观看. The second line of defense is operated by the company's Product Security Dept. which is in charge of the independent security assessments and supervision. The third line of defense is the company’s Internal Control & Audit Dept, which checks and audits the effectiveness of the first and second lines of defense. At the same time, ZTE accepts the security audits organized by customers and external third parties.   Meanwhile, the white paper also describes ZTE's end-to-end product security practices, covering a wide range of practices from R&D security, supply chain security, delivery security and personal data protection to security incident management, independent security assessment and cybersecurity lab building. In the white paper, ZTE reviewed its milestones in cybersecurity and its vision for the future as well. “Cybersecurity is one of the highest priorities of ZTE's product R&D and delivery practices, ZTE attaches utmost importance to our customers' security values. ,” said Zhong Hong, Chief Security Officer of ZTE. “Currently, cybersecurity threat is one of the most common threats that customers are faced with along with us. Customers are most concerned if we have sufficient security measures to ensure the secure operation of their equipment and services. ” “The company abides by the relevant laws and regulations within the realm of cybersecurity, and ensures end-to-end delivery of secure and reliable products and services,” continued Mr Zhong Hong. ZTE continues to communicate and cooperate with operators, regulatory agencies, partners, and other stakeholders in an open and transparent manner with respect to continuous improvement in its cybersecurity practices. Furthermore, the company respects legitimate rights and interests of users and end users, and keeps innovating and improving its management and technical practices.   ZTE has been committed to providing customers with secure and trustworthy products and services, while creating a secure cyber environment together with all stakeholders and maintaining a sound security order for cyberspace.   ZTE Cybersecurity White Paper.