Log in
Log in
Or log in with
Twitter Twitter
Facebook Facebook
Apple Apple     
Sign up
Or log in with
Twitter Twitter
Facebook Facebook
Apple Apple     
  1. Homepage
  2. Equities
  3. China
  4. Shenzhen Stock Exchange
  5. ZTE Corporation
  6. News
  7. Summary
    000063   CNE000000TK5


End-of-day quote Shenzhen Stock Exchange  -  2022-12-05
26.92 CNY   +0.60%
12/06Maryland governor bans use of TikTok on state devices
12/02U.S. judge dismisses indictment against Huawei CFO that strained U.S.-China relations
12/02German government not planning blanket Huawei ban
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector newsMarketScreener Strategies

ZTE Security Policy Assures Clients of Secure Network Products

09/28/2022 | 04:08am EST

Communication networks must be robust, particularly as the extent, variety, and complexity of today's cybersecurity threats grow tremendously. Leading in the telecommunication industry, ZTE Corporation places a premium on security and has created an effective governance framework that encompasses the whole product life span. In this way, ZTE security policy assures clients of secure network products, contributing to the establishment of a reliable communication network.

ZTE Corporation is famous as a global superpower in integrated communication schemes. Since its foundation, ZTE has been devoted to network infrastructure security, designing and producing secure and dependable equipment. Meanwhile, ZTE positively seeks cooperation with other industry leaders, operators, exploring industry security standardization.

It is well-known that third-party buddies are an integral part of the delivery crew. However, they may present new security concerns. ZTE has expanded its security protection borders in collaboration with third-party partners, forming effective partner management.

To assure the security and dependability of these third-party partners, a complex methodology is required for their security management. As a result, ZTE has established a certification management system with emphasis on the assessment of certification and the management of qualification, security, performance and credit, which are currently utilized throughout the third-party partner's entire life cycle, covering the selection, cooperation, and even exit phases.

Also, ZTE has developed and implemented a security baseline, which specifies the basic security requirements for products and services that third-party partners should meet. Before establishing cooperation with potential third-party partners, ZTE will check if they have passed an evaluation that includes cybersecurity and other issues. All certified and selected third-party partners are required to sign the Product Security Commitment, which outlines the product security obligations and liabilities associated with contract violations.

ZTE conducts a complete risk assessment on its third-party partners' service performance and security level on a regular basis, implements level-based management, and then defines future collaboration frequencies and options based on assessment results.

ZTE integrates the controls to the HPPD process, which is backed by the DevOps toolchain, and executes the whole lifecycle management of open-source providing by third-party components used in the production from its introduction to its end of life.

In order to comply with open-source licensing, export control, data protection, and the enterprise's product security red line criteria, ZTE thoroughly analyzes and verifies the functionalities and performance of components at the introduction stage of the third-party components.

In order to fulfill its service commitment to customers, ZTE also takes into account the replaceability of the components and the lifecycle that the supplier has promised to provide. The company's component management system can only accept third-party components that have passed the security evaluation and been certified. After approval, developers can gain access rights to the components and choose the ones they need for the desired products.

The product's chosen third-party components must pass security evaluation and meet ZTE's security requirements. Once a security flaw in one of the products is discovered during its life cycle by a customer, supplier, third party, or ZTE, ZTE will swiftly assess the flaw, offer solutions or risk-reduction strategies, and eradicate the risk.

At the same time, ZTE updates or abandons the third-party software through the component management system to make sure that the third-party software used in its product is the latest whenever the version of the third-party software is updated, or patches are introduced due to function, performance, or security needs, or at the ends of the third-party software lifecycle.

The HPPD process includes the node management and control of third-party software security risk assessment throughout the entire process, from component picking, introduction, testing, delivery, and maintenance to ensure that security risks are discovered in time for ZTE to provide the necessary security solutions or effective mitigation measures.

Additionally, in order to track its use, ZTE considers the third-party software to be a product configuration item and incorporates it into the configuration control process. If flaws are discovered later, ZTE can determine how widely they were used and fix all issues with the third-party software.

ZTE keeps tracking vulnerabilities reported by the community and contributes to offering vulnerability repair solutions as an active participant in the open-source community.

To build a reliable communication network for the whole society, ZTE aspires to invest more resources in the future to create, study, and invent security technologies and methods and optimise security management mechanisms. ZTE will continue to supply customers with trustworthy products and services.

Media Contact

Company Name: ZTE

Contact Person: Lunitta LU

Email: lu.na3@zte.com.cn

Country: China

Website: https://policy.zte.com.cn/

Source: www.abnewswire.com


(C) 2022 M2 COMMUNICATIONS, source M2 PressWIRE

All news about ZTE CORPORATION
12/06Maryland governor bans use of TikTok on state devices
12/02U.S. judge dismisses indictment against Huawei CFO that strained U.S.-China relations
12/02German government not planning blanket Huawei ban
11/28Trending : ZTE Equipment Banned By U.S. Government
11/28Soaring Covid cases in China spell trouble for global markets
11/28World shares fall as China protests, lockdowns cloud outlook
11/28Chinese Shares Finish Lower; Dahua, Hytera Fall Over 2% on US Ban
11/26U.S. bans new telecom equipment from Huawei, ZTE due to security risk
11/25US FCC bans sales, import of Chinese tech from Huawei, ZTE
11/25U.S. bans new Huawei, ZTE equipment sales, citing national security risk
More news
Analyst Recommendations on ZTE CORPORATION
More recommendations
Sales 2022 129 B 18 507 M 18 507 M
Net income 2022 8 502 M 1 216 M 1 216 M
Net cash 2022 11 281 M 1 613 M 1 613 M
P/E ratio 2022 14,9x
Yield 2022 1,32%
Capitalization 118 B 16 819 M 16 819 M
EV / Sales 2022 0,82x
EV / Sales 2023 0,69x
Nbr of Employees 72 584
Free-Float 74,6%
Duration : Period :
ZTE Corporation Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends ZTE CORPORATION
Short TermMid-TermLong Term
Income Statement Evolution
Mean consensus BUY
Number of Analysts 17
Last Close Price 26,92 CNY
Average target price 36,16 CNY
Spread / Average Target 34,3%
EPS Revisions
Managers and Directors
Zi Yang Xu President, CEO & Executive Director
Li Ying Chief Financial Officer & Executive Vice President
Da Xiong Xie Chairman-Supervisory Board
Zi Xue Li Chairman
Junshi Xie Chief Operating Officer & Executive Vice President
Sector and Competitors
1st jan.Capi. (M$)
ZTE CORPORATION-19.64%17 077
CISCO SYSTEMS, INC.-23.32%199 613
ARISTA NETWORKS, INC.-10.23%39 431
NOKIA OYJ-15.32%27 798