How valid are the security concerns over Huawei and ZTE products?


Since the House Intelligence Committee released a report that warned against using network equipment from China due to security risks, and mentioned Huawei and ZTE by name. To be honest, I find it a little suspect because (1) it's October, just before the election, (2) it's a Republican ran committee, and (3) Mitt Romney has started criticizing Barak Obama as being "soft on China." The timing just seems a little too convenient.

That said, even a broken clock is right two times a day. Do they have a legitimate concern on this issue?  Would you be hesitant to use Huawei or ZTE products?  What are the alternatives anyway?

Topic: Security
Answer this Question


2 total
Vote Up (18)

I wouldn't touch either company's products with a ten foot pole. Why possibly expose your company to a security risk, if there are products available from other companies?

Even if the whole thing turns out to be hype, it's better to err on the side of caution with sensitive data. Can you imagine what would happen if you used those products and it came out later that those companies were, in fact, engaged in those activities?

Better safe than sorry.

Vote Up (13)

Very topical, there is an article on this issue on the landing page of IT World today.  The takeaway I got from that was that aside from security concerns, the issue for many companies is not that Huawei equipment is Chinese, the issue is that their network equipment is not as good as Cisco's.  Good point.


Aside from that, I think that the timing is blatantly political, but the concern is still valid, and that concern is not limited to a house committee trying to score political points.  Australia banned Huawai from contracts to build out the Australian National Broadband Network.  How can you be sure that there aren't ties to the China military with ZTE or Huawei - it's China after all.  And how would you tell if there are back doors anyway without a huge investment of time and effort? 


Just out of curiosity, I wonder if there will be any impact on either company's smartphone sales as a result of the bad publicity.  

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us: