ZTE’s Information Security Services

Release Date:2014-03-19 By Chen Zhiming Click:

 

 

Grim Situation of Information Security

IT applications typically associated with small business systems are being extended to larger, business-critical systems. More and more enterprises and government agencies are integrating their own IT networks into the internet. Information systems are becoming more globalized and fundamental to the operations of business, governments and organizations. Security for IT systems has thus become a much more pertinent issue. A recent example is the case of US retailer Target. Hackers used malware to penetrate Target’s point-of-sale and IT systems to obtain personal information, such as credit and debit card numbers, email addresses and phone numbers, of millions of customers. 

 

Massive Market for Information Security

China’s information-security industry is growing rapidly. The information-security market is moving out from the central government to the provinces, cities, and even counties. Information security is being extended from core-business security to all-business security, and more emphasis is being placed on network security maintenance. From 2006 to 2010, China’s information security market grew from RMB5.538 billion to RMB10.963 billion and had an annual compound growth rate of 18.62%. In 2013, the market grew to RMB19.43 billion. In 2015, the market is expected to grow further to RMB29.35 billion.

Hackers can counterfeit or tamper with the websites of businesses, banks, or online payment sites and expose users to malicious code that steals their private information. Hackers can also build massive botnets that spam users or mount dangerous cyber attacks. Governments, enterprises, and individuals have paid increasing attention to creating trusted information security environments, and this has contributed to increased demand for various information security services.

 

ZTE’s Information Security Services

ZTE has a great deal of experience in incorporating information security into every aspect of network planning, construction, and OAM. ZTE uses scientific, standardized information-security practices and can help an enterprise better understand IT, assess IT risks and weaknesses, improve system architecture, and create a secure operating environment. 

 

Secure Architecture: Consulting and Planning Services

ZTE provides comprehensive consulting and planning services on secure architecture. ZTE can help a customer analyze their security requirements in terms of policies, standards, and management practices and can tailor security solutions according to the customer’s needs. ZTE can create appropriate programs to help the customer implement security specifications and standards.

Creating a secure architecture involves classifying information assets, devising an enterprise-wide information security strategy, using information security specifications, and implementing information security processes and audits. It also involves assessing information system architecture, network architecture, and related security tools. Holistic planning is the first step in creating a secure architecture.

 

Information Security Assessment Services

ZTE surveys a customer’s business objectives and requirements, assesses information security risks, performs a difference analysis, and devises an information security policy. ZTE provides two levels of assessment for a customer’s critical information security infrastructure: quick or full. By assessing information assets and risks, ZTE helps a customer improve their information security and get more out of their investment in information security.

ZTE can also customize enterprise-wide information security plans and blueprints.

 

Information Security Reinforcement Services

ZTE can detect and audit networks, host systems, applications, and databases through benign intrusion and use of third-party tools. ZTE can make security proposals for the existing enterprise network architecture, system architecture, data architecture, application architecture, system operation, and physical environment. Customers can choose appropriate solutions according to their budget, resources, and security requirements. 

ZTE’s information security reinforcement services include reinforcing the security of network equipment, infrastructure, host system, application system, databases, and security equipment itself.

ZTE takes into account all security requirements, from business level to technical level, when devising security policies and strategies. ZTE helps the customer define clear security objectives and requirements and ensures staff to implement these. ZTE also develops core processes for managing information security. ZTE’s information security reinforcement services enable a customer to improve their architecture blueprint and roadmap so that the customer better understands the strength of their information security and identify potential threats. ZTE works with the customer to assess security policies, standards, and guidelines and ensure these are implemented by staff. ZTE strengthens information architecture against attack and makes it less vulnerable.