Huawei seeks to counter security concerns
- 24 October, 2012 14:23
Huawei Australia’s chairman has said a national cyber security centre should be built to test technologies for infrastructure projects, such as the National Broadband Network (NBN).
The company's proposal is in response to a recent US congressional report that issued a warning about potential backdoors that could be exploited by Chinese state agencies and the ban on Huawei participation in construction of the NBN.
In a speech to the National Press Club today, John Lord said developing effective cyber security frameworks is not just a challenge for Huawei and it should be approached collaboratively.
“Nobody has got it right yet, and as the ICT industry continues to develop so rapidly, it will continue to be a challenge for agencies to keep up with the pace of change…” he said.
“Huawei is proposing the establishment of a national cyber security evaluation centre, to test the security credentials of technologies being implemented into critical infrastructure projects.”
The centre would include testing products and equipment for critical infrastructure projects, including the NBN.
The centre could be funded by vendors and operated by Australian citizens who had passed security clearance, Lord said. He said the cost of setting up such a centre would depend on the centre’s level of sophistication and that Huawei had not yet spoken to other non-Chinese vendors about whether they would behind such a project.
Huawei was banned from participating in the construction of the NBN because of security concerns.
Lord said that while Huawei was “disappointed” that it was unable to participate in the NBN, “we have accepted the government’s decision and we have moved on”.
“Of course we stand at the ready if the situation changes, but we respect the government’s right to make such determinations,” Lord said.
Lord took also a swipe at the US government’s House Permanent Select Committee on Intelligence which recommended US telcos avoid deploying technology from Chinese vendors such as Huawei and ZTE because they may pose a security threat.
“We sincerely hope that in Australia, we do not allow sober debate on cyber security to become distorted the way it has in the US,” Lord said.
“The US committee report must be called for what it really is – protectionism, not security.”
Some observers have sided with Huawei, stating that the security concerns are paranoia and that the company is too big to risk its business this way.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Accelerate Cloud and Composite Application Delivery
Are your requirements the need for faster release cycles, you have reduced budgets required to run and manage a complex test environment, and you want to decrease your third party expenses? HP Service Virtualisation, designed to enable your teams to create, develop and test against virtual services that simulate real service behaviour with no constraints, available anytime.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.