Feeds

Huawei stymied by India security fears

Huawei is a danger, no kit from the reds

Gartner critical capabilities for enterprise endpoint backup

Chinese telecoms equipment providers are suffering because of fears that their kit contains backdoors for the Chinese government to listen in

Huawei is currently bidding to provide mobile network equipment in southern India. In fact, after a court case ruled out a bid from Nokia-Siemens, it is the only firm still in the running. But the Indian media has reported that granting the contract to the Chinese firm would be a security risk.

Huawei, which was founded by an ex-People's Liberation Army officer, has faced similar concerns in the UK and Australia.

The firm's Indian sales boss told the FT that this was no more than negative spin from rival companies. Vikas Dewan said: "As we are getting big enough to trouble our biggest competitors, there are allegations emerging similar to those we faced in the US."

Huawei has attracted such concerns partly because of its founder and partly because its precise ownership is not known - although the Chinese government is assumed to have an interest.

Huawei's attempt to take over 3Com was scuppered for similar reasons. ®

Boost IT visibility and business value

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.