Feeds

Huawei could reorganize to win Sprint deal

Must compromise to appease US and Indian security

5 things you didn’t know about cloud backup

Huawei is looking increasingly ready to make compromises to allay the security concerns of various governments. The Chinese supplier denies all allegations that it is closely connected to its country's intelligence services, but is nevertheless running into clearance obstacles in several key markets. The Indian government has vetoed some large deals that would have gone to Huawei, and now it may need to restructure in order to win its first significant foothold in the US.

Huawei is reported to be bidding for its biggest deal yet in the US, where it has a few smaller contracts, such as part of Clearwire's network, but no footprint in tier one cellcos. The London Financial Times said Sprint was close to signing the Chinese supplier for unspecified mobile equipment, but this would require clearance from US security authorities.

In contrast to Europe, where Huawei has gained market share recently with few government obstacles, the US has treated the supplier with suspicion. As in India, a desire to protect native businesses from the onslaught of the Chinese giants may be a factor, but the official reason is security concerns. In 2008, Huawei was blocked from acquiring 3Com on these grounds, but the stakes are far higher now. Not only could the vendor's cost efficiencies and LTE technology get it new operator business, but it is rumored to be interested in gaining US firms of its own. These could include Motorola's wireless infrastructure activities and a stake in the planned LTE network being planned by Harbinger Capital.

Huawei has already reportedly offered the Indian governments unprecedented access to information about its structure and ownership, to prove it is not in the hands of military or intelligence agencies. It may have to go further for the north Americans - perhaps, as the FT suggests, listing its shares on a US or Hong Kong exchange, changing its structure, or setting up a separate US subsidiary. Huawei already has one US unit in Texas, which produces public financial report filings.

In the US, an inter-agency Committee on Foreign Investment can block takeovers of sensitive US assets by foreigners on national security grounds. It rarely vetoes large contracts, but technology and telecoms can be exceptions, especially in the climate of suspicion about online espionage or terrorism.

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.