Cyber Security in China: New Challenges to the West

xiaomi-conference-2014.jpg

 XiaomiTencent and Huawei are all ranked in the World Top 50 according to BCG's 2014 global innovation survey.

Alibaba, Tencent, Xiaomi, and Huawei: China’s Internet and telecommunication giants are becoming more and more successful not only within China, but also outside the country. But how did they become that successful and why is the Chinese IT market increasingly challenging for western businesses?

China, Gierow argues in this China Monitor, is resolutely pushing the development of its own IT industry. But it is also isolating itself from international IT technology. By exercising control over major state-run businesses, the PRC is also maintaining its sovereign position in the IT sector.  

Furthermore, the Chinese government supports the international expansion and sales endeavors of Chinese IT companies – the so-called ‘national champions’. With their products, they are stepping up competition with Western companies in developing and emerging countries, while on the other hand, companies like Huawei or Lenovo are also frequently alleged to open back doors for Chinese spying in the West.

According to Gierows findings, isolationism and protectionism within China lead to another problem for Chinese IT companies: the obligation to censor the Internet. Not only does censorship affect freedom of speech, but it also impacts the entire economy. 86% of European companies now regard Internet censorship as a major obstacle to doing business in China, a survey quoted in the report finds.

In terms of foreign companies, censorship, cyber attacks, and protectionism in China do not only hurt their businesses but have also become a key location factor for foreign companies. They must comply with ever more stringent regulations in the IT sector, impeding their ability to protect business secrets and hindering international co-operation.

Hauke Gierow concludes that, instead of insistently calling for fundamental changes in Chinese internet policy, the Federal Government of Germany should negotiate specific improvements for German businesses, for example in terms of market access or protection of intellectual property rights. 
Merics:  http://bit.ly/1HZbKJL

 

« Offensive Cyber Security Changes the Industry
ICWATCH Database Gathers the CV’s of 27,000 Intelligence Employees »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.