By adopting industry standards and best practices, ZTE implements top-down, risk-based cybersecurity governance throughout the entire product lifecycle, realizing security by design and by default of its products, as well as full lifecycle vulnerability handling and incident response.
ZTE believes that security can be verified. ZTE complies with industry technical standards, certification systems, and evaluation frameworks, and leverages its cybersecurity labs to enable customers, regulators, and stakeholders to verify security of ZTE products in a convenient, effective and transparent way.
Our website uses cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also allows us to improve our site.