Huawei constantly invests abundant resources to construct a security center with core technologies and competitiveness.
Huawei security center collects malicious samples worldwide and analyzes them to form a security signature database, which applies to Huawei products sold globally, ensuring customers' network security. Additionally, Huawei sets up an advanced "cloud security" architecture to collect malicious samples from large-scale traffic worldwide. The analysis platform automatically analyzes and extracts traffic features to form security signatures and updates them to global security products. This implementation ensures customers' network and information security to the maximum extent and essentially changes the passive situation that security policies must be constantly adjusted to respond to attack changes with ever-increasing investment. A positive and proactive security defense system is established.
To closely pay attention to network security posture, rapidly detect network threats, give response, and provide timely, accurate, and effective security protection are the ultimate goals and behavior guidance principles for Huawei security team.
By continuously conducting security researches and setting up close partnerships with industry-leading security companies and research institutes, Huawei collects threat intelligence from the following sources:
1. Vulnerability databases, including but not limited to:
(1) Common Vulnerabilities and Exposures (CVE)
(2) National Vulnerability Database (NVD) of the US
(3) The Open Source Vulnerability Database (OSVDB)
(4) China National Vulnerability Database of Information Security (CNNVD)
2. Well-known vendors, vulnerability management institutes, and security software/tool providers:
(1) Vulnerability information disclosed by Microsoft to members of Microsoft Active Protections Program (MAPP) about Microsoft and related products (such as Adobe products)
(2) Vulnerable Research Service (VRS) provided by TELUS Security Labs in Canada, which enables Huawei to rapidly analyze and respond to newly disclosed threats
(3) Vulnerability information synchronized from well-known tool providers, such as Immunity, Idappcom, and IXIA
(4) Mainstream security communities (such as Metasploit, Snort, and OWASP) that trace security trend changes in the industry and convert security capabilities
(5) Malicious samples exchanged with mainstream security vendors in the world (such as Qihoo, Tencent, Baidu, Kingsoft, Rising, Avira AntiVir, ADMINUSLABS, Palo Alto Networks, GData, and VirusTotal)
Huawei has a security research team consisting of hundreds of security experts to continuously trace and analyze security trends in the industry, rapidly cope with new threats, and protect our customers' networks against attacks.