Following the rejection of microsoft win8 by government procurement in late may, the government's attitude towards information security has grown stronger. On 4 august, according to foreign media reports, the chinese government had excluded the united states suppliers of anti-virus software, simon teek, and the russian kabaski laboratory, from the security software suppliers。
The daily people's daily, in english twitter, also reported that the government procurement unit “has removed simon teek and kabaski” from the list of security software suppliers and that five national security software have been approved for use。
In an interview with the daily economic news journalist, internet security experts stated that, in the aftermath of the “prissors” event, controlled domestic software would inevitably be subject to policy advances, considering the information security dimension. Senior it analyst sun yongjie stated that it was simple logic from an information security perspective, and that it was even more significant in the context of weak technology at the bottom of the domestic software。
On 4 august, it was reported that, for security reasons, the chinese government had excluded the united states suppliers of anti-virus software, simon teek, and the russian kabaski laboratory, from the security software suppliers。
Last sunday's people's daily, in english twitter, reported that the government procurement unit “has removed simon teek and kabaski” from the list of security software suppliers. Five of the poison-killing software brands approved by the government procurement office are kai nie, beijing jiangmin, coronary golden and sing, all of which are nationally produced security software brands。
Yesterday, at 18 p. M., sina weibo certified the kabaski laboratory and responded that there was no evidence of a card. Báski products have been banned by the government”, “we have recently learned that the central government procurement network has temporarily eliminated the qualifications of all foreign security suppliers at this stage, retaining only those from the national production. This change, however, relates only to central state institutions within the central government procurement budget, which is not covered by such provisions as local governments and state enterprises.” as at the time of the submission, simon tek had no views on the incident。
Central state agencies concentrate on the acquisition of software projects, which are contracted projects organized by the central state agency's public procurement centre and one of the highest-level and most extensive procurement projects in the chinese government's procurement field. Foreign security software, such as simenteek and kabaski, is known to be well known in government procurements in previous years, but in this time the foreign security software suppliers were almost completely destroyed。
According to industry sources, in addition to the first entry of one product into the government procurement list, the remaining four brands were users of security software for government agencies in previous years。
There's a leak in overseas software
According to sunway, a swiss security expert, this was not sudden, and since the snowden incident, the government, out of concern for information security concerns, advocated the use of domestic information technology products, including security software, and removed simon tek and kabaski from the list of security software suppliers. This is in addition to the most recent response based on information security considerations。
Alternatives to home-grown safety software are considered first and foremost for the exclusion of overseas poison-killing software. According to tangway, in recent years, the national production of safe poison software has largely covered various areas. Alternative technologies such as virus detection, security audits and cloud computing security management are available and the integrated technology gap is closing。
In tangway analysis, the advantages of national software over overseas software are mainly three-fold. The first is more manageable, “for a simple example, at the time of the recent outbreak of the `superphone virus', the national computer virus emergency response centre issued a circular to the country's main safety manufacturers requesting detailed analytical data and solutions for the virus, and the cost of communication in connection with the overseas safety software effort”
In addition, the localization of software has the advantage of localizing services and “there are geographical differences in software poisoning. We understand that many foreign security software does not have a core team in china, and that the time-bound local team is better served by the transmission of viral information from china to the asia-pacific region”
“in addition, most of the overseas security software servers are overseas, and domestic systems need to communicate frequently with overseas servers for feedback purposes, and even receive and send documents, providing the possibility of leaking information.” tangway indicated。
Information security or market game
In addition, anonymous industry analyses, represented by the united states of america's simon teek, flame eye, and russian kabaski's cyber security companies, are becoming “pearheads” for inter-state cyber-fighting, and these nominal cyber-security companies are also important tools for game-making in large countries。
It is known that in early 2013, the united states cyber security company mandionet issued a report, apt1: discovering china's cyber spy unit. Since the report was issued, chinese enterprises have been called into question abroad, china has been pushed out of the united states market for questioning, and has been blocked in the european union, australia and south korea, and some chinese security companies have returned home。
In an interview with the media, chief strategic officer ban jingting said that, like apt1, the essence is that cybersecurity acts as a “pedestal” to stigmatize china for the united states government and expel chinese companies, both for the direct benefit of american industry and for us officials. There is also an analysis by industry that a technologically powerful cybersecurity company is a strategic deterrent at the level of national cybersecurity games。
Sun yongjie, a journalist for daily economic news, said that there was a big gap between the country-based security software, either from the bottom-up technical architecture, or from the accumulation of the virus bank against the impact of the virus, and russian-american software companies that had earlier entered the security field. Nationally produced software is more like being carried on horseback. The simple logic of using information security only as a policy reason is untenable. The market game dimension is more convincing when central government agencies procure to remove overseas vendor qualifications。
On 31 july, in addition to the current approval of the central government procurement lists of five national security software, namely, rusing, jiangmin and others, the central government procurement network updated information that the list of suppliers of government procurement agreements to the central state bodies in 2014 included lists of individual operating systems such as deepin, spgnux, neokylin, china-kofande, yogi, microsoft, aliyun, lung, etc. In addition to the microsoft windows system, there has been a marked increase in the proportion of domestic operating systems。
In the frame description, yunos was highlighted for security. “the complete security system has been constructed from a variety of aspects, including confidentiality, integrity, usability and creditworthiness, by strengthening the system from the bottom to the upper layer.” the personal operating systems of microsoft are no longer marked as specific system versions。
Sun yongjie stated that internet information security involved all aspects of chips, hardware, systems, software applications, and that the government had supported domestic firms at all levels in the domestic market, but still needed groundbreaking innovations in the entire industry chain of information。
Responsible editor: zhang dei
[whispering information cellular client downloading]




