R&D

ENTERPRISE INFORMATION SECURITY PROTECTION

Overview

To improve the network security capability, we develop technologies such as zero trust solution, security assessment for 5G infrastructure equipment, endpoint protection, and cyber threat intelligence based on AI.
ENTERPRISE INFORMATION SECURITY PROTECTION

CORE TECHNOLOGY

  • Zero Trust Solution
  • 5G Security by Design
  • Endpoint Security
  • Cyber Threat Intelligence

Enterprise Information Security Core Technologies

ENTERPRISE INFORMATION SECURITY PROTECTION

Application Status

Zero Trust Solution:Under the National Institute of Cyber Security(NICS)'s strategy of promoting domestic manufacturers to develop commercial products that comply with the government's zero trust network deployment architecture, deployment principles and core mechanisms, we are committed to developing the Chunghwa Telecom zero trust solution ¬- xTrust. xTrust is a comprehensive system that includes key core technologies such as identity authentication, device authentication, and trust inference. It supports for FIDO2 international standards, data filtering and logging. In addition, it supports TW-fidO (the only one in Taiwan with this function). xTrust has passed the "Government Zero Trust Network Identity Authentication Function Compliance Test" certification. Faced with the surge in the number of users' own electronic devices and remote access, xTrust can effectively solve access control needs and further reduce the risk of Advanced Persistent Threat (APT) attacks. It strengthens the security protection ability of governments, enterprises and institutions to adapt to the digital transformation.
5G Security by Design:Perform O-RAN (Open Radio Access Network) base station open interface security test, 5G Next Generation base station(gNB) security test, security protection of Multi-access Edge Computing (MEC) equipment , and the cloud platform security benchmarking of the 5G core network , etc. Applied to the "2021 Asia Silicon Valley-5G Open Network Integration Verification and Promotion Plan" to improve the security of domestic 5G mobile communication products and harden the MEC equipment and 5G private network applications. Techniques refer to the O-RAN ALLIANCE security specification, the NIST(National Institute of Standards and Technology) Cybersecurity Framework, and the security guidelines of the CIS(Center for Internet Security) international organization, etc.
Endpoint Security:Provide information security resource management services. The main functions are to centrally manage equipment (resource management, vulnerability management, and security management), ensure the implementation of information security policies, and improve the information security risk/threat management capabilities of terminals in the organization.
Cyber Threat Intelligence:Utilizing big data analysis and AI technologies, Chunghwa Telecom Laboratories developed the Cyber Threat Intelligence (CTI) system. CTI helps CHT and its customers understand cyber attacks and detects potential malicious activities such as external threats and enterprise sensitive data leakage. CTI is applied to strengthen defenses, reduce the impacts of cyber attacks, and improve enterprise security.