Chinese authorities have instructed domestic companies to cease using cybersecurity software from more than a dozen prominent U.S. and Israeli firms. The directive, issued in recent days according to multiple sources briefed on the matter, cites national security risks, including the potential for sensitive data to be collected and transmitted overseas.
The move, first reported by Reuters on January 14, 2026, targets a range of high-profile vendors whose products offer deep visibility into corporate networks, endpoints, and user behavior—access that analysts say could theoretically serve as a vector for foreign espionage or sabotage.
Among the affected U.S. companies are Broadcom-owned VMware, Palo Alto Networks, Fortinet, CrowdStrike, SentinelOne, McAfee, Mandiant (part of Google), Wiz, Recorded Future, Claroty, and Rapid7.
Israeli firms on the list include Check Point Software Technologies, CyberArk (recently acquired by Palo Alto), Orca Security, Cato Networks, and Imperva (now under French firm Thales).
The notice requires organizations to identify any usage of these products and transition to domestic alternatives, with some reports indicating a replacement timeline extending into the first half of 2026.
While the exact scope—whether it applies to all enterprises or prioritizes state-linked and critical sectors—remains unclear, the Cyberspace Administration of China and the Ministry of Industry and Information Technology have not publicly commented.
This directive fits into China’s broader “Xinchuang” initiative, which aims to replace foreign technology in core systems with homegrown solutions by around 2027, particularly in government, state-owned enterprises, and critical infrastructure.
Beijing has long expressed concerns that Western hardware and software could be exploited by adversaries, a fear amplified by ongoing allegations of Chinese state-sponsored hacking from Western firms.
Many of the targeted companies have previously published reports attributing major cyber operations to China-linked actors—claims Beijing consistently denies.
The cybersecurity sector occupies a uniquely sensitive position in global tech geopolitics. These tools often employ former intelligence personnel and maintain close ties to national defense establishments.
Their privileged access to networks makes them potential “backdoors” in the eyes of wary governments. As one analyst noted, the dual-use nature of such software—defensive by design but capable of surveillance—has fueled mutual distrust.
This mirrors past actions, such as the U.S. banning Russian firm Kaspersky from government systems over similar espionage fears, eventually extending to broader sales restrictions.
Beijing’s push for independence in cybersecurity has accelerated amid intensifying U.S.-China tensions. Trade disputes, export controls on advanced semiconductors and AI technologies, and diplomatic frictions continue to simmer, even as the two sides maintain a fragile truce.
The timing coincides with preparations for a potential high-level visit by U.S. President Donald Trump to Beijing in April 2026, highlighting how technology has become a central battleground in bilateral relations.
Domestic beneficiaries are expected to include major Chinese players like 360 Security Technology and Neusoft, which have grown rapidly under government encouragement. These firms provide endpoint protection, network security, and threat intelligence solutions tailored to local needs and regulatory requirements.
The shift could boost their market share significantly, while limiting foreign vendors’ footprint in what remains one of the world’s largest digital economies.
Reactions from affected companies have varied. Some, like CrowdStrike and SentinelOne, emphasized minimal exposure, noting no direct sales, offices, or infrastructure in China. Orca Security’s CEO described the reported ban as “a step in the wrong direction,” underscoring the defensive focus of their products.
Others, including Claroty, stated they do not sell into the market at all. Stock impacts were immediate but modest, with shares of Broadcom, Palo Alto Networks, and Fortinet dipping in premarket trading following the news.
This development underscores a deepening global trend of “technological decoupling,” where nations prioritize sovereign control over digital infrastructure.
For China, the directive reinforces a long-standing strategy to mitigate perceived vulnerabilities in an era of heightened cyber threats. Yet it also raises questions about interoperability, innovation, and the future of international cybersecurity cooperation.
As Beijing accelerates its self-sufficiency drive, the implications extend beyond bilateral friction. Multinational corporations operating in China may face compliance challenges, supply chain disruptions, and the need for rapid tool migrations.
Meanwhile, the episode highlights the inherent tensions in a field where security tools can double as intelligence assets—fueling a cycle of suspicion that shows little sign of abating.
Naorem Mohen is the Editor of Signpost News. Explore his views and opinion on X: @laimacha.

