Internet Protect Pro

Internet Protect Pro

Internet Protect Pro shifts the functions of firewalls, intrusion prevention systems and proxy servers, as well as the functions of systems that protect against viruses and novel malware, into the Deutsche Telekom cloud. The solution protects against cyber attacks, data leaks, malware execution and data theft in real time. Internet Protect Pro isolates suspicious files and executes them in a protected environment. This requires less proprietary hardware on site. Plus, there are no additional costs for IT administration and configuration.
Deutsche Telekom operates the Zscaler solution in its high-security data center in Biere. In this data center, Deutsche Telekom ensures that customer and company data cannot leave Germany by any unauthorized routes. Internet Protect Pro will become available in the second quarter of 2016 for a free test phase. As of summer 2016, the solution will be an integral part of the new Magenta Security portfolio.
New methods of attack require new defense mechanisms, but they must still be affordable for everyone. Together with its partner Zscaler, Deutsche Telekom is presenting affordable and uncomplicated all-around protection at this year’s CeBIT in the form of Internet Protect Pro. The solution protects every user on every device at every location against threats from the Internet. “We make security simple, and easy to understand and use, because companies don’t have to build an expensive infrastructure to run Internet Protect Pro. Internet Protect Pro provides complete protection for the entire company and all its branches worldwide,” said Dr. Ferri Abolhassan, Managing Director at T-Systems of the IT Division and Telekom Security.
  • Kona Site Defender (KSD) protects against all types of DDoS and direct-to-origin attacks as well as against attacks on web applications.
  • Akamai Fast DNS optional solution prevents attacks on DNS infrastructure.
  • KSD includes a high-performance web application firewall (WAF) that offers customers a highly scalable protective barrier against attacks at application level.
  • Protects operation and brand value(reputation)
  • Intensifies customer loyalty
  • Maintains performance in the event of attacks
  • Less CAPEX (security hardware and software)
  • Easy to integrate into existing IT infrastructure and maximum availability during DDoS attacks
  • Secure infrastructure for web applications
  • Protects against direct-to-origin attacks
  • Covers the costs in the event of an attack