Managed Firewall

Managed Firewall

Only a few companies have the luxury of employing a specialized service staff that is able to keep up with the new threats that appear daily. Managed Firewall Services use the latest technology and a highly qualified operating team to provide constant, up-to-date protection from online attacks. From unified threat management (UTM box) to next generation firewalls, our specialized security operating staff uses the latest technology to protect our customers’ servers and networks around the clock.
T-Systems’ Managed Firewall Services are available to companies in two operational versions. Customers who choose the on-premise solution lease the technical infrastructure to operate the firewall at their own data center. T-Systems’ service staff manages the firewall. Customers can choose which highly secure access technology they prefer.
In the second version, T-Systems integrates the application firewall into its own platform. T-Systemsoperates the managed application firewall in a dedicated infrastructure at one of its high-security data centers. The operating team makes sure that firewall services are available around the clock. Our qualified specialists run updates, handle release management and monitor the system 24 hours a day, 7 days a week. Monitoring activities include monitoring system availability, performance and security. Should there be a technical problem or attack, our operating team can immediately launch countermeasures. With our service, businesses can protect their networks with the latest security technology without having to hire their own service staff or make heavy investments. T-Systems’ data centers provide a very high level of operational security, are set up redundantly and have all the required certifications for commissioned processing of personal data. Our trained, specialized staff has access to Telekom’s comprehensive security expertise. Telekom works with Telekom CERT (Cyber Emergency Response Team) and identifies and analyzes up to 800,000 hacker attacks each day on its own honeypot infrastructure.
  • On-premise version with management
  • End-to-end managed service with dedicated set-up at T-Systems’ data centers
  • Updates and release management by qualified service staff
  • Around-the-clock monitoring of availability, performance and security
  • Use of the latest technology at all times
  • High application firewall service availability