The risk from IT
security breaches is a growing threat. At the same time, the number of devices and networks that need protection is growing rapidly.
Fortunately, Vodacom Cloud and Hosting Services offers a comprehensive suite of enterprise security tools for both on-premises and cloud, with end-to-end technology platforms and connectivity.
Today, Chief Information Officers (CIOs) are not only worried about outside intrusions and malware. One of the biggest risks for all companies is the era of BYOD (Bring Your Own Device). This trend, where employees use their own smartphones, tablets or laptops to work and connect to the company network, presents unique security challenges.
Further CIO priorities include minimising the risk of cyber attacks; providing business continuity by protecting intellectual property and company information; and complying with data centre and information protection laws.
And this is where Vodacom Business can help.
Vodacom Cloud & Managed Security provides a purpose-built security platform that offers multi-threat security capabilities with the highest level of protection. Here is a summary of the solutions.
1. Perimeter & Email Security
This solution offers UTM (Unified Threat Management) functionality. Universal Threat Management has gained widespread recognition as a primary network gateway defense solution for organisations operating public and private cloud services. UTM is the evolution of the traditional firewall into an all-inclusive security product that is able to perform multiple security functions within one single appliance. Our solution offers IPS, Web content filtering and Network Anti-virus
There are no hardware costs, and Vodacom configures and manages the offering on your behalf. You can opt for weekly, monthly or quarterly reports. Plus – and this is a big one – you'll get 24/7 monitoring of your network.
2. Cyber Intelligence
There are two pillars to this solution: SIEM (Security Incident and Event Management) and DDoS (Distributed Denial of Service)
This function gives you real-time log collection, Threat Analytics, incident monitoring and reporting, a dedicated security team, and more. Importantly, there are predefined rules and triggers that automatically detect when a network event needs to be investigated.
The benefit of this approach is that you won't have to buy or maintain new hardware or software, you'll get up-to-date and relevant, actionable Security Incident Data and there is a lower total cost of ownership than other solutions.
3. Professional Security Services
This offering has four elements:
- Security Maturity Assessment, which is designed to assist your business in assessing your security maturity against the security standards of other organisations in your industry;
- PCI & POPI Compliance, which assists companies with identifying and prioritising their requirements to obtain PCI certification;
- Penetration Tests, which are technical assessments to find security weaknesses on computer systems, and
- Vulnerability Testing, a continuous or on-demand vulnerability scanning service on internet-facing devices and systems.
The high-level strategic information that you'll get from this offering builds a security roadmap for your organisation so you can lay the path ahead in line with your strategic initiatives. It will help you to maintain compliance and certification, will manage your security vulnerabilities and allow you to meet security policies and regulatory requirements – all while avoiding the cost of network downtime.
|Solutions||What is it?||Why should I get it?|
|Mail Content Filter||Protects against problematic emails, both in- and out-bound, through customisable filtering; Minimises email traffic by blocking all unnecessary email before it enters the network||Save time and hardware/software expenses associated with setting up your own email filtering solution|
|Anti-spam Filter||Provides advanced protection from spam by using word scanning, image analysis and attachment filtering technique; Blocks incoming spam from entering the network; Also includes an email anti-virus offering||Leverage our infrastructure and expertise where we fully set up, manage and host the solution for you; Choose from a dedicated or shared service that will substantially reduce your costs|
|Virtual Hosting Firewall||Only for use with Virtual Hosting; does not support any additional services such as APN (Access Point Name) or MPLS (Multiprotocol Label Switching; Protects your virtual hosting environment from malicious and unwanted behaviour||Cheaper than maintaining a dedicated firewall for your virtual hosting environment; Provides constant monitoring and management to keep up with evolving threats Includes 24/7 support by a team of trained engineers to configure and maintain your firewall|
|Intelligent Hosting||Routes a customer to the designated service agent based on the contact channel which the customer has used; Channels include voice, email, chat, internet, SMS or Instant Messaging||Customise the way you interact with your customers based on the channels you use to communicate with them.|
|Perimeter Firewall IPS Lite||Only for use with Virtual Hosting and does not support any additional services such as APN (Access Point Name) or MPLS (Multiprotocol Label Switching); Keeps your network safe from Zero Day attacks, DOS (Denial of Service) and DDOS (Distributed Denial of Service) attacks, spoofing attacks and malicious code||Cheaper than maintaining a dedicated firewall for your virtual hosting environment; Provides user-based authentication, enabling you to set access restrictions|
|Network Anti-virus||Resides within our secure, managed hosting facilities and provides robust offsite anti-virus protection; Protects your environment using wild lists that are more than 47 000 viruses in the wild||Reduce your costs by using our fully managed, hosted and supported solution; Eliminate traffic by blocking unwanted, non-work related ‘peer to peer’ and instant messaging (IM) communication|
|Web Content Filter||Enables you to control access to web sites that may expose businesses to potentially liable material or jeopardise network security and consume valuable bandwidth; Hosted within our Vodacom Data Centre to monitor, proactively control and restrict user browsing permissions||Save time and hardware/software expenses associated with setting up your own filtering solution; Optimise valuable bandwidth by eliminating unwanted browsing, streaming and software downloads|
|Secure Remote Access||Protects sessions by performing continuous mutual authentication and encryption during every transmission between client and server Two-factor authentication reduces the potential for data theft and fraud No special software is required to access the service, making it a truly clientless SSL (Secure Sockets Layer) VPN (Virtual Private Network)||Prevent unauthorised access to corporate information and IT resources; Get easy two-factor authentication via SMS; Ensure end-user confidentiality; Reduce CAPEX costs with an OPEX model|
Vodacom can help you ensure the highest level of protection and performance at the lowest total cost of ownership to your business.
To become a Ready Business, call 082 1930 or for more information go to vodacombusiness.co.za.