Your search

Your search

Media Center

Documents

Infographics

  • Info graphic: 360° ICT SECURITY A holistic approach to ICT security

Cloud Security Compact

Security & Governance

Does your security begin and end with your firewall?

The more critical the business,
the more important the security.

We bring you closer to your customers

Best Practice – The T-Systems customer magazine

Best Practice: If you want your data back
unharmed.
To the customer magazine

Security & Governance

ICT crime is rising by more than 11 percent annually
Practically all companies safeguard data traffic against unauthorized external access by means of sophisticated firewalls and monitoring systems. However, with today’s seamlessly integrated value chains, protection against infrastructure outages and deliberate manipulation is simply not enough. A truly state-of-the-art ICT architecture has to ensure the integrity of internal processes and comply with international legislation on data processing and privacy – despite rules that often vary significantly from country to country.

Clearly defined roles, clearly defined rights

The answer is an end-to-end security strategy that considers both processes and people: role-based authorization concepts that allow businesses to clearly define who has what kind of access to what information. Effective authentication methods protect data in the cloud, and within the scope of inter-enterprise collaboration. And robust encryption can be employed to ring-fence mobile communications for both the private and public sectors.

Protection across the entire ICT spectrum

T-Systems security solutions are fully comprehensive, covering all aspects of information technology and telecommunications – from devices, to information management, to certified trust centers.

Real-world examples

Security tracker displays cyber attacks in real time

Real-time ticker displays attacks and their place of origin in real time.
more

Topstory EADS

EADS EADS
The need for speed and security on the international stage
How can businesses create a productive, protected environment for high-tech development work despite multiple Europe-wide participants and diverse, country-specific security requirements? At EADS, only authorized users in approved countries have access to sensitive data – within efficient engineering workflows.
Legacy IT applications were unable to support flexible user authorization and effective collaboration. To master this challenge, T-Systems implemented a sophisticated, granular and role-based security system for EADS, on the basis of an enterprise-wide public key infrastructure. Each employee undergoes a personal registration process to receive a digital certificate authorizing him or her to access workflows in defense projects. This system allows authorizations to be tailored to a wide variety of user groups throughout the organization – and has enabled EADS to implement extremely robust, international security standards.

Topstory German government

German government Security on the move:
German government benefits from smartphones with encryption
Cell phones of all types are under threat from around 400 computer viruses, worms and trojans. And at the end of 2008, there were roughly 13,000 handhelds in Deutsche Bahn’s lost-and-found offices. In other words, security is a big issue with mobile devices – especially for government agencies, as they must often exchange confidential information. As a result, the German federal government is equipping around 350 organizations with the high-security SiMKo 2 smartphone.
These devices look just like smartphones, but they have been bulletproofed: all data connections are made via a virtual private network. Users can therefore safely dial into their corporate network, access emails and other information, manage their calendar and contacts, and use Office programs. Even if the device were to be lost or stolen, the data, software and the operating system are encrypted. The SiMKo 2 consequently offers end-to-end security and a high service quality, from the back-end system to the handheld. In the future, voice communications will also be encrypted.

Related solutions

  • Put document in the InfoBox.