Almost two-thirds of decision makers in the private and public sectors believe that computer viruses and data misuse pose a greater threat than traditional crime and disaster scenarios – according to a recent study published by the Allensbach Institute and the Center for Strategy and Higher Leadership.
Their fears are well founded. The German Association for Security in Industry and Commerce (ASW) has published the alarming statistic that industrial espionage costs the German economy at least 20 billion euros every year. And state-of-the-art ICT systems are not only the target of attacks. They are the means of launching them, too.
Safeguarding ICT begins at the design stage
Faced with this worrying trend, security strategy cannot be limited to ICT infrastructure itself. A comprehensive approach is a must, integrating processes, the business organization and employees. And security is not only important once the system is up and running – it needs to be considered right from the beginning, at the system development and design stage.
T-Systems has the expertise to implement this holistic approach. The Deutsche Telekom subsidiary provides robust identity and access management solutions to safeguard data and prevent unauthorized access. These allow you to securely create and manage digital identities, with corresponding rights, roles, and responsibilities – for example, for cross-enterprise collaboration or in the cloud. And to protect the ICT infrastructure from external attacks, T-Systems offers firewalls, VPNs, anti-malware, and intrusion detection and prevention.
Security on the move
Securely integrating smartphones and tablets, with their diverse operating systems, into the ICT infrastructure can be a challenge. This is why T-Systems operates a middleware platform that allows IT administrators to centrally distribute updates, and wipe devices remotely, if necessary. The comprehensive SiMKo3 (secure mobile communication) solution safeguards sensitive data and confidential conversations, and prevents unauthorized access to key applications. Voice communications are encrypted to prevent eavesdropping.