Today’s corporate networks use the Internet to a greater extent – they therefore utilize external interfaces. Hackers who specifically exploit weak points in this network topology can not only endanger business applications, but also access business-critical data undetected. Network protection against external attacks thus affects every company, regardless of size and industry.
Security by Design
To be effective and efficient, security requires a coherent end-to-end approach. And network security also prompts the question: make or buy? A key factor is security by design: in other words, corporate networks that are professionally planned and engineered from the ground up – and deployed in conjunction with automated roll-out and operational processes. The ideal solution is a combination of the provider’s standard security mechanisms and customer-specific additions, plus ongoing monitoring.
Fundamental protection through MPLS
Maximum network security in the WAN can be achieved by using an MPLS network, in which data is not transported over the public Internet, but over the closed infrastructure of an MPLS provider. Since the network topology is invisible to external parties, hackers have hardly any points of attack. The structure of an MPLS network makes it inherently secure. In addition, the network is actively monitored by the provider around the clock.
Internet VPN security and bandwidth
The right solution
Secure voice and data communications around the world with IP VPNs, based on a managed MPLS backbone.
Find out more
An Internet VPN provides robust network security. Encryption and network access control – e. g. user authentication based on certificates – create sufficient protection for almost all use cases. But an Internet VPN cannot support guaranteed transmission parameters, such as latency or bandwidth. However, Internet VPN technology is an attractive option for many applications that require high bandwidth but are not sensitive to latency – such as email and back-up systems.
Mobile communication creates chinks in one's armor
The increasing mobility of employees accessing applications and business data via LTE or WLAN places further emphasis on network security
. Mobile devices are an often underestimated gateway for hackers, viruses and worms. Smartphones and tablet PCs developed for private use do not by far meet the security features common in desktop to LAN and WAN connections without additional hardening.
Encryption of voice communications within LANs and WANs
Migration to Voice over IP (VoIP) is an issue that impacts all customers and carriers, and is therefore a key aspect of network planning going forward. Voice entails changes to data streams, and new challenges for security. In particular, end-to-end encryption for sensitive content is a must, especially when VoIP connections extend beyond the corporate environment, or beyond the trusted carrier’s infrastructure.