Search
Old businessman holds phone fixed to a cloud-shaped balloon
July 05 2023 | Cloud Services

The route to sovereignty

What is the meaning behind the buzzword and what significance does sovereignty have for digitalization?

Photo of the hub:raum Berlin
June 16 2023 | Sustainability Services

Three scenarios for mainframe modernization

Mainframe computers are essential to many industries but operating them poses challenges. Here’s how to overcome them.

Digital cloud world
June 08 2023 | Security

How does microsegmentation work?

What is microsegmentation, and how does it protect your enterprise from malicious activity and cyber threats?

 Luftaufnahme einer Menschenmenge mit einer Wolke
May 22 2023 | Cloud Services

Databases? Off to the Cloud!

With tangible advantages, database migration offers the strongest cloud ROI. Learn why.

A man holds a luminous globe with network structure
May 19 2023 | Security

NIS2 directive is the biggest thing since GDPR

What is NIS2, what companies does it apply to, how will it influence cybersecurity, and how should you approach it?

Innovation chart
May 15 2023 | Cloud Services

AWS Control Tower: The revolution for landing zones

Simplified services, specific customizations, supporting options – how to professionalize AWS usage!

business people point at digital security lock
May 11 2023 | Security

How compliance is more than just avoiding fines

Why must businesses focus on cybersecurity and compliance together, and how compliance can turn into an advantage.

Mann vor Computer - AWS
April 28 2023 | Cloud Services

External Key Management for AWS

Holding the keys to secure enterprises in the near future with External Key Management (EKM) – our blog post explains how it works.

Two lakes shaped like footprints
April 12 2023 | Sustainability Services

Where to go for Green IT?

IT modernization is an excellent way to reduce the environmental footprint of applications.

Woman sitting in front of computer screen
April 11 2023 | Application Services

Where are your keys, and are they safe?

External Key Management (EKM) can play a valuable role in your AWS security. Learn more about the purpose of external key management.

2 Colleagues standing in a Server Room.
April 06 2023 | Cloud Services

Check the Security of your AWS landscapes

Gain transparency of your security vulnerabilities with an AWS Security Assessment. Learn how it works in our blog.

Do you visit t-systems.com outside of Germany? Visit the local website for more information and offers for your country.