Search
Person holds phone showing analytics
2022.07.19 | Security

Secure your AWS environment through automation

How to enable automatic security management for your AWS organization with the AWS Security Hub combined with SHARR.

Person using smartphone and laptop at the same time
2022.05.17 | Security

What is Security Service Edge (SSE)?

Learn what SSE is, its distinction from Secure Access Service Edge (SASE), and why it matters now.

Two Hands on a laptop typing with a digital cloud with a security sign inside.
2022.03.03 | Security

The rise of SASE

What is SASE, what’s behind the boom in the market, and how is it helping to simplify security?

Industry Site from above
2022.01.31 | Security

What you need to know about Germany’s IT Security Act 2.0

Our Industrial and IoT Security expert answers the most frequently asked questions about the new IT Security Act 2.0.

Person with hooded jumper sits in front of a laptop and hacks into the system
2022.01.17 | Artificial Intelligence

Stay on the trail of hackers with AI

Is your IT being abused as a botnet? Are digital identities being stolen? How AI detects and stops such attacks.

A digital window with a large warning sign and the label "Malware"
2021.12.17 | Security

The building blocks of cyber security, perfectly combined

This is how mid-sized companies can close off the most frequent points of entry to hackers and protect endpoints, email, network, and the internet.

Woman walking through a factory building holding a notebook
2021.12.03 | Security

Operational technology in crosshair

What can be done about the additional points of entry made possible through remote access points?

Conveyor belt with a red light
2021.10.04 | Security

Interdisciplinary security concepts required

How a Security Operations Center (SOC) enhances security in connected production environments and minimizes potential risks.

A room full of monitors and one monitor showing a white security lock on a blue background
2021.08.26 | Cloud Services

Automate security incident response in AWS with our API

Resource Isolation is a remediation method of security incident response. Our expert blog walks you through the technical steps for AWS. 

A man sitting infront of a screen with coding everywhere in magenta
2021.06.14 | Cloud Services

Managed security: Right from the start

How companies benefit from multi-cloud environments without neglecting security and compliance.

Green lines with yellow, blue and red dots 
2021.05.10 | Cloud Services

Break Glass: Secure Cloud Log Data Access

Amazon S3: Using native AWS services to securely and compliantly access log data.



Old army bathes in sea and keeps Smartphone reading above water
2019.04.12 | Security

Thus spoke the BSI…

Chemical factories, airports, nuclear reactors - a wealth of influencing factors should be considered before the desired location for a data center is found.

Do you visit t-systems.com outside of India? Visit the local website for more information and offers for your country.