Grid network in geoprofile with embedded numbers.

Comprehensive security for your organization

Whether an internal company network, cloud or IoT – targeted attacks are on the rise. T-Systems Security looks after your holistic cybersecurity needs

Play it safe with T-Systems Security

Cyberattacks present ever greater challenges to companies with growing digitalization. On a daily basis, hackers try to steal business-critical data or digital identities and manipulate connected production facilities. The rising, all-encompassing connectivity requires omnipresent security measures. This is why T- Systems Security offers all customers the same highly-professional solutions used to protect Deutsche Telekom around the world.

The importance of cyber defense is on the rise

42 million

attacks monitored on our 620 physical Honeypot sensors (3,400 logic sensors)

2.5 billion

security-related events tracked from 3,300 data sources

20 million

malicious code sets catalogued in our malware library

up to 60 million

attacks on the infrastructure tracked on one day (highest value in April 2019)

Extract from 24-hour IT security at Telekom (as at January 2020)

Comprehensive connectivity needs comprehensive security

In times of IoT, cloud and digital identities, IT security is becoming increasingly important. With its end-to-end support, T-Systems Security offers comprehensive solutions for networks, cloud services, and end user applications.

To our strategy

T-Systems solutions for your security

We look forward to your project!

We are happy to provide you with the right experts and to answer your questions about planning, implementation, and maintenance for your digitization plans. Get in touch!

With Managed Cyber Defense, we have found an effective solution to protect our customers’ data at the highest level of security.

Ralph Günther, former CEO, CORPUS SIREO

The T-Systems Security difference

Man with glasses and white shirt is smiling looking at his laptop.
  • Local and global resources – more than 1 700
  • Global Sharing of threat and remediation knowledge, and cross supporting each other in terms of specialization
  • SIEM, SOC and CDC locally in South Africa
  • Next generation technology including Security Orchestration Automation and Response (SOAR), Artificial Intelligence and Advanced Threat Hunting.
  • Proactive security services including pro-active analysis, response and User Entity Behavior Analytics (UEBA)
  • Strong partnerships in specialist areas
  • Consultancy support to help you analyze your existing Cyber Defense and environment and possible vulnerabilities

ISG Provider Lens Quadrant Report

Cyber security in Germany: Resources to deal with increasing threats are becoming scarcer.

Digital solutions for industries and markets

End-to-end with flexible entry

Security Roadmap

As every company is faced with different challenges, the requirements for a security partner are varied. Our approach acknowledges this through the creation of a specific roadmap. Our end-to-end approach – from evaluating and planning your security, through implementation, to monitoring and defense – guides us throughout.

A customer who plays it safe

Customer magazine BEST PRACTICE

Fresh air for topics like cyber security, cloud and digitalization. New Insights from the business world.

Do you visit t-systems.com outside of South Africa? Visit the local website for more information and offers for your country.