CTRL 360

You may have asked yourself the question: are the IT security solutions in place at your company sufficient to prevent, detect and defend against a complex attack? The most common questions: are there enough resources within your company to maintain cyber security at the right level, and to continuously monitor and improve it? How is it even possible to detect an attack when there is no obvious problem but a breach in the shield has occurred and the system has been penetrated?

Properties of the CRTL 360

⁣MANAGED ENDPOINT PROTECTION

 A centrally supervised new-generation anti-virus protection able to recognize ransomware behaviour and even crypto mining.

⁣MANAGED E-MAIL THREAT PROTECTION

In-bound and out-going anti-virus, anti-spam and content filtering. Protection against e-mail fraud and attacks.

⁣MANAGED BORDER PROTECTION

Package screening, anti-virus and anti-spam protection and intrusion prevention in one single service package.

Vulnerability analysis

Detect the weaknesses of your systems still before the attackers and protect your sensitive data by using a reinforced digital infrastructure.

Vulnerability Management

/ We help you identify, assess and address the vulnerabilities of your systems in time by continuous and recurring tests, thereby assisting you in keeping your digital environment resilient and secure.

⁣MANAGED ANTI-DDOS

Protection for the website, web-shops and online services and networks against denial-of-service (DoS) attacks.

Telekom CTRL 360 is a security service model that opens a new dimension in the world of IT security solutions. Together, our services provide complete protection for customers without in-house cybersecurity resources or expertise.

Cutting-edge technology solutions in a cost-effective design 

Seamless protection:

  • There are no client-side operational tasks, network devices are the responsibility of the client.
  •  Package sizes that can be flexibly expanded to meet different needs

Cost-effective:

  • Monthly fee scheme
  • With usage-based billing
  • At predictable costs, without investment.

Expert supervision

  • No need to have your own IT security specialist
  • ⁣ The background of dedicated security development companies, complemented by Magyar Telekom's engineering expertise and many years of international experience.

⁣Our service can be used with any fixed IP Internet connection however requires technical consultation.

Benefits of our CTRL Managed Perimeter Protection service:

  • ⁣Packet filtering, anti-virus, anti-spam, intrusion protection, in a single service plan.
  • ⁣Plan sizes can be tailored to meet different needs and flexibly extended.
  • ⁣No customer-side management tasks.
  • ⁣No network assets under the Customer's own responsibility.
  • ⁣High availability: geo-redundant central system with 99.9% availability.
  • ⁣Financial structure with a monthly fee with predictable costs.

⁣ Join the companies that have already upgraded their security strategy with Telekom CTRL 360 s⁣ecurity service.

Telekom CTRL 360 is a security service model that opens a new dimension in the world of IT security solutions. Together, our services provide complete protection for customers without in-house cybersecurity resources or expertise.

Cutting-edge technology solutions in a cost-effective design 

Seamless protection:

  • There are no client-side operational tasks, network devices are the responsibility of the client.
  •  Package sizes that can be flexibly expanded to meet different needs

Cost-effective:

  • Monthly fee scheme
  • With usage-based billing
  • At predictable costs, without investment.

Expert supervision

  • No need to have your own IT security specialist
  • ⁣ The background of dedicated security development companies, complemented by Magyar Telekom's engineering expertise and many years of international experience.

⁣Our service can be used with any fixed IP Internet connection however requires technical consultation.

Benefits of our CTRL Managed Perimeter Protection service:

  • ⁣Packet filtering, anti-virus, anti-spam, intrusion protection, in a single service plan.
  • ⁣Plan sizes can be tailored to meet different needs and flexibly extended.
  • ⁣No customer-side management tasks.
  • ⁣No network assets under the Customer's own responsibility.
  • ⁣High availability: geo-redundant central system with 99.9% availability.
  • ⁣Financial structure with a monthly fee with predictable costs.

⁣ Join the companies that have already upgraded their security strategy with Telekom CTRL 360 s⁣ecurity service.

⁣MANAGED ENDPOINT PROTECTION

 SaaS solution, cloud-based console, on-premise clients. Real-time and scheduled checks, with URL filter and device control capabilities.

⁣MANAGED E-MAIL THREAT PROTECTION

Cloud-based service without terrestrial components. Sender screening, reputation-based filtering, E-mail authentication(SPF, DKIM), encryption (TLS), removal of active content e.g. macros.

⁣MANAGED BORDER PROTECTION

Centrally managed new-generation firewall (NGFW), package-, web and application filtering, IPS, with provision of detailed reports. Optionally complemented with DNS filter and Cloud Sandboxing. Our ethical expert hacker team reveals the vulnerabilities of

Vulnerability analysis

Specific recommendations are made and and expert reports are prepared for correcting the explored vulnerabilities and enhancing the security level of your systems.

Vulnerability Management

It means a pro-active process during which the security vulnerabilities are identified, assessed, prioritized and mitigated in the computer systems, networks and applications of an organisation.

⁣MANAGED ANTI-DDOS

  A service built on Telekom’s backbone network that prevents DoS attacks already on the service provider’s side, before they could saturate the bandwidth of the client’s Internet connection or would make its public services inaccessible.

Telekom CTRL 360 is a security service model that opens a new dimension in the world of IT security solutions. Together, our services provide complete protection for customers without in-house cybersecurity resources or expertise.

Cutting-edge technology solutions in a cost-effective design:

⁣ Seamless protection:

  • There are no client-side operational tasks, network devices are the responsibility of the client.
  • Package sizes that can be flexibly expanded to meet different needs.

Cost-effective:

  • Monthly fee scheme
  • With usage-based billing
  • At predictable costs without investment

Expert Supervision

  • No need to have your own IT Specialist
  •  • The background of dedicated security development companies, complemented by Magyar Telekom's engineering expertise and many years of international experience.

Join the companies that have already upgraded their security strategy with Telekom CTRL 360 security service.