Managed UTM (Unified Threat Management) provides your company with optimum protection against dangers from the Internet. This allows you to increase the protection level from a traditional firewall to multifunctional protection. Mit Managed UTM (Unified Threat Management) schützen Sie Ihr Unternehmen optimal vor Gefahren aus dem Internet. Damit kann der Sicherheitslevel von einer traditionellen Firewall auf einen multifunktionalen Schutz erhöht werden.
Covers spoofing and packet filtering. Spoofing refers to methods that are used to suppress authentication and identity procedures if these are based on the use of trusted addresses or host names in network protocols.
Packet filtering is a dynamic filtering technique that assigns every data packet to a session. The packets are analysed and saved in dynamic condition tables. Packets that cannot be assigned to pre-defined contacts or may belong to a DoS attack are discarded.
The provision of a source and a destination zone is requested in addition to a source and destination address. If a source is not in the assigned zone, the firewall discards the packet.
A policy is used to decide which protocols are examined for viruses, malware or other damaging software. Swisscom uses a standard policy that works in accordance with best practice. The signature database is updated automatically on a regular basis and is monitored.
The manufacturer divides all known websites on the Internet into categories. Using a standard policy, Swisscom blocks access to specific categories. It is possible to release individual blocked URLs in the categories. Swisscom uses the categories and subcategories of the service that are provided by the manufacturer.
The application control function is used to permit or block access to the application. Swisscom blocks pre-defined application categories. At the customer’s request, further categories can be blocked or individual applications permitted.
Swisscom guarantees that health incidents are processed within the defined service level times. If a security device cannot be reached, Swisscom resolves the problem and informs you immediately.
The log data from the firewall is used to create events, which are analysed for threats using the Threat Intelligence function. In the event of a suspected threat, the system creates a security incident which is divided up into different classes (insufficient info, harmful attack, harmless attack, false positive). The classes "insufficient info" and "harmful attack" are analysed by an expert and escalated to you in a targeted way.
In the MSS-i dashboard you can compile extensive reports in accordance with your needs and call them up in real time or download them as PDF files.
You assess the urgency of implementing a change. Swisscom makes a distinction between minor and major changes. Minor changes are an integral service component. These are requested directly in the MSS-i dashboard.
Swisscom tests the manufacturer releases of managed devices in the laboratory in accordance with a defined test catalogue and, following approval, implements them. In the case of the VPN client, only basic connectivity tests are performed at the gateway.
Swisscom takes care of all current configurations and ensures that backups are stored securely and clearly. This allows older configurations to be restored when required.
Swisscom uses only hardware and software that is state of the art.
You know that your Security devices are always up to date.
You can integrate the service into your structure and supplement it with module at any time or you can get it cloud-delivered.
You benefit from real-time monitoring by renowned security experts.