Telefónica introduces new software-based security service

Clean Pipes 2 will offer high-level security for low TCO, claims company

Networking and telecoms firm Telefnica Business Solutions has introduced a new software-based security service to help defend against threats both known and unknown across its business network.

Clean Pipes 2, as the product is called, has been developed in conjunction with Telefnica's cyber security unit ElevenPaths and Palo Alto Networks and is underpinned by the latter company's Next-Generation Security Platform.

Advertisement - Article continues below

The product offers features such as application-layer firewall, protection against known and unknown threats, web filtering and intrusion prevention. It's delivered to Telefnica Business Solutions customers as a service via its virtual network infrastructure, with the aim of delivering a high level of security at a lower total cost of ownership, the company said.

Hugo de los Santos, CEO for B2B products and services at Telefnica Business Solutions, said: ""With the implementation of this solution, Telefnica Business Solutions reinforces the security of Internet services for large customers even more. Additionally, it allows us to enrich the value proposition we offer to the segment of Large Enterprises, with a product that comes with great effectiveness and, at the same time, with a low investment."

Mark Anderson, president of Palo Alto Networks, added: "We are delighted to join forces with Telefnica to deliver unparalleled next-generation, breach-prevention security capabilities to its customers. Our collaboration gives organizations peace of mind, with complete visibility and control over the usage of their digital services, while knowing that cyberattacks on their most valued data assets and critical control systems can be prevented."

Advertisement
Advertisement - Article continues below

Clean Pipes 2 is available immediately to all Telefnica Business Solutions customers.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020

Most Popular

Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020
Visit/server-storage/servers/355254/a-critical-flaw-in-350000-microsoft-exchange-remains-unpatched
servers

A critical flaw in 350,000 Microsoft Exchange remains unpatched

7 Apr 2020