Telefónica introduces new software-based security service

Clean Pipes 2 will offer high-level security for low TCO, claims company

Networking and telecoms firm Telefnica Business Solutions has introduced a new software-based security service to help defend against threats both known and unknown across its business network.

Clean Pipes 2, as the product is called, has been developed in conjunction with Telefnica's cyber security unit ElevenPaths and Palo Alto Networks and is underpinned by the latter company's Next-Generation Security Platform.

The product offers features such as application-layer firewall, protection against known and unknown threats, web filtering and intrusion prevention. It's delivered to Telefnica Business Solutions customers as a service via its virtual network infrastructure, with the aim of delivering a high level of security at a lower total cost of ownership, the company said.

Hugo de los Santos, CEO for B2B products and services at Telefnica Business Solutions, said: ""With the implementation of this solution, Telefnica Business Solutions reinforces the security of Internet services for large customers even more. Additionally, it allows us to enrich the value proposition we offer to the segment of Large Enterprises, with a product that comes with great effectiveness and, at the same time, with a low investment."

Advertisement
Advertisement - Article continues below

Mark Anderson, president of Palo Alto Networks, added: "We are delighted to join forces with Telefnica to deliver unparalleled next-generation, breach-prevention security capabilities to its customers. Our collaboration gives organizations peace of mind, with complete visibility and control over the usage of their digital services, while knowing that cyberattacks on their most valued data assets and critical control systems can be prevented."

Clean Pipes 2 is available immediately to all Telefnica Business Solutions customers.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019