Telefónica introduces new software-based security service

Clean Pipes 2 will offer high-level security for low TCO, claims company

Networking and telecoms firm Telefnica Business Solutions has introduced a new software-based security service to help defend against threats both known and unknown across its business network.

Clean Pipes 2, as the product is called, has been developed in conjunction with Telefnica's cyber security unit ElevenPaths and Palo Alto Networks and is underpinned by the latter company's Next-Generation Security Platform.

Advertisement - Article continues below

The product offers features such as application-layer firewall, protection against known and unknown threats, web filtering and intrusion prevention. It's delivered to Telefnica Business Solutions customers as a service via its virtual network infrastructure, with the aim of delivering a high level of security at a lower total cost of ownership, the company said.

Hugo de los Santos, CEO for B2B products and services at Telefnica Business Solutions, said: ""With the implementation of this solution, Telefnica Business Solutions reinforces the security of Internet services for large customers even more. Additionally, it allows us to enrich the value proposition we offer to the segment of Large Enterprises, with a product that comes with great effectiveness and, at the same time, with a low investment."

Mark Anderson, president of Palo Alto Networks, added: "We are delighted to join forces with Telefnica to deliver unparalleled next-generation, breach-prevention security capabilities to its customers. Our collaboration gives organizations peace of mind, with complete visibility and control over the usage of their digital services, while knowing that cyberattacks on their most valued data assets and critical control systems can be prevented."

Advertisement
Advertisement - Article continues below

Clean Pipes 2 is available immediately to all Telefnica Business Solutions customers.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/business-strategy/careers-training/356422/ibm-job-ad-calls-for-12-year-experience-with-6-year-old
Careers & training

IBM job ad calls for 12-years of experience with six-year-old Kubernetes

13 Jul 2020
Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/security/cyber-attacks/356417/trump-confirms-cyber-attacks-on-russia-election-trolls
cyber attacks

Trump confirms US cyber attack on Russia election trolls

13 Jul 2020