Network and Data Protection
PCCW Global offers an enterprise security portfolio customised to your organisation’s needs. Unmatched in ability to help you disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security, PCCW Global’s Crypteia family of security services can safeguard your most critical data from compromise.
Because our global “footprint” of interconnected networks and communications links spans over 20% of the worldwide Internet, our global Security Operations Centres monitor these threats, and our security applications and services collect and manage data across the widest threat landscape. This vast visibility provides our customers with the most comprehensive, robust and cost-effective security management solutions and services available.
Additionally, we consolidate threat data from 72 different global threat sources, and process 5+ billion threats daily.
the Crypteia Threat Intelligence & Management Service (TIMS) provides a 24/7/365 threat monitoring and identification system together with an integrated Security Operations Centre (SOC) security advisory service providing enterprises automatic threat identification, monitoring, reporting and alerting, as well as global threat mitigation.
Crypteia Managed Anti-DDoS helps prevent distributed denial of service (DDoS) attacks by routing traffic away from critical infrastructure assets during an attack.
Crypteia Cloud Firewall and Crypteia Managed Firewall both offer a deep level of security and a one-stop-shop for hassle-free firewall management. Options that include firewall rental, installation, configuration, hardware maintenance and 24/7 monitoring
Crypteia Managed Router Service is a fully managed service that offers router rental, installation, configuration, maintenance and management
PCCW Global’s Professional Security Services provide a broad range of security expertise and service offerings. Our security consultants, researchers and analysts help customers assess their critical network infrastructure, identify essential controls, and implement policies and technologies for achieving and maintaining optimal security posture at cost-effective levels.