Security Edge
Secure access to corporate applications, from any location
Working outside the office can entail security threats, but now, with our Security Edge, you can browse securely and access your digital assets from any location and device.
What is Telefónica Global Solutions’ Security Edge?
The progressive digitalisation and relocation of the workstation requires new approaches to security
The work environment is no longer physically confined to an office. The digitalisation of the processes and applications to enable this relocation has expanded companies’ possibilities of acquiring talent, but they have also exposed themselves to vulnerabilities in relation to cyber-security and connectivity, which must be resolved in order not to lose the significant operational efficiencies that this new model has brought.
Security Edge meets this need for structural improvement of remote workstation security thanks to being a highly configurable and fully managed service that protects connectivity across the entire perimeter of the company, from users to the applications they use, regardless of where they are deployed (SaaS, IaaS or CPDs)
Telefónica Global Solutions’ Security Edge responds to these challenges.
This solution combines and consolidates the main network security functions in a single cloud security platform and offers different technological alternatives
Modular offering
Configurable according to need. It includes three main modules that can be supplemented with additional functionalities:
- Internet Security Gateway Module: Secure browsing
- Application Access Protection Module: Control and visibility over SaaS usage
- Zero Trust Access Module: New approach that makes it possible to establish granular access
Expert management and operation
SOC global team of experts who supervise the service 24×7, resolve any type of incident and ensure optimal operation of the service
Improved connectivity
International node footprint and direct connection in the main Internet interconnection points and cloud services providers guarantee the best user experience.
Optimisation of costs
Without additional investment for deployment and maintenance (OPEX model)
Benefits of Security Edge
Do you know everything it can do for your business?
Why TGS?
We know what is at stake in terms of security
Nowadays, the risks of cyber-attacks are a reality that no company can ignore
Your ability to compete in the marketplace
Knowing your intellectual property and industrial assets and trade secrets at stake: your data must be kept safe.
Your reputation or market share
Since no one wants to be considered “weak” or compromised: customer trust must be protected.
Your productivity
Due to business interruption, loss of sales or liability for lawsuits: nowadays, cyber-security is a major business risk.
We have the necessary experience and expertise to protect your company.
Traditional cyber-security measures, such as in-depth surveillance, firewalls and antiviruses, do not offer protection against these advanced persistent threats and, while it is true that total protection is impossible, comprehensive protection is possible and requires an adaptable protection process that incorporates prediction, prevention, detection and response capabilities.
Telefónica Global Solutions’ commitment to Security is upheld by our Information Security products division, which includes Telefónica Tech, which provides a radical and disruptive innovation in security services, combined with a best-in-breed range of leading security solutions and partnerships to give our customers a comprehensive information security offering.
We offer the best market technologies and modular functionalities
Internet Security Gateway, Aplication Access Protection, Zero Trust Access.
We have extensive experience
Both as a Telco Carrier and as a managed security services provider.
Security
Security Edge is especially designed to bring security functionality to your SD-WAN services and provide an integrated SASE solution.
FAQs
No, Security Edge is deployed as a modular, cloud-based service and therefore does no hardware is required.
Security Edge is a cloud-based service for web and application security. Thanks to its specialised technology, it can detect and protect against much more sophisticated and selective attacks than a firewall.
- Companies with a high geographical distribution in their web access, both national and international, that want to guarantee that all their employees follow the same security policies regardless of their location.
- Customers that seek to meet their security needs by reducing the costs associated to the deployment of equipment and staff, thanks to a managed security service with the guarantee of Telefónica’s team of professional experts.
- Companies that seek the flexibility of a hybrid security model, based both on the capabilities of their infrastructure and on Cloud elasticity and potential.
Yes, it allows customers to define selective HTTPS inspection, compatible with all the latest encryption algorithms. At present, more than 90% of web traffic is transported via TLS/SSL.
Security Edge guarantees the protection and access of any device thanks to a unified agent and to specific mobile applications.
Security Edge runs on a modular cloud platform managed by our SOCs. For this cloud platform we have different alternatives provided by leading security providers. We can currently offer the service via Zscaler, Netskope and Palo Alto.
There are different alternatives, but they are not intended to be mixed.
No, it can be offered as an independent solution.
- Internet Security Gateway: It provides secure Internet access. In addition to filtering web traffic, it also includes firewall and IDS functions.
- Secure access to applications: it focuses on access control and visibility of activity in companies’ corporate SaaS applications. It is based on CASB technology.
- Zero-Trust Access: It provides secure remote access to applications and services based on granular access control policies. ZTNA only allows access to the applications that each user needs through individual and isolated tunnels.
Additional functionalities are also offered (which will depend on the technology chosen) as complements to provide advanced services: Remote Isolation of Browsers, Data Loss Prevention, Behavioural Analysis.
Next steps