Services not available everywhere. Business customers only. CenturyLink may change, cancel, or substitute offers and services, or vary them by service.

Slides:



Advertisements
Similar presentations
Peder Jungck, CTO & Founder
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
1 Effective, secure and reliable hosted security and continuity solution.
Which server is right for you? Get in Contact with us
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Guide to Network Defense and Countermeasures Second Edition
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Cisco and NetApp Confidential. For Internal Use Only. Do Not Distribute. Maximize Your Purchasing Power with Unified FlexPod Financing © 2014 Cisco and.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Firewall Configuration Strategies
Canada. Home phone service connects your calls using your high speed Internet connection Use existing telephone equipment with ACN’s Phone Adapter Unlimited*
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Capital TelePresence Financing & Messaging European Theatre For.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
As one of the most effective marketing methods available, marketing can deliver the highest return on your investment. Direct Direct Programs.
Norman SecureSurf Protect your users when surfing the Internet.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
With High Speed Internet in AT&T Territories Updated: No Upfront Costs to Add High Speed Internet! Add DISH Television and Get a $300 Reward Card!
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
MANIT WEB HOSTING SERVICES Presented by - Sandeep Jain & Devesh Lal CRISP, Bhopal.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Web Application Firewall (WAF) RSA ® Conference 2013.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
$31.05 /mth {$28.92 plus $2.13 GRRF} 250 Daytime Minutes / 250 Incoming Minutes Unlimited Evenings (from 6pm) and Weekends Free Call Display and Voic .
New Charter School Internet Connectivity and E-Rate Jeannene E-rate Coordinator.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives.
IS3220 Information Technology Infrastructure Security
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
BellSouth DataCare IP Telephony Manager July, 2004
Chapter 6: Securing the Cloud
NC Department of IT Overview
Lab A: Planning an Installation
Five Technical Considerations Before Bringing Your Business Online
Cloud Firewall.
Barracuda Web Filtering Service
AT&T Premises-Based Firewall Enhanced SBS Solution
CONNECTING TO THE INTERNET
Data Center Firewall.
CenturyLink® Business Wi-Fi
VCE Practice Test Questions Answers
Firewalls.
Maximize Your Purchasing Power with Unified FlexPod Financing
Resume Writing Basic Font No colors (recommended)
HARBORTOUCH ATM PROGRAM
AT&T Network Based Firewall with NetBond® for Cloud
TECHNOLOGY PROTECTION
AT&T Dedicated Internet (ADI)
Presentation transcript:

Services not available everywhere. Business customers only. CenturyLink may change, cancel, or substitute offers and services, or vary them by service area at its sole discretion without notice. ©2013 CenturyLink, Inc. All Rights Reserved. 8/13

Multiple Layers of Managed Security

The New Internet Experience Resource contention, congestion, and sub-optimal performance IT expertise required for optimization Unpredictable capital expenditure from equipment obsolescence Increased risk with single points of failure More efficient operating expense model Security built into the network Better performance, Internet access via many gateways Improved business continuity from reduced points of failure Highest level of visibility and tracking INEFFICIENTOPTIMIZED 5

6 Best-in-Class Network Visibility Management and Reporting portal:

Reduce Your Risk

Strengthen Your Network

Improve Performance

Choose the Security Type that’s Right for Your Needs 14

Choose the Support You Need 15 CenturyLink managed One year log retention Limit of one policy change per month Maximum of five site-to-site VPNs Policy change timeframe of 24 hours CenturyLink managed Maximum site-to-site VPNS, subject to platform limits Seven year log retention Normal policy change timeframe of 8 hours Two urgent policy changes per month (2 hour response time) Unlimited policy changes each month Intended to be customer managed One year log retention CenturyLink provides up to 2 hours of support per month Customer responsible for all policy changes

Choose and Combine Promotions 16

Promotions Terms and Conditions 17 Offers expire 12/31/2013. Services and offers not available everywhere. Business customers purchasing new Network-Based Security (NBS) services only. Offer, plans and stated rates are subject to change and may vary by service area. Requires credit approval and deposit may be required. Offers combinable only with other qualifying offers. All offers exclude taxes, fees and surcharges. Terms and Conditions: Products and services are provided by the CenturyLink operating company serving your service location. Services and offers are governed by terms and conditions and require execution of a minimum 12-month term agreement. Early termination fees will apply (a) in the amount of any nonrecurring/installation charges that CenturyLink discounted or waived and (b) an amount equal to 50% of the balance of the MRCs that otherwise would have become due for the unexpired portion of the Service Term. Security Bandwidth. The security bandwidth level that Customer selects will be the maximum throughput for Customer traffic passing between Customer’s CenturyLink IQ Network Private Port network and the Internet. CenturyLink may limit the maximum security bandwidth level available for purchase for a particular Service instance based on the security type, the security features, and the complexity of the policies selected. 10Mbps Offer: limited to Essential or Optimal security type and a Self Managed, Basic, or Prime support level. The security bandwidth must be 10 Mbps. Technology Upgrade Offer: Minimum 24- month term required. The MRC waiver period will begin on the first day of the first full billing cycle (not calendar month cycle) following service start date. Customer will be charged a prorated MRC for the period from the service start date to the first day of the MRC waiver period. CenturyLink will waive the security type/support level MRC and the associated security bandwidth MRC for up to two months in addition to the NRC for the Self-Managed, Basic, Value or Prime service level chosen. Multi- location Offer: For each new primary NBS service instance purchased, customer will receive additional service instances at no additional MRC or NRC provided that all service instances are installed at different locations, are connected to the same private port closed user group (“CUG”) and have the same feature functionality. For multiple CUGs, Customer will be charged an MRC and NRC for a primary service instance within each CUG.

Security Services Appendix 18

Overview: A Layered Enterprise Security Solution

20 DDoS Attack Mitigation Mitigates malicious traffic before reaching your private network Proactive option alerts to DDoS attacks Improves service availability to your customers and maintains your brand reputation Ideal solution for finance, e-commerce and others with high customer and business value tied to their Internet availability. 3

Provide a network-based managed security service that filters and cleans e- mail prior to reaching your network Work to block inappropriate content and prevent worms and spear-phishing attacks from infiltrating your network Help remove the burden of dealing with malicious s at the end user level Minimize the risk of your employees from unwittingly launching dangerous malware into your company’s network 21 CenturyLink ® Defense

22 CenturyLink Professional Services Address more complex IT challenges with the aid of seasoned CenturyLink and Savvis experts Optimize data and technologies to meet strategic and future needs Savvis and CenturyLink professional and operational services complement CenturyLink Networking solutions We help you focus on the entire life cycle and forward looking aspects of your environment – not just on providing point solutions

Savvis Managed Firewall Solutions Savvis Managed Firewall solutions work from hardware based on your premises. Excellent for internal firewall needs between user groups or more managed, hardware-based, external firewall protection.