Digitalks: Cybersecurity podcast

IT Security solutions

Secure your infrastructure and workplaces

Secured infrastructure

A reliable business starts with a secure network. Secure your network and infrastructure against sophisticated attacks and prevent your company's applications and websites from becoming inaccessible.

Protect your infrastructure easily with the following plug-and-play security solutions from Proximus. Or contact our experts for a tailored security strategy.

Next Generation Firewall for Explore and Fiber Max

Next Generation Firewall as a Service

Advanced firewall that protects your Explore network, and your organization's devices and employees connected to it. Since this firewall is located in our network, we can easily keep it up to date. Online dashboard for easy configuration and adjustment and reporting.

We offer packages with different bandwidth, for Explore and Fiber Max, fully integrated and always up-to date.

L

Max 1 Gbps bandwidth
(up + down)

XL

Max 2 Gbps bandwidth
(up + down)

XXL

Max 4 Gbps bandwidth
(up + down)

Contact me Opens a new window

Options

Combine options for additional security or functionality as needed.

Advanced security

Additional security layer: content and URL filtering, protection against malware and zero-day attacks (sandboxing protection) and intrusion prevention (IPS).

SSL teleworking

Allows users to connect securely to your network.

Redundant firewall

If one of two firewalls fails, the other takes over. In this setup, you can also opt for an advanced Service Level Agreement.

Integration with your directory service

Create firewall rules based on users and groups from your directory service.

Training, consultancy and management

We offer several options to help you maintain the firewall. From trainings for your administrators to full management and monitoring.

User manual

Find the manual for the management of the Explore Next Generation Firewall here.

Security against DDoS attacks

Protection against DDoS attacks

Keep Internet access to your organization's website and applications available at all times, even during a Distributed Denial of Service attack (DDoS attack), such as volumetric attacks, TCP State-Exhaustion attacks and Application Layer attacks.

For each type of attack, we offer a solution that will help keep your organization accessible.

DDoS Protection

For Professional Internet and Explore Fibermax Monosite. Protection against volumetric attacks:

  • Detection and mitigation of volumetric DDoS attacks
  • Automatic DDoS mitigation, or on customer request

Explore DDoS Wall

For Explore Intense Monosite and Explore Multisite. Advanced protection against volumetric attacks with SLA:

  • Detection and mitigation
  • Automatic DDoS mitigation, or on customer request
  • Reporting
  • Personalized detection and mitigation template
  • Attack notifications
  • Integration with onsite DDoS Protection possible
  • Service Level Agreement (SLA)

Onsite DDoS Protection

For data centers.

  • Protection against:
    • TCP State-Exhaustion attacks
    • Application Layer attacks
  • Integration with Explore DDoS Wall possible to activate this solution when a volumetric DDoS attack is detected

Software Defined WAN (SD-WAN) security

Software Defined WAN

Fully integrated and centralized security for your SD-WAN network.

Secure hybrid cloud

Secure hybrid cloud

Hybrid cloud security is a shared responsibility: your service provider secures the underlying infrastructure and you secure your data. Solutions: Application protection, Firewall in the cloud, Hybrid security, Virtual firewall, DDoS protection,...

Tailor-made infrastructure protection

Tailor-made infrastructure protection

In addition to plug-and-play solutions, Proximus also offers infrastructure security solutions that are fully tailored to the needs of your organization.

Secure workplace

Protect your devices and data from security threats such as ransomware, DDoS and phishing. Prevent leaks of information that is crucial for keeping the organization running. Even if your employees work at home.

Protect your employees and workplaces easily with the following plug-and-play security solutions from Proximus. Or contact our experts for a tailored security strategy.

Secure your digital workplace

Secure your digital workplace

Ensure a safe and productive mobile fleet and keep your costs under control. 

Solutions: Enterprise Mobility Management (EMM), Endpoint Protection, Single Sign On (SSO), Unified Endpoint Management, Mobile Threat Protection, etc.

Secure your e-mail traffic

Secure your e-mail traffic

Prevent phishing and spam and protect your confidential business information from malware and intentional or accidental leaks.

Download the Cloud Mail Security brochure (.pdf)New window

Securing digital identity

Securing digital identity

Manage and secure the digital identity of your employees with the Identity Governance and Administration (IGA) and Privileged Access Management (PAM) solutions from Proximus.

Tailor-made workplace protection

Tailor-made workplace protection

In addition to plug-and-play solutions, Proximus also offers workplace security solutions that are fully tailored to the needs of your organization.

What our customers say

All SNCB applications run on the device from inside a shielded container, in order to have a secure, high-performance device.

Pascal Rooms, ICT coordinator at SNCB

Read the customer testimonial

We consciously opted for smartphones as a service. At Familiehulp we focus on our core business, i.e. what we do with our hearts. Smartphone management is beyond that scope.

Griselda Symons, Director of ICT policy at Familiehulp

Read the customer testimonial

Working more secure, as a result of endpoint security and the simpler management that comes with the network's software-defined setup.

Bram Deprettere, IT-manager at Vandelanotte

Read the customer testimonial

We can now guarantee the security of confidential information for projects commissioned by the government and international organizations.

Tom Van den Abeele, IT Manager at B2Ai

Read the customer testimonial

The mobile security platform not only protects against data breaches: it also separates company data from private data.

David Bourriez, IT-expert at Kind en Gezin

Read the customer testimonial

This security-as-a-service approach benefits everyone. [...] The final result is better than when you undertake the exercise on your own.

Marc Vandersmissen, IT Manager at FPS Finance and Ivan Verborgh, IT Manager at FPS Justice

Read the customer testimonial

Partners

Stronger together against cybercrime

Together with you, we select the partners and technology that best suits your organisation's specific needs and requirements. Proximus is also a member of various organizations, such as the Cyber Security Coalition, where the exchange of cybersecurity knowledge is key. As a result, you can always rely on the most up-to-date information and the most suitable services from our security professionals.