The Telekom complete package for IT security provides optimum protection against cyber attacks.


How do I protect myself against cyber attacks?

The risk of becoming a victim of a professional hacker attack is increasing. According to the security provider Kaspersky, nine out of ten companies have already been the target of an attack from the internet.
The threat situation and therefore the risk of becoming the victim of a hacker attack is increasing. Currently, the number of cyber attacks on Deutsche Telekom's IT systems is four to six million – every day. Just two years ago, the total number of attacks was a mere tenth of this. The daily updated figures can be viewed on Deutsche Telekom's security speedometer at According to the security provider Kaspersky, nine out of ten companies have already been the target of an attack from the internet. The healthcare industry in particular is increasingly coming into focus. Firewalls and anti-virus software, for example, no longer offer adequate protection against the latest cyber attacks. With growing digitalization, however, stable and secure IT operations are becoming increasingly important for hospitals. Telekom Healthcare Solutions therefore offers hospitals a special package to strengthen their IT security. 

Complete package for IT security

The complete Cyber Defense security package covers a total of four areas: preventing, detecting, responding to, and predicting IT attacks. Prevention involves an analysis of the current situation and drafting of recommendations for action. Detection focuses on the security of devices and firewalls. Responding is covered by an incident response service. Specially trained Deutsche Telekom experts support the recovery of the systems during and after an attack. With the prediction package, hospitals protect their network and IT systems from professional attacks in real time. This allows attacks to be detected at an early stage and countermeasures to be taken before hackers can cause any damage.

The benefits of the IT security solution at a glance:

  • Professional cyber attacks are fended off.
  • The Cyber Defense offerings make it possible to participate in defense measures that are otherwise only used by large corporations. Hospitals thus receive a high-end solution at a low price.
  • This is made possible by shared platforms, which means that security tools are used by several customers, of course strictly logically separated from each other.
  • Protection is also provided against new threat scenarios such as advanced persistent threats that take advantage of zero day exploits (of hitherto unknown security vulnerabilities).
  • Preconfigured solutions provide hospitals with timely and appropriate protection, which means short implementation times and less maintenance for them.
  • The extent to which the hospital IT staff needs to build up its IT security expertise remains manageable, as the tools are configured and monitored by Deutsche Telekom's cyber security specialists.
  • Deutsche Telekom takes care of the provision of hardware, licenses, monitoring, maintenance, and incidents. This means that the work effort for IT employees is low, but the benefit is very high.

Deutsche Telekom accompanies you into the digital world

Today, IT does not just support business processes. Software and networks are part of the digital society and take over and control central and business-critical tasks. Interconnected IT systems are increasingly controlling vital machines and processes – not only in intensive care units and operating rooms, but also on high-speed railway lines or in aircraft. All these areas are dependent on error-free IT. That's why Deutsche Telekom pursues a strict zero-error culture – and thus enables the best IT security and quality.
Solutions for more IT security
Protection against annoying and dangerous content, operated in highly secure German data centers. With Business Mail Protect, Deutsche Telekom offers comprehensive protection in order to combat spam and malware from emails.
Deutsche Telekom's cyber defense for SMEs protects companies by employing state-of-the-art knowledge: the behavior of networks and IT systems is monitored contextually and in real time, attacks can be detected much more quickly, and countermeasures taken before any damage occurs. Such actions range, for example, from the collection and analysis of log and network data by a Security Incident and Event Management (SIEM) system right through to the handling of security incidents with the involvement of the Security Operation Center (SOC).
Over the last few years, drone technology has not only become more powerful, it has also become easy to control and affordable. Misuse of this technology is also growing in line with this and represents an increasing threat: not only espionage, but also sabotage and attacks from the air can affect hospitals.
IT systems are not only subject to threats from the Internet, but can also become the target of attacks from the internal network. Typical sources of danger of such attacks are:
  • Computers infected by malware
  • Attackers who penetrate the network unnoticed
  • Employees who ignore applicable security provisions
Classic security measures, such as central firewalls, can only counteract these dangers to a limited extent. By placing several honeypot sensors within vulnerable subnets and forwarding information from suspicious data packets in the network, information about attackers, their methods, and motivation can be collected. In addition to the ability to respond automatically to attacks, sensitive systems can be faked as a distraction in an IT infrastructure.
Internet Protect Pro relocates the cyber security shield to the cloud and protects companies against malware from the Internet. The solution offers extensive security, transparency, and control in real time and is also easy to configure and use. This helps to avert the risk of employees surfing the the internet without restriction.
Cyber criminals are increasingly targeting mobile devices because devices used by employees often lack adequate security. Just one infected device is enough to cause lasting damage to a company. Mobile Protect Pro provides real-time protection for companies and their employees against the full range of attacks on devices, networks, and applications.
If you want to know how stable and secure your systems really are, you need to challenge them with the same methods that attackers would use. That is why T-Systems offers "penetration tests" or "cyber attacks on the customer's behalf." By taking on the role of attackers, and using attackers' reasoning, approaches, and methods, security experts can identify and review weaknesses, and design suitable countermeasures, in the most reliable way possible.
Vulnerability Scan as a Service provides a vulnerability analysis and documentation of the security features of all deployed systems, including all vulnerabilities.
Customers of these services benefit from the close exchange of information with the Cyber Defense Center and the Security Operations Centers of Deutsche Telekom and T-Systems, the operation of ICT infrastructures for multinational customers, as well as membership in the FIRST, Terena, and National CERT networks.
We offer the following services for rapid intervention and management of security incidents:
  • Incident response hotline
  • Incident response onboarding workshop
  • Hourly package for off-site and on-site support
  • SLA for on-site support Europe
  • SLA for on-site support World
Off-site support and on-site support include direct incident response support as well as forensic analyses and analyses of malware as required.
With Web DDoS Defense services we offer you support for DDoS attacks on your web servers. It does not matter whether the web server is located in your infrastructure or with a provider. Web DDoS Defense can be used against attack traffic based on the TCP protocol. DDoS protection is implemented via DNS forwarding.
On premise
The DDoS mitigation device distinguishes between legitimate and illegitimate network traffic and filters out the illegitimate packages. The regular automatic signature update ensures that new and dynamic DDoS attacks are detected.
Typically, the DDoS mitigation device is positioned between the internet connection and the firewall on the customer's site, and cleans incoming internet traffic of DDoS attack vectors.