All the latest UK technology news, reviews and analysis


Level 3 moves into security market with network protection tools

01 Oct 2012
data-security-key

Fibre network giant Level 3 has announced its first move into the security market with a raft of products designed to help businesses withstand the increasing variety of cyber threats that can infiltrate via networks.

The firm unveiled the services on Monday, touting three specific network tools and a consultation services to help work alongside businesses on their requirements as well.

The first tool is a Secure Access Service that can be used to offer secure monitoring and protection of websites, so firms can ensure their customers and partners are not at risking when using their online services.

Secondly, the Managed Security Service tool is designed to block attacks onto companies' networks by analysing and responding to threats based on information it sees on its network.

Dale Drew, Level 3's chief security officer, said the firm had moved into the security market as it has access to a vast amount of data that can be used to hone its products to protect against threats.

"We have introduced a number of new security standards and solutions, ranging from botnet scanning to digital identity of threats," he said.

"Every day, we carry massive amounts of customer information securely across our global network platform."

The final product comes in response to the growing issue of DDoS attacks being seen by from groups like Anonymous.

The DDoS Mitigation tool is designed to manage traffic flows and recognise legitimate connections as opposed to attackers trying to bring down the network, the firm claimed.

The move underlines Level 3's push to grow its market share after it acquired former rival Global Crossing for $1.9bn to grow its fibre optic network across three continents via numerous undersea links.

Last week, Cisco's senior vice president of Cisco's Security and Government Group, Chris Young, highlighted the importance of the network in protecting against threats due to its ubiquity across the changing IT landscape as mobile devices increase in use.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth
About

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Networks
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
22%
15%
5%
19%
27%
12%

Popular Threads

Powered by Disqus
samsung-galaxy-s5-smartphone

Samsung Galaxy S5 video review

We break down the key strengths and weaknesses of Samsung's latest Android flagship

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Transition Manager - Managed Services

Our highly successful client is seeking Transition Managers...

Transition Manager - Managed Services

Our highly successful client is seeking Transition Managers...

Transition Manager - Managed Services

Our highly successful client is seeking Transition Managers...

Senior Project Manager

Our highly successful client urgently requires Senior...
To send to more than one email address, simply separate each address with a comma.