Security

Business is everywhere. Security should be too.

Safeguard your data, people, business and reputation with Telstra International multi-layered security services.

Multi-layered Security Services

The challenge with today’s cyberthreats is that they’re invisible, expensive and everywhere.

So, how do you protect your business?

Your people?

Your systems?

And your network?

Introducing Telstra International Multi-layered Security Services.

Empowering you to address CIA principles (Confidentiality, Integrity, Availability) and cover all attack vectors so you can do business with confidence – from the device to the cloud. (People. System. Network)

Our managed security services can help fortify your business to innovate with efficient new processes and transactional models.

We start by assessing your posture.

  • Security and threat assessment
  • Incident response readiness
  • Compliance and standards alignment

Skilled security professionals can help you strengthen capabilities and meet compliance so you can establish a secure, modern workplace that has data, endpoint and identity protection.

  • Identity management
  • Endpoint protection

Trust your data and voice transmissions across a secure, resilient network and be confident that your business operations are protected with strong, multi-layered defence.

  • Private connectivity
  • Managed network
  • SASE secure edge
  • DDoS protection
  • 24/7 cyber detection and response

All from a trusted critical infrastructure provider that treats security as a whole-of-business priority and has the in-depth security expertise to deliver on it. 

(400k devices under management across the world, Providing managed security services to over 600 customers worldwide, deep experience and knowledge of security frameworks)

Business is everywhere. Security should be too.

In today's digital landscape, businesses must evolve into hyperconnected digital business to maintain competitiveness. Delivering a seamless digital experience and infrastructure that caters to customer, partner, and employee needs is crucial for value creation.

However, this brings a proliferation of data and challenges for traditional security frameworks. Security is the bedrock of this new digital landscape, underpinning the connectivity, devices, and data that drive your business. Hyperconnected digital trust is therefore essential in protecting this digital ecosystem.

We are a Major Player in Worldwide Cybersecurity Consulting

Read to see why Telstra was recognised as a Major Player in the IDC MarketScape: Worldwide Cybersecurity Consulting Services 2024 Vendor Assessment.

Security solutions to safeguard your business

Quickly detect and respond to cyber threats

In today's complex threat landscape, building and sustaining a world-class security operations center (SOC) is a challenge. Enterprises grapple with an array of evolving cyber threats, talent shortages, and the complexities of managing an expanding attack surfaces.

High barriers to entry, coupled with the need for scarce, specialised skills, make it difficult to establish a 24X7 security operations capability. Security teams are overwhelmed by an influx of security alerts, making it difficult to prioritise threats and respond effectively.

Telstra Cyber Detection and Response offers enhanced visibility through rapid incident detection and notification, enabling enterprises with swift response to minimise damage and downtime.

Key features

Rich Analytics

We leverage high-fidelity detection correlation rules, statistical models and machine learning across a wide range of data sources to detect threats.

24X7X365 Managed XDR

Our TSOC actively detects, prioritises and responds to security incidents. Managed Extended Detection and Response (XDR) enables endpoint threat containment.

SOAR

Our Security Orchestration Automation and Response (SOAR) capability enables more efficient and effective security operations workflows.

Everything-as-Code

Infrastructure, detection rules, playbooks, configurations, analytics and algorithms are all managed and supported as code.

Benefits

Detect New, Advanced threats

Protect your sensitive data and business operations by improving attack surface visibility and detecting sophisticated, new and evolving threats with Telstra’s 24X7X365 threat detection.

Rapid Threat Containment

The TSOC leverages customer Endpoint Detection and Response tooling to quickly contain threats, reduce the impact of a compromise on your environment and help control regulatory, reputational, business continuity, and data protection risks.

Streamline Security Operations

SOAR playbooks automate repetitive analyst tasks and coordinate workflows spanning disparate security tools, controlling security risk by both speeding up and enhancing triage, investigation and response activities.

Exceptional Operational Efficiency

The Cyber Detection and Response platform delivers exceptional efficiency, scalability and stability that our customers can rely on and empowers us to quickly respond to developing threats.

How it works

1. This is a diagram with the 4 steps of Cyber Detection and Response. 2. From left to right it shows Events Logged, Process and Enrich, Cyber Security Modelling and lastly, Identify and Respond. 3. Description of each stage is described in the text below.
  1. Events Logged
    Telstra Cyber Detection and Response ingests data from your on-premise and cloud environments.

  2. Process and enrich
    Data are then structured and enriched with threat intelligence and geo-location information.

  3. Detect
    Our sophisticated threat detection engine analyses data to detect anomalies and threats.

  4. Identify, Respond & Contain
    Our Telstra Security Operations Centre will rapidly detect and respond to threats, notifying affected customers and containing attacks. We leverage SOAR to enhance security operations workflow efficiency and effectiveness.

Resilient security, uninterrupted operations

As cyber security threats become more sophisticated and dangerous by the day, your business needs a solution that can help prevent one of today’s most prevalent threats: Distributed Denial of Service (DDoS) attacks.

Your network can suffer from serious downtime when you are impacted by DDoS attacks, so you need a solution that can help protect your network and business from these threats. Telstra’s Denial of Service Protection (DoSP) solution helps you safeguard your productivity, customer satisfaction, and profits through securing your critical online assets and websites.

Key features

Dedicated 24X7 hotline

Telstra’s Security Operations Centre (SOC) is available to work with you to understand and mitigate a potential DDoS attack at any time of day.

Monitoring and alarming

The status of your network is monitored for potential DDoS attacks. If thresholds are reached, an alarm is raised with the Security Operations Centre (SOC).

Clean traffic management

With a unique ability to provide granular protection, including to a /32 host level, cleaned traffic is delivered to your premises via GRE tunnelling.

Flexible mitigation options

If your thresholds are reached, mitigation can be activated manually or automatically, with traffic redirected to a scrubbing centre for mitigation.

Benefits

Global coverage

Six Global Traffic Scrubbing Centres cover key international internet peering points for adaptability and flexibility without compromising performance.

Easy to deploy

Deploy without purchasing, installing, or maintaining additional hardware. It’s cost-effective as there’s no need to hire specialist security staff.

Host-level mitigation

Telstra is able to mitigate at a /32 host level, with the flexibility to activate mitigation manually or automatically.

Fully managed

Get access to a dedicated team of security analysts for proactive, 24X7 monitoring and get notified if your traffic thresholds are crossed.

Reputational and financial protection

Safeguard your brand and help avoid the costs to your bottom line, while protecting your business from a DDoS attack.

How it works

1. This diagram shows traffic from customers and DDoS attackers going through a Monitoring and Detection system.  2.	Traffic is then directed to the Traffic Scrubbing Centre and any attack traffic is blocked or ‘blackholed’ as a last resort. 3. Normal traffic is allowed to continue to the website.
  1. Traffic statistics are sent to the Monitoring and Detection system. An alarm is triggered to initiate mitigation procedures when a DDoS threat is detected.

  2. Traffic is redirected to the cleaning center, and attack traffic is dropped.

  3. Normal traffic is then sent to the customer site. Additionally, traffic can be 'Blackholed' as a last resort.

SecureEdge protects your business today and into the future

In a rapidly evolving threat landscape with risks emerging every day, protecting your business today and into the future becomes a top priority. Telstra can help with our next-generation cloud security we built with Palo Alto Networks.

SecureEdge is an advanced enterprise-grade, next-generation security solution delivered via the cloud and adheres to the Secure Access Service Edge (SASE) framework. It’s the next evolution of protection for your networks and business as threats become more expansive, pervasive, and impactful. Have the ability to secure access, protect your users and applications, and apply consistent controls across your remote or mobile workforce and large branch offices.

Key features

Comprehensive security

Get advanced threat prevention and next-generation firewall policies for your remote and mobile users through IPsec and SSL VPN.

Designed for the modern enterprise

SecureEdge is specially designed to meet your growing security needs across diverse cloud, branch, and remote workforce use cases.

Dynamic portal

An easy-to-use portal allows you to view and control your cloud security policies via a real-time dashboard and receive notifications as critical events happen.

Highly available cloud architecture

SecureEdge delivers inherently high uptimes, reliability, and resilient service as a standard.

Visibility and control

Take charge of your applications and data flowing through the cloud security instance.

Benefits of Telstra SecureEdge

Scalable enterprise-grade security

Advanced application layer inspection helps guard against security threats through a solution delivered by our global networks and Palo Alto Networks.

Adaptable and flexible without compromising performance

Get a scalable, reliable, agile, and cost-effective cloud security solution that offers high performance everywhere, anytime.

Reduce risk and stay compliant

Eliminate the attack surface, improve visibility, determine threats before they happen, and remain compliant across your networks.

Reliability and high visibility

High-availability architecture delivers inherently high reliability, uptime, and performance to protect your business from impact when unexpected events happen.

Remote user protection

Extend the protection of SecureEdge Cloud to members of your mobile workforce, no matter where they are.

How it works

1.	This is an image of SecureEdge Cloud with Telstra Management. 2.	It is a flowchart that shows how branches and remote users can securely access networks via SecureEdge. 3.	SecureEdge Cloud secures traffic and protect information from head office data centre to branch offices with next-generation firewall. Remote users use SecureEdge Remote to access applications via the internet through the SecureEdge Cloud platform.
  1. SecureEdge Cloud platform secures traffic and protects information for distributed branch offices by enabling Next-Generation Firewall features.

  2. SecureEdge Remote enables consistent security to access applications and internet via SecureEdge Cloud platform to mobile workforce/users.

  3. Telstra Management is provided via Telstra Assurance/support team and allows you to securely enable your mobile workforces/users and branch locations.

Our technology partners

Paloalto networks logo

Industry awards and recognition

Paloalto networks logo
2022 Palo Alto Networks EMEA Prisma Access Partner Awards

Take your security to next level with these complementary technologies

Cyberattacks are evolving faster than ever. Our Managed Security Services provide 24X7 monitoring, expert threat detection, and proactive response - so you can focus on what matters most.

Get dedicated, secure, low-latency and high-capacity connectivity and fast, flexible performance for your unique business needs.

Discover a world of opportunity with agile, secure virtual private network services delivered on a highly resilient, scalable global network.

Find out more

Cover image of the Cybersecurity Posture Report, titled "Rising Threats - Time to Strengthen Your Cybersecurity Posture"

Rising Threats - Time to Strengthen Your Cybersecurity Posture

Read the Omdia report to learn about the key recommendations to strengthen your organisation’s security posture.

Cover image of the CIA Security Triad Report, titled "The CIA Security Triad - Protecting What Matters Most in Digital Transformations"

The CIA Security Triad - Protecting What Matters Most in Digital Transformations

Read the Omdia report to learn how to protect your IT estate from the increase in attack surfaces.

The Cybersecurity Journey: How Far Are You From Being Proactive?

Organisations must adopt a proactive cybersecurity approach to stay on top of cyberthreats. Find out which stage you are right now in the cybersecurity journey and learn how we helped global organisations in different stages.

Why Telstra

Security is a whole-of-business priority — and Telstra has deep experience and expertise to help manage the complexities of the digital business landscape for your organisation. We’ve spent decades protecting businesses across the globe, including ours and our networks.

Expertise and Experience

Our deep experience and knowledge of security frameworks such as NIST, GDPR and SOC 2 enable us to implement robust and effective solutions that align with your industry, compliance requirements, and risk management objectives.

ISO/IEC 27001 Certified

Our technology, delivery and support processes are certified to the ISO 27001 Information Security Management standard.

Strong Alliance Ecosystem

We bring the strength of our partner alliances with major global technology leaders to support you.

Proven Consulting Methodology

With its 4D Methodology, Telstra Purple has helped many global customers strengthen their security posture.

Our alliance ecosystem

Let us protect your business.

We bring deep security experience and knowledge to help you strengthen your security posture.