Overview
Application Protection
Authentication
Consulting
DDoS
Firewall

Savvis Security

The Experience and Expertise You Need for Data Protection

For over 15 years, CenturyLink Technology Solutions has delivered cost-effective, comprehensive, flexible and reliable security solutions to over 1,500 enterprise clients and has over 5,000 security installations under management. We deliver security at your site, at our global data centers, within our virtual hosting platform and over the Internet in the cloud.

Supported by a team of seasoned security experts, Savvis Security solutions can provide you with the following benefits:

  • The tools to help meet your applicable compliance requirements
  • Scalability to meet business growth
  • Lower capital costs and make operational costs predictable
  • Remedy gaps in your security team’s skill
  • Mitigate the risk of potential attacks

Enterprises are under attack.
Learn how to continually prepare for the next one.

Download Now


Resources

Secure your Data
for Bring Your Own Device
Performance Driven, Secure, Experienced
Risk Mitigated plans for your IT Security
Growing need for Application Security
Protection Against Potential Compromises
CenturyLink Has Security Covered
Don’t Patch Together Security Solutions From Different Vendors

 

Application Protection

Proven Protection for Critical Data

CenturyLink Technology Solutions’ application protection solutions help ensure your network applications are running smoothly—allowing only authorized application transactions and protecting critical data from application attacks, including hacking, cross-site scripting and parameter tampering.

Product Details:

  • Fully managed web application firewall service based on acclaimed Imperva technology
  • Detects and blocks malicious web requests; keeping your applications up and running
  • Prevents potential data leakage, by identifying leaks of sensitive data, such as credit cardholder information and social security numbers
  • Provides a critical additional layer of protection to your perimeter firewall infrastructure

Enterprises are under attack.
Learn how to continually prepare for the next one.

Download Now


Technical Details:

  • 24/7 managed and monitored security service
  • Perform inspection on traffic the perimeter firewall lets through to the web servers
  • Inspect encrypted traffic
  • Proactively block malicious traffic
  • Protects against leakage

Resources

Secure your Data
for Bring Your Own Device
Performance Driven, Secure, Experienced
Risk Mitigated plans for your IT Security
Growing need for Application Security
CenturyLink Provides Protection Against Potential Compromises
CenturyLink Has Security Covered
Don’t Patch Together Security Solutions From Different Vendors

 

Authentication

Control Threats, Risks and Vulnerabilities

Strong and reliable, CenturyLink Technology Solutions’ two-factor implementation secures access to corporate networks, protects the identities of users and  confirms that a user is who he claims to be.

Product Details:

  • Support of Cisco “Any Connect” VPN client software
  • Downloadable from URL provided at time of implementation
  • User configuration guide available
  • Split tunneling enabled by default
  • Supportable on Windows, 64bit windows, Linux and MacOS

Enterprises are under attack.
Learn how to continually prepare for the next one.

Download now


Technical Details:

  • Strong authentication services to work with remote access solution
  • Strong authentication to leverage RSA two factor based password with hardware or software based tokens

Resources

Don’t Patch Together Security Solutions from Different Vendors CenturyLink has it all
See all the Solutions
Performance Driven, Secure, Experienced
Risk mitigated plans for your IT Security
How does your organization IT organization compare?
2013 Global IT Leadership Study

 

Consulting

Proven and Tested Services that Proactively Identify and Effectively Address Your Security Requirement

From assessment to strategy, design to implementation to customized solutions, CenturyLink's Security and Network solutions help tailor an effective, flexible plan to monitor and enhance your security services. Working with you, our team of experts proactively identity network, data, application and enterprise threats/risks, vulnerabilities and cyber security issues, allowing you to prioritize your security issues and address your most urgent needs.

Find out how our
consulting services can
strengthen your security.

Get a Quote


Our MSS architecture includes commercial and self-developed technology for data collection, correlation and analysis, reporting, and device management. Commercial tools support workflow functions. MSS operations are audited under SSAE 16 (SAS 70), PCI Data Security Standard (PCI DSS), and CenturyLink-Savvis expects U.S. Government TIC 2.0 certification by the end of 2012. Log management functions are delivered with a combination of Tibco (LogLogic) technology and self-developed technology. Log management functions are available through the MSS portal. Advanced analytics to detect targeted attacks are embedded within the CenturyLink MSS capabilities, based on DDoS detection/mitigation, Web application firewalls (WAFs), network and host IDS/IPS, and file integrity monitoring.

Our Security Consulting team can provide you with:

  • Consultation and thought leadership from a team of security and compliance experts who have on average 15 years experience providing security solutions
  • Best-in-class methodologies and best practices for addressing security risks
  • Proven and tested experience and expertise across the full security cycle with over 50 tailored SaaS engagements
  • Extensive security presence across the US
  • Vendor independence while providing solutions
  • Members of ISO, ISACA, ISSA, IEEE and CSI

Our service portfolio includes the following consulting services to address your security needs:

  1. Network Security Consulting Services:
    Strategy/Advisory, Design/Implementation and Operations collaboration that span the following security towers:
  • Identity and access management
  • IT governance risk and compliance
  • Network security
  • Application security
  • Cyber security
  • Enterprise and data security
  1. Security as a Service:
    An in-depth and on-going analysis of your aggregate security and compliance requirements, risk and compliance controls, including the collection of your security data for analysis, as well as a broader umbrella of recurring service.
  1. Strengths
  • CenturyLink Technology Solutions is committed to delivering a robust range of security offerings that scale from start-ups and SMB’s to global enterprises with highly complex and specialized security need
  • CenturyLink Technology Solutions’ security controls and services are underpinned by a global data center and network infrastructure
  • Enhanced by its Arca Common Criteria Testing Laboratory

Resources

Secure Your Information
Protect Your Business
Cloud Computing and Security Implications
Best Practices to Adopt When Considering Cloud Services
Performance Driven, Secure, Experienced
Risk Mitigated Plans for your IT Security
Identify How Your Security Policies
Align with your Business Needs
 

 

 

DDoS

Cost-Effective Protection From a Growing Threat

One of the fastest growing threats today, Distributed Denial-of-Service (DDoS), can compromise your organization’s data, your customer’s data and your ability to conduct business.

CenturyLink Technology Solutions’ DDoS Mitigation provides protection from such attacks.   

Cloud-based, the DDoS filtering equipment is located on CenturyLink’s private Wide Area Network (WAN) backbone, which serves 20% of the world’s Internet traffic and extends to more than 85 countries.

Experienced analysts in our security operations center (SOC) provide 24/7 monitoring of CenturyLink's network and will work with you 24/7 during an attack to help ensure countermeasures are deployed and your site is protected.

Enterprises are under attack.
Learn how to continually prepare for the next one.

download now


Product Details:

  • Provides DDoS mitigation at CenturyLink’s core-router level
  • Can detect and mitigate a broad range of DDoS attacks
  • Mitigates attacks on non-CenturyLink networks
  • Can maximize business continuity by forwarding your legitimate transactions
  • Addresses DDoS attacks today and assesses how network-based behavior anomaly capabilities protect against future threats
  • DDoS traffic is redirected to “cleaning centers” that are geographically dispersed
  • Delivered as a “utility” service — eliminates purchase of additional software or hardware
  • Reduces your organization’s overall dedicated infrastructure costs, as the service makes use of CenturyLink-provided infrastructure

Resources

CenturyLink has Security Covered
Don’t Patch Together Security Solutions From Different Vendors
Performance Driven, Secure, Experienced
Risk-mitigated Plans for your IT Security
Pay for what you Use
DDoS Mitigation Services from CenturyLink
Securing your Data for BYOD
What to Consider

 

Firewall

Solid and Secure Protection Backed by Years of Experience

CenturyLink’s firewall solutions provide robust firewall protection backed by 24/7 management and monitoring by our team of experienced security experts.  Requiring no upfront investment in equipment or software, our cost-effective solutions allow you to focus on your core business competencies while we handle the operational details.

Product Details:

  • Management and monitoring of firewalls are provided with the service—cloud-based or dedicated—or are customer owned
  • Delivers weekly firewall activity reports based on log file analysis
  • Portal-based reports (log files available online for 30 days)
  • Unlimited rule-set changes
  • Delivered at IDC or customer premise

Enterprises are under attack.
Learn how to continually prepare for the next one.

DOWNLOAD NOW


Resources

Need a trusted Advisor for Security
See what CenturyLink Offers
Firewall, VPN Integrated Security Solution
Protection Against Compromises of Sensitive Data
Growing Need for Application Security

CenturyLink Provides Firewall Protection Leveraging Imperva ©

Industry Leading Managed Firewall Services
Deliver Operational Protection Every Minute 24/7

 

1-800-728-8471

What our customers are saying:

  •  

    We’re experiencing rapid growth and Savvis [CenturyLink] is key to helping us accelerate this growth while minimizing risk to our business and customer base.

    Andrew Manos
    Director of Managed Services
    Kronos
  •  

    One of Savvis’ [CenturyLink's] many strengths was its rich portfolio of managed services that spanned hosting, network and security functionality. I don’t think there’s anything Savvis [CenturyLink] offers that we don’t use.

    Mark Tirschwell
    Chief Technology Officer
    Wall Street Systems