I mentioned in my last post that I would be talking about network security on a regular basis.
Last week, Level 3 launched a new global managed security offer. I think this is noteworthy for two reasons.
First, this is our first global offer launch since the merger with Global Crossing, one year ago. Happy first anniversary, by the way, to all of my colleagues; it’s been a very busy and fast year!
Second, the Level 3 managed security offer is genuinely different from, and we believe superior to, any other network security offer in the industry today.
It’s this second point I’d like to expand on because lots of network security providers make similar claims. As with any point to discuss or debate, context is important. The context here is in what we are trying to help customers accomplish —a more secure environment, from the earth to the cloud. This context is against the backdrop of the primary security challenges that customers have; ensuring the continuity of operations, managing risk-to-brand and intellectual property and managing operational complexity in the face of an ever changing threat landscape.
So, why do we believe our global managed security offer is superior? It’s not just the robust nature of our Universal Threat Management (UTM) offer. It starts with our physical network infrastructure where we have built our network with two or more diverse routes to most cities. The volume of Internet services traffic, size of DNS caches and content host traffic traversing our physical network, which we control and operate, gives us a unique window into the cyber threat landscape. Through this window, our security team has access to more security threat data than almost anyone in the industry and is able to correlate physical and logical security events across each network layer to proactively mitigate impact to a customer’s network. The analysis and correlation activity we perform is integrated across our network services portfolio and extends the protection we are able to provide to our customers far beyond their physical premises.
Our physical network assets, intellectual property, security processes and expertise are the key ingredients that enable us to monitor the threat landscape in each network layer and to proactively protect our customers from network-based attacks. The net for customers is faster resolution of Internet security risks, from the earth to the cloud.
In the coming weeks, I will share what we are seeing and hearing from customers as they secure their environments with us. Until then, I welcome your feedback and questions and hope you stay secure!