A broad array of managed security options layered to defend Cloud/Hosting workloads.
To detect and block traffic flood attacks aimed at crashing or reducing availability of servers, applications, websites, and networks, CenturyLink DDoS Mitigation Service combines enhanced network routing, rate limiting and IP filtering with advanced network-based mitigation.
CenturyLink deploys, manages and monitors industry-leading next generation firewalls to protect and control network traffic while inspecting it for malicious content.
CenturyLink deploys, manages and monitors Imperva SecureSphere WAF appliances to protect Internet-facing websites from application-based web attacks. Imperva SecureSphere Web Application Firewalls protect http transactions from common attacks like SQL injection, cross-site scripting, etc.
Protect workloads with Trend Micro agents that alert on unexpected changes to OS files and directories that could be caused by breaches or the execution of malware that went undetected by anti-virus.
Log Collection adapters consolidate and correlate security events along with proprietary threat intelligence from CenturyLink's global network to alert on potential incidents. They are available for all CenturyLink Cloud and Managed Hosting platforms, including third party cloud providers, with consolidation, SIEM rules, and monitoring and escalation.
Vulnerability Scanning identifies the need to remedy any broader security weaknesses from potential exploits. Qualys vulnerability scanners issue warnings when infrastructure needs an extra layer of security protection.
CenturyLink-managed operating systems are hardened for malware defense, and anti-malware protection is included when CenturyLink manages the operating system for client workloads. Our system management maintains vigilant patch and signature updates to protect against the latest exploits. This bundled service helps the retail industry comply with PCI requirement section 5 and protects CenturyLink Managed Hosting, Private and Public Cloud platforms.
CenturyLink Cloud and Private Cloud defends against malware with Clam AV on RedHat Enterprise Linux, and Windows Defender on Windows workloads. Managed Hosting and Dedicated Cloud Compute include McAfee AV protection, managed by the McAfee ePolicy Orchestrator. Custom (SOW-based) solutions are available for CPC to deploy McAfee with a dedicated ePO management platform.
Cybersecurity and enterprise digital transformation go hand in hand with CenturyLink Global Security Operations Centers (SOCs). External and insider threats have become more complex, but the experts at our security operations centers work vigilantly around the clock.
We've provided DDoS mitigation since 2007 from eight locations across North America, EMEA and Latin America. Our global network provides extensive visibility into threats, and our SOC leverages this information to protect your assets.
The longer it takes to detect a cyberattack, the more harm it can cause. During a breach, attacks can conduct surveillance and steal data from your organization, increasing the cost and consequences.
Robust application protection keeps applications running smoothly and businesses adhering to industry and compliance requirements without compromising security to their data and network.
Interested in learning more? We'll schedule a no-obligation consultation to discuss your unique IT Security challenges and see how CenturyLink can help you solve them.
Maximize your investment in multi-cloud infrastructure, with better governance, lower costs and faster application delivery.
Engage experienced professionals to architect, optimize and elevate operational governance for Hybrid IT environments.
A scalable platform for deploying applications into production across any cloud infrastructure – private, public or hosted.