perimeter security banner

What is Perimeter Security?

Firewalls and Intrusion Prevention Systems (IPS) for protection against malicious attacks, are seen as the most critical first line of defence ensuring a secure network. A managed hosted shared or dedicated Vodacom Firewall solution provides the maximum level of perimeter protection to our customers' internal network connectivity to the Internet, including optional bulit-in UTM (Universal Threat Management) features.

  Perimeter Security solution offerings

RS0K9JM15.l0BYk960BNCS

Managed Hosted Shared Firewall

The shared firewall solution is a cost-effective outsourced solution. In the shared hosted model the service will be available, provisioned and managed via a shared, multi-tenanted UTM (optional) device and managed by Vodacom Business. The shared hosted model will be monitored and managed by a centralised management platform that resides in a Vodacom Business Data Centre.

RS0K9JM28.p6kq3MVVo1RN

Managed Hosted Shared Firewall

The dedicated firewall solution is outsourced, providing security services as one complete perimeter security package.

This dedicated firewall solution consists of:

RS0K9JM22.n2hDd-09DcoF

Managed On-Site Dedicated Firewall

An on-site firewall solution is outsourced, providing a security service on the customer's premises, with limited management. A variety of firewall hardware model options, with either single to failover service for SME to enterprise environments.

 

RS0K9K000.XD5~HoPEyOEb

Virtual Hosting Firewall

The Vodacom Business Virtual Hosting offering requires firewall protection. If the customer does not have a firewall (on-site, dedicated hosted or shared hosted) then the Virtual Hosting firewall will be included in the separate Virtual Hosting offering.

How much does Perimeter Security cost?

RS0K6H740.ZzX1xsxJkrjO

The cost of these services depend on your business requirements.

Find out how much Secure Remote Access will cost for your business.

 

You may also be interested in:

RS0K9IJ29.GhWYKEXqyZCB
Secure Remote Access

Safely enter your private corporate network

RS0K9IJ29.GhWYKEXqyZCB
Cyber Intelligence Centre (CIC)

Using threat intelligence to prevent cyber incidents.

arrow-right