Male IT specialist in a server work, kneeling while checking his tablet.

MANAGED SERVICES

Managed Security

Comcast Business recognizes security as a top strategic priority and can help implement and maintain a holistic view of network security.

How to Manage the Impact of Generative AI on the Customer Experience

Generative AI will transform all three pillars of CX management: understand customers, set CX strategy and coordinate across the enterprise. Read recent insights from Gartner® about how application leaders can identify CX use cases for GenAI that create value.

Protecting your network is protecting your business

Today, fierce competition is driving new trends that have the unfortunate consequence of exposing networks to new risks. From an expanding network perimeter and new points of entry to increasing app mobility and internal threats, network security measures are pressured to mature as the modern enterprise evolves. Comcast deals with these same threats faced by our customers. Every day we are challenged to operate and secure the nation’s largest converged network for voice, video, and data services – our own.

Diagram depicting two Managed Routers connected via IPSec-VPN on the left and a Comcast cloud network within a cloud icon on the right. Image shows Unified Threat Management (UTM) as content filtering, instruction detection, data loss prevention, anti-virus, and anti-spam all behind a managed firewall.

Managed Security services

SERVICES
Managed Virtual Private Network (VPN)
  • Provides a secure link for today’s distributed enterprise
  • Leverages security protocols to safeguard data
  • Comcast Business delivers the configuration, management, and support
Managed Unified Threat Management (UTM)
  • Robust functionality from a single device, eliminating the need for multiple systems
  • Enhanced monitoring with greater visibility and computing resources
  • On-premise equipment and high availability options
Managed firewall
  • Cost-effective solution to help protect LAN from external internet-based threats
  • Firewall configuration
  • Customized firewall rules based upon specific needs
DDoS for ethernet
  • Protection against DDoS and application-layer attacks
  • Provides peace of mind and reinforces business continuity
  • Comcast manages threat mitigation from the network with no additional configuration necessary
GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. 
 
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.