MarketplaceCommunityDEENDEENProductsCore ServicesRoadmapRelease NotesService descriptionCertifications and attestationsPrivate CloudManaged ServicesBenefitsSecurity/DSGVOSustainabilityOpenStackMarket leaderPricesPricing modelsComputing & ContainersStorageNetworkDatabase & AnalysisSecurityManagement & ApplicationsPrice calculatorSolutionsIndustriesHealthcarePublic SectorScience and researchAutomotiveMedia and broadcastingRetailUse CasesArtificial intelligenceHigh Performance ComputingBig data and analyticsInternet of ThingsDisaster RecoveryData StorageTurnkey solutionsTelekom cloud solutionsPartner cloud solutionsSwiss Open Telekom CloudReferencesPartnerCIRCLE PartnerTECH PartnerBecome a partnerAcademyTraining & certificationsEssentials trainingFundamentals training coursePractitioner online self-trainingArchitect training courseCertificationsCommunityCommunity blogsCommunity eventsLibraryStudies and whitepaperWebinarsBusiness NavigatorMarketplaceSupportSupport from expertsAI chatbotShared ResponsibilityGuidelines for Security Testing (Penetration Tests)Mobile AppHelp toolsFirst stepsTutorialStatus DashboardFAQTechnical documentationNewsBlogFairs & eventsTrade pressPress inquiriesMarketplaceCommunity

0800 3304477 24 hours a day, seven days a week

Write an E-mail 

Book now and claim starting credit of EUR 250
ProductsCore ServicesPrivate CloudManaged ServicesBenefitsPricesPricing modelsPrice calculatorSolutionsIndustriesUse CasesTurnkey solutionsSwiss Open Telekom CloudReferencesPartnerCIRCLE PartnerTECH PartnerBecome a partnerAcademyTraining & certificationsCommunityLibraryBusiness NavigatorMarketplaceSupportSupport from expertsHelp toolsTechnical documentationNewsBlogFairs & eventsTrade pressPress inquiries
  • 0800 330447724 hours a day, seven days a week
  • Write an E-mail 
Book now and claim starting credit of EUR 250

Cloud Firewall (CFW)

In today's digital age, cloud computing has become an essential part of many companies' IT strategies. Cloud infrastructures provide the flexibility, scalability and cost-efficiency that companies need to remain competitive. However, with the increasing reliance on cloud infrastructures comes the need for robust security measures to protect against threats and vulnerabilities.

As companies move more applications and data to the cloud, they face a growing risk of cyberattacks, data breaches, and compliance issues. Traditional security solutions may not be sufficient to address the unique challenges of cloud computing, such as:

  • Increased attack surface: Cloud infrastructures provide a larger attack surface with more entry points for hackers and malicious actors.
  • Lack of visibility and control: Conventional security solutions may not provide the visibility and control needed to protect cloud-based applications and data.
  • Compliance and regulatory requirements: Cloud infrastructures must comply with regulatory requirements such as PCI DSS, HIPAA and GDPR.

Cloud Firewall (CFW) is designed to address these challenges and provides a cloud-native firewall solution to help companies protect their cloud infrastructure from potential threats. With its advanced features and capabilities, Cloud Firewall helps you create a secure and isolated environment for your applications and data while ensuring compliance with regulatory requirements.

Stylization of a digital cloud with padlock and networking lines

Reasons for Cloud Firewall in the Open Telekom Cloud

Icon-Komposition aus Checkmark und Verbindungen symbolisieren vereinfachte Konnektivität

Robust security

The Cloud Firewall provides a robust and scalable security solution for your cloud environment, helping to protect your applications and data from potential threats. With advanced threat detection and prevention features, including intrusion prevention, virus and malware protection, CFW helps prevent unauthorized access, data leaks and other security incidents.

Icon-Komposition aus Tacho und Umschalter symbolisieren hohe Zuverlässigkeit

Increased compliance

The Cloud Firewall supports compliance with key regulatory frameworks, including PCI DSS, HIPAA and GDPR. By providing network segmentation and isolation capabilities, CFW helps you create a secure and isolated environment for your applications and data, ensuring that confidential information remains protected and compliant with regulatory requirements.

Icon-Komposition aus Fernglas und Netzwerk symbolisieren verbesserte Sicherheit

Improved visibility and control

Cloud Firewall provides real-time visibility and control over your cloud infrastructure, so you can easily monitor and manage your network traffic, applications and data. With CFW, you can create customized security policies, monitor network traffic, and respond quickly to security incidents. This gives you more control over your cloud environment and reduces the risk of security breaches.


Key Features of Cloud Firewall

Icon Computer mit Malware und Checkmark


Advanced intrusion detection

The Cloud Firewall offers advanced threat detection and prevention, including Intrusion Prevention (IPS). This helps prevent unauthorized access, data leaks and other security incidents and ensures that your cloud environment remains safe and secure.

Icon Netzwerk mit Schutzschild


Network segmentation and isolation

The Cloud Firewall allows you to create isolated networks and segments, ensuring that confidential data and applications remain secure and protected. This feature helps improve compliance with regulatory requirements such as PCI DSS, HIPAA and GDPR and provides an additional layer of security for your cloud infrastructure.

Icon Klemmbrett


Real-time monitoring and logging

The Cloud Firewall provides real-time monitoring and logging capabilities that allow you to track and analyze network traffic, security incidents and system logs. This helps you to identify potential security threats, resolve issues, and optimize your cloud infrastructure.


Use Cases

Incoming Traffic Control (Intrusion Prevention)

As a cloud administrator, you need to ensure the security of your cloud infrastructure by controlling incoming traffic and preventing potential security threats. You can implement an intrusion prevention system (IPS) that can detect and block malicious traffic before it reaches your cloud resources.

Scenario:

You have a cloud-based application that is accessible over the internet. You want to ensure that only legitimate traffic reaches your application and that any malicious traffic is blocked. You decide to implement an inbound traffic control system (intrusion prevention) with a cloud firewall.

Cloud Firewall Structure & Function: Incoming Traffic Control

Goals:

  • Prevent unauthorized access to your cloud resources
  • Detect and block known and unknown threats, such as malware, viruses and other types of malicious code
  • Monitor and analyze network traffic to detect potential security issues
  • Implement granular access controls to restrict inbound traffic based on IP addresses, ports, protocols and other criteria
Outgoing Traffic Control (Outgoing traffic control from the server)

As a cloud administrator, you need to ensure the security of your cloud infrastructure by controlling outbound traffic from your servers. You want to implement a system that can monitor and restrict outbound traffic to prevent unauthorized access to external resources and reduce the risk of data breaches.

Scenario:

You have a cloud-based application running on multiple servers. You want to ensure that the traffic coming from these servers is restricted to specific IP addresses, ports and protocols and that any unauthorized access is blocked. You decide to implement a system to control outbound traffic using a cloud firewall.

Cloud Firewall Structure & Function: Outgoing Traffic Control

Goals:

  • Prevent unauthorized access to external resources
  • Restricting outbound traffic to specific IP addresses, ports and protocols
  • Monitor and analyze outbound traffic to identify potential security issues
  • Implement granular access controls to restrict outbound traffic based on server roles, IP addresses and other criteria
Internal Traffic Control (Inter-VPC access control)

As a cloud administrator, you need to ensure the security of your cloud infrastructure by controlling internal traffic between virtual private clouds (VPCs). You want to implement an internal traffic control system that can monitor and restrict traffic between VPCs to prevent unauthorized access and reduce the risk of data breaches.

Scenario:

You have multiple VPCs in your cloud infrastructure, each with its own set of resources and applications. You want to ensure that internal traffic between the VPCs is restricted to specific IP addresses, subnets and protocols, and that any unauthorized access is blocked. You decide to implement an internal traffic control system with a cloud firewall.

Cloud Firewall Structure & Function: Internal Traffic Control

Goals:

  • Prevention of unauthorized access between VPCs
  • Restrict internal traffic to specific VPCs, subnets and IP addresses
  • Monitor and analyze internal traffic to identify potential security issues
  • Implement granular access controls to restrict internal traffic based on VPC roles, IP addresses and other criteria

Find out more

 
 

Book now and claim starting credit of EUR 250* (code: 4UOTC250)

Book now
 
Take advantage of our consulting services!
Our experts will be happy to help you.
We will answer any questions you have regarding testing, booking and usage – free and tailored to your needs. Try it out today!

Hotline: 24 hours a day, seven days a week 
0800 3304477from Germany
+800 33044770from abroad
Write an E-mail

* Voucher can be redeemed until December 31, 2024. Please contact us when using the voucher for booking. The discount is only valid for customers with a billing address in Germany and expires two months after conclusion of the contract. The credit is deducted according to the valid list prices as per the service description. Payment of the credit in cash is excluded.

 

The Open Telekom Cloud Community

This is where users, developers and product owners meet to help each other, share knowledge and discuss.

Discover now

Free expert hotline

Our certified cloud experts provide you with personal service free of charge.

 0800 3304477 (from Germany)

 +800 33044770 (from abroad)

 24 hours a day, seven days a week

Write an E-Mail

Our customer service is available free of charge via E-Mail

Write an E-Mail

AIssistant Cloudia

Our AI-powered search helps with your cloud needs.