SlideShare a Scribd company logo
1 of 3
Download to read offline
LEVEL 3
SM
SECURE ACCESS
Help enhance the productivity of your mobile workforce with this scalable and secure solution, providing remote
VPN access (IPsec or SSL VPN) to your company network. Giving you the tools to securely manage employee
remote connectivity while maintaining centralized user access policies.
Today’s businesses require comprehensive mobile workforce management. Whether you are a large
multinational corporation or a regionally based business, chances are you need to provide both resources and
support to mobile employees. As your organization expands and the “Bring Your Own Device” (BYOD) trend grows,
so does the complexity of ensuring secure connectivity to your corporate resources. Level 3SM
Secure Access Mobility
Service connects remote users or teleworkers to your network via IPsec or SSL-based Internet connections and a
standard web browser. Whether they connect with a laptop, tablet or smartphone, you have the ability to securely
manage employee remote connectivity in this diverse and evolving environment.
No matter the dynamics of your business, if you have a
mobile workforce with the need to travel, connectivity
and security can be two of your biggest concerns. As
the BYOD trends permeate your business, the task
of managing users and different devices can become
overwhelming for even the seasoned IT professional.
Let Level 3 help with our Level 3 Secure Access
Mobility solution which can help enable your workforce
to connect to your corporate network from anywhere
around the world, on almost any device while providing
centralized management tools for authentication,
user role mapping, resource and sign-in policies. This
way your staff can keep an eye on devices, users and
permissions to ensure only authorized personnel have
access. Our solution can foster productivity within
your staff, no matter the setting, providing access to
business critical applications anywhere, anytime, while
helping to ensure your data is moving securely and
your infrastructure/systems are being accessed by the
appropriate parties.
MOBILITY
MPLSInternet
Business Solutions
Scalable – Extensive global footprint available as a
network-based solution for mobile connectivity with
gateways on four continents and the flexibility and
capacity to grow with your business.
Low cost – Help reduce your capital outlay and control
headcount/IT staff with a predictable monthly cost and
no upfront capital expenditure or continued investment
in hardware or software to add more users.
Maintain business continuity – Help to ensure
employees traveling or out in the field have secure
access to necessary resources.
Simplify IT Management – Help to securely manage
employee remote connectivity in a BYOD environment
with centralized management for authentication, user
role mapping, resource policies and sign-in policies
Security – IPsec and SSL provide end-to-end
encryption and tunneling to help meet the challenges
of transmitting unencrypted text and help to ensure that
your company’s private data remains secure.
By 2015, it is expected that the world’s mobile
worker population will reach 1.3 billion or 37.2%
of the total global workforce.
(IDC WORLDWIDE MOBILE WORKER POPULATION 2011-2015
FORECAST DOC#232073)
Technical Features/Capabilities
Equipment – Juniper (SA) 6500
-- Supporting 50-1,500 users
-- IPsec (VPN Tunneling) or SSL VPN (Web Access)
connectivity options
IPsec
Support for full VPN capability on supported clients
using IPsec and/or SSL as the transport mechanism
Split tunneling is standard
Standard transport mechanism is ESP, AES/128 SHA1
standard encryption
Software must be installed on client device (Network
Connect or Junos Pulse Client)
Host Checker is supported with web browsers and the
Pulse/Network Client but is not standard, requiring a
security consulting engagement
SSL VPN
Multiple access options
-- Web URL access
-- Terminal services
-- Telnet/SSH
-- File access
Traffic is permitted to RFC 1918 address space
One landing page per customer
Does not require specialized software to be placed on
remote devices
Host checker is supported with web browsers and the
Pulse/Network Client but is not standard, requiring a
security consulting engagement
SSL VPN Access Options:
Web URL access
Microsoft®
Outlook®
Web Access, SharePoint®
and
Citrix®
Web Interface
The standard number supported with this service is ten.
For general URL access, only Web ACL and Single
Sign-on (SSO) policies will be supported
Terminal services
Limited to Windows®
, Linux®
and MAC®
clients.
The standard number supported with this service is two
Telnet/SSH
Support is limited to Windows, MAC and Linux clients
The standard number of connections supported with
this service is two
© 2015 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Logo, MyLevel3 and Vyvx are either registered
service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services
are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included
herein are the trademarks or service marks of their respective owners. PN# 153050 01/15
We build, operate and take end-to-end
responsibility for network solutions that
connect you to the world. We put customers first
and take ownership of reliability and security
across our broad portfolio.
File access
SSL VPN access to Windows and Unix File Shares
leverages Single Sign-on for statically added resources
The standard number of connections supported with
this service is two
Globally dispersed VPN gateways:
-- NA: New York, Houston, Sacramento
-- EMEA: London, Amsterdam
-- LATAM: São Paulo
-- APAC: Hong Kong
Multiple devices supported with an Internet connection
and web browser
Mobile and local device support; covering Windows®
,
MAC, Linux®
, AndroidTM
and Apple®
iOS platforms.
Internet Explorer®
, Firefox®
, Safari®
, ChromeTM
Access management:
Supports utilization of various authentication systems
to include Windows Active Directory (AD), LDAP and
RADIUS
Customers using AD will also have single sign-on
The default is to support one authentication realm and
up to two authentication servers.
Services supported with either Level 3 or customer
managed RADIUS service.
User Role(s): The customer has the option to define up
to three roles as a part of the standard configuration.
User Role Mapping: Support of role mapping via
username and group membership can be done when
active directory and/or LDAP authentication/directory
servers are configured within the specific realm.
Resource policy(s): The supported resource policies are
broken down based on service type categories such as
Web Access, File Access, Telnet/SSH, Terminal Services
and VPN tunneling.
Sign-inpolicies: One sign-in page is standard with the service.
24 x 7 proactive support: Our expertise and monitoring
systems are designed to detect the health of your
solution. We provide device and service proactive
monitoring with sophisticated threat identification and
protection tools.
Real time security reporting: audit reporting with
a client connection summary providing data about
connections over time, connections by user, failed
connections by user, connections by realm and
connections by role and last 20 Juniper Events
Why choose Level 3 for managed security?
Global network & threat data - Our global collection
of IP, CDN, DNS and MPLS network assets provides
us an exceptional view into the threat landscape and
tremendous amounts of attack data, enabling us to help
identify threats, correlate data and identify/mitigate
threats more quickly.
Security Operations Center (SOC) – Enjoy the simplicity
of a single point of contact with the Level 3 Security
Operations Center (SOC) staffed 24 x7 with analysts and
engineers who stand ready to proactively and efficiently
respond to your security issues, including physical and
logical alarms, attacks, suspicious or abnormal network
activity, and assist with your security inquiries.
Simplifying Vendor Complexity – The suite of Level 3
Security Services was created to integrate seamlessly
with our entire global portfolio of network services, so you
can buy and manage everything you need in one place.

More Related Content

What's hot

Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
cisco security training
cisco security trainingcisco security training
cisco security trainingqosnetworking
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
App gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessApp gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessCristian Garcia G.
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways Array Networks
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You Castleforce
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Danny Liu
 
Passwords today passcodes tomorrow: Webinar December 2nd, 2015
Passwords today passcodes tomorrow: Webinar December 2nd, 2015Passwords today passcodes tomorrow: Webinar December 2nd, 2015
Passwords today passcodes tomorrow: Webinar December 2nd, 2015Xura
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 

What's hot (20)

Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Network Security
Network SecurityNetwork Security
Network Security
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Web security
Web securityWeb security
Web security
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
App gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessApp gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_access
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
Passwords today passcodes tomorrow: Webinar December 2nd, 2015
Passwords today passcodes tomorrow: Webinar December 2nd, 2015Passwords today passcodes tomorrow: Webinar December 2nd, 2015
Passwords today passcodes tomorrow: Webinar December 2nd, 2015
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 

Similar to en_secur_br_secure_access_mobility

4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xRyanPaul Mandel
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 

Similar to en_secur_br_secure_access_mobility (20)

Network security
Network security Network security
Network security
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 

en_secur_br_secure_access_mobility

  • 1. LEVEL 3 SM SECURE ACCESS Help enhance the productivity of your mobile workforce with this scalable and secure solution, providing remote VPN access (IPsec or SSL VPN) to your company network. Giving you the tools to securely manage employee remote connectivity while maintaining centralized user access policies. Today’s businesses require comprehensive mobile workforce management. Whether you are a large multinational corporation or a regionally based business, chances are you need to provide both resources and support to mobile employees. As your organization expands and the “Bring Your Own Device” (BYOD) trend grows, so does the complexity of ensuring secure connectivity to your corporate resources. Level 3SM Secure Access Mobility Service connects remote users or teleworkers to your network via IPsec or SSL-based Internet connections and a standard web browser. Whether they connect with a laptop, tablet or smartphone, you have the ability to securely manage employee remote connectivity in this diverse and evolving environment. No matter the dynamics of your business, if you have a mobile workforce with the need to travel, connectivity and security can be two of your biggest concerns. As the BYOD trends permeate your business, the task of managing users and different devices can become overwhelming for even the seasoned IT professional. Let Level 3 help with our Level 3 Secure Access Mobility solution which can help enable your workforce to connect to your corporate network from anywhere around the world, on almost any device while providing centralized management tools for authentication, user role mapping, resource and sign-in policies. This way your staff can keep an eye on devices, users and permissions to ensure only authorized personnel have access. Our solution can foster productivity within your staff, no matter the setting, providing access to business critical applications anywhere, anytime, while helping to ensure your data is moving securely and your infrastructure/systems are being accessed by the appropriate parties. MOBILITY MPLSInternet
  • 2. Business Solutions Scalable – Extensive global footprint available as a network-based solution for mobile connectivity with gateways on four continents and the flexibility and capacity to grow with your business. Low cost – Help reduce your capital outlay and control headcount/IT staff with a predictable monthly cost and no upfront capital expenditure or continued investment in hardware or software to add more users. Maintain business continuity – Help to ensure employees traveling or out in the field have secure access to necessary resources. Simplify IT Management – Help to securely manage employee remote connectivity in a BYOD environment with centralized management for authentication, user role mapping, resource policies and sign-in policies Security – IPsec and SSL provide end-to-end encryption and tunneling to help meet the challenges of transmitting unencrypted text and help to ensure that your company’s private data remains secure. By 2015, it is expected that the world’s mobile worker population will reach 1.3 billion or 37.2% of the total global workforce. (IDC WORLDWIDE MOBILE WORKER POPULATION 2011-2015 FORECAST DOC#232073) Technical Features/Capabilities Equipment – Juniper (SA) 6500 -- Supporting 50-1,500 users -- IPsec (VPN Tunneling) or SSL VPN (Web Access) connectivity options IPsec Support for full VPN capability on supported clients using IPsec and/or SSL as the transport mechanism Split tunneling is standard Standard transport mechanism is ESP, AES/128 SHA1 standard encryption Software must be installed on client device (Network Connect or Junos Pulse Client) Host Checker is supported with web browsers and the Pulse/Network Client but is not standard, requiring a security consulting engagement SSL VPN Multiple access options -- Web URL access -- Terminal services -- Telnet/SSH -- File access Traffic is permitted to RFC 1918 address space One landing page per customer Does not require specialized software to be placed on remote devices Host checker is supported with web browsers and the Pulse/Network Client but is not standard, requiring a security consulting engagement SSL VPN Access Options: Web URL access Microsoft® Outlook® Web Access, SharePoint® and Citrix® Web Interface The standard number supported with this service is ten. For general URL access, only Web ACL and Single Sign-on (SSO) policies will be supported Terminal services Limited to Windows® , Linux® and MAC® clients. The standard number supported with this service is two Telnet/SSH Support is limited to Windows, MAC and Linux clients The standard number of connections supported with this service is two
  • 3. © 2015 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Logo, MyLevel3 and Vyvx are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners. PN# 153050 01/15 We build, operate and take end-to-end responsibility for network solutions that connect you to the world. We put customers first and take ownership of reliability and security across our broad portfolio. File access SSL VPN access to Windows and Unix File Shares leverages Single Sign-on for statically added resources The standard number of connections supported with this service is two Globally dispersed VPN gateways: -- NA: New York, Houston, Sacramento -- EMEA: London, Amsterdam -- LATAM: São Paulo -- APAC: Hong Kong Multiple devices supported with an Internet connection and web browser Mobile and local device support; covering Windows® , MAC, Linux® , AndroidTM and Apple® iOS platforms. Internet Explorer® , Firefox® , Safari® , ChromeTM Access management: Supports utilization of various authentication systems to include Windows Active Directory (AD), LDAP and RADIUS Customers using AD will also have single sign-on The default is to support one authentication realm and up to two authentication servers. Services supported with either Level 3 or customer managed RADIUS service. User Role(s): The customer has the option to define up to three roles as a part of the standard configuration. User Role Mapping: Support of role mapping via username and group membership can be done when active directory and/or LDAP authentication/directory servers are configured within the specific realm. Resource policy(s): The supported resource policies are broken down based on service type categories such as Web Access, File Access, Telnet/SSH, Terminal Services and VPN tunneling. Sign-inpolicies: One sign-in page is standard with the service. 24 x 7 proactive support: Our expertise and monitoring systems are designed to detect the health of your solution. We provide device and service proactive monitoring with sophisticated threat identification and protection tools. Real time security reporting: audit reporting with a client connection summary providing data about connections over time, connections by user, failed connections by user, connections by realm and connections by role and last 20 Juniper Events Why choose Level 3 for managed security? Global network & threat data - Our global collection of IP, CDN, DNS and MPLS network assets provides us an exceptional view into the threat landscape and tremendous amounts of attack data, enabling us to help identify threats, correlate data and identify/mitigate threats more quickly. Security Operations Center (SOC) – Enjoy the simplicity of a single point of contact with the Level 3 Security Operations Center (SOC) staffed 24 x7 with analysts and engineers who stand ready to proactively and efficiently respond to your security issues, including physical and logical alarms, attacks, suspicious or abnormal network activity, and assist with your security inquiries. Simplifying Vendor Complexity – The suite of Level 3 Security Services was created to integrate seamlessly with our entire global portfolio of network services, so you can buy and manage everything you need in one place.