Security
solutions

As applications, data and users move away from the office a different approach to company security is needed. We provide secure access to your applications and data around the world.

Align security with the digital transformation your company is going through, empowering your users with secure location and connection independent access to company resources in the Cloud or on premise

A future-proof security solution is tailored to the needs and movements of the users and the location of the applications and data. To ensure optimal security and user experience the shortest path between a user and the application or data needs to be available and secure. Dedicated secure connections from the Cloud/data center towards the company offices provide security and guaranteed bandwidth for optimal user experience.

Full tailored security
We can provide a full tailored security transformation by starting to replace traditional VPN access with in-line Cloud security creating a secure connection between user and application, based on Zero Trust Network Access, or providing a Cloud firewall that is updated automatically, and practically real-time, with the latest signatures learned from threats all over the world. Together with our communications portfolio and our infrastructure portfolio, we can connect your organization worldwide, with maximum security and insight.

Improve your user experience and application performance
The combination of networks and techniques makes it possible to improve the user experience while simultaneously improving performance for all applications. Our solutions are more flexible and cost-efficient because we can combine current infrastructure, Cloud, and new fast delivered infrastructure in 1 solution. Provide in-line Cloud-based security that is flexible, available, reliable, and transparent with one tailored invoice, one contract, one contact, and one SLA.

Zero Trust Network Access (ZTNA)

Zero trust network access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access and prohibits lateral movement elsewhere in the network. This removes application assets from public visibility and significantly reduces the surface area for attack.

Source: Gartner

Security solutions

9

Zscaler Global Remote Workers

Let your employees securely work from anywhere without the hassle of setting up a VPN and with direct connections to SaaS applications.

9

Zscaler Global Cloud Firewall

Place the Zscaler Global Cloud Firewall at the edge of your network with instant threat signature updates and full SSL inspection.

9

Zscaler Global User Experience

Quantify user experience by measuring application-, device-, and network performance (either at the office or at home).

9

Global Secure Cloud

Connect with 500+ Cloud applications & ecosystems. Secure, direct private connections and improved performance with one connection.

We provide a full tailored security transformation by replacing traditional VPN access with in-line Cloud security, creating a secure connection between user and application, based on Zero Trust Network Access or providing a Cloud firewall that is updated automatically with the latest signatures learned from worldwide threats. 

Our Professional Services

Project Management

Our project managers are closely involved in the process; from the design to the development of the solutions, including the transfer to the management organization.

Global Logistics Services

A single point of contact for shipping and handling of hardware components worldwide, incl. support with customs clearance, import duties, installation, etc.

Z

Service Management

Our service managers proactively monitor and ensure optimal performance for the best experience for your employees by responding to trends and changes.

Global Certified On-site Engineers

Use our engineers as your own employees and deploy them globally for migrations and support at (remote) locations without having to use local technical staff/employees.

Customer Mission Control Portal

Gain insight into all invoicing and solutions worldwide (including statuses) in one portal. Designed to fit your organization’s structure and hierarchy.

Design & Engineering

Together with the (solution) architects and consultants, our engineers create a design that exactly meets the requirements of all solutions, locations, and users.

24x7 Support & Monitoring

Our Global Mission Control Centre (NOC) manages all our global solutions. Our experienced, service-oriented experts even solve issues that aren’t our responsibility.

“Horizon Telecom is a flexible organization, which works in a solution-focussed manner and is very knowledgeable where Enterprise environments are concerned.”

Hexagon (Intergraph)
Jim van Dijken, IS specialist

150+ happy enterprise customers

We are Horizon Telecom

Horizon Telecom delivers communications, infrastructure, and security solutions worldwide with 24x7 proactive support and local management. With our independent experts, we work with the world’s best technology partners to connect the aspirations of our customers with flexible and reliable solutions that leverage proven innovations accredited by Gartner®.

Globally Yours, Simply Smiling

Our added values

N

Independent & Carrier-Neutral

N

1 Tailored invoice, 1 Contract, 1 Contact, 1 SLA

N

Global Mission Control Center – 24x7 NOC

N

Professional Services

N

Flexible & Scalable tailor-made solutions

N

'Best-of-breed' technology

N

Cost-efficient