Telekom Logo
  • 2018 Corporate Responsibility Report

Cyber security

Criminal hackers are getting more and more professional by the day. Private individuals as well as public organizations or companies are all at risk. Weaknesses in computer systems are often taken advantage of within hours, with attacks being run fully automatically.

As a responsible ICT img provider, we are fighting this trend. Our business model includes guaranteeing our customers a high degree of security and effectively protecting the data and infrastructure of the people and companies who use our services from unauthorized access.

Protecting ourselves and our customers

In line with our Group strategy, we promote our business with security products and services throughout Europe. In 2016 we united all security-related departments Group-wide under one roof, thereby expanding our abilities to detect cyber attacks early on and also to quickly introduce countermeasures. Our Telekom Security unit focuses on internal security issues and develops security solutions for consumers as well as business customers. This approach enables us to provide our customers even more efficiently with the perfect security solutions along the entire value chain, from product development to applications through to secure, high-performance networks and high-security data centers.

We are always working to develop new ways to defend against attacks. We launched a Cyber Emergency Response Team (CERT) in the mid-1990s, which is responsible internationally for managing security incidents for our information and network technologies. Since then, we have continued to expand our activities in relation to cyber defense, information on attacks, and information sharing. In 2017, we opened a new Cyber Defense Center with integrated Security Operation Center (SOC) in Bonn. There we analyze behavioral patterns on the internet and draw up defense strategies. This new defense center is one of the largest and most advanced ones of its kind in Europe, analyzing 2.5 billion pieces of security-relevant data from 3,300 data sources every day. What’s more, the cyber defense center processes about 200 requests, filters about 5,000 viruses and malware programs, and scans about 100 million incoming emails for spam every day. This is how we protect our infrastructure, and hence also our customers’ data. Some 200 security experts work round the clock at the new SOC in Bonn and its affiliated national and international locations.

The measures that we undertake to fight cyber attacks on our own infrastructure are also available to other companies. More than 30 German DAX companies and SMEs employ our services for their own protection.

New dangers require new solutions
Technological innovations can bring new dangers. That is why we develop targeted measures for combating potential new security risks – such as those associated with drones, for example. We developed the Magenta Drone Shield together with our partner Dedrone.

Collaborating in the name of security
Cyber security is a communal task. In order to further improve collaboration in the area of digital defense, we regularly host the Cyber Security Summit in collaboration with the Munich Security Conference. The last summit was held in May 2018. We also organized the Magenta Security Congress in 2018 for the third time.

In addition, we collaborate with research institutes, industry partners, initiatives, standardization committees, public institutions, and other internet service providers on a global scale. Together, we want to fight cybercrime and improve online security. We collaborate, for example, with the German Federal Office for Information Security (BSI) throughout Germany and with the European Union Agency for Network and Information Security (ENISA) at a European level.

We also provide up-to-date information about all of our data protection activities on our Group website under data protection and data security.

Cyber Security Summit

Together with the Munich Security Conference, we organized the Cyber Security Summit (CSS) in May 2018 for the sixth time. The venue for this year’s event was Tallinn. About 150 high-ranking international politicians, top managers, and scientists met at the conference to discuss the biggest cyber security challenges. Key topics included critical infrastructures as a target of hacker attacks, strategies to combat terrorist use of the internet and the impact of artificial intelligence or the Internet of Things (IoT) on the future of international conflicts. The summit also discussed which new rules are needed in the digital age. CEO Timotheus Höttges called for an early warning and coordination system based on the model of the World Health Organization (WHO), which deals with and combats the dangers in virtual space like epidemics.

Magenta Security Congress

How can I sufficiently protect myself and my company from cyber attacks? What are the latest security trends and solutions? How high is the risk of elections being hacked in Germany? Questions such as these were the focus of the Magenta Security Congress, which took place on March 7 and 8, 2018 in Bonn. There Deutsche Telekom teamed up with experts in the security sector for the third time to share current cyber security developments with national and international partners as well as customers.

IT drone defense shield

Commercial drones can make many processes easier and more efficient – for example, in the film and surveying technology or logistics sectors. But the technical opportunities drones provide can also be misused for illegal and criminal objectives. Since the end of 2016, the Magenta Drone Shield has offered our customers a solution that protects them from the increasing danger of drones. Business customers with critical infrastructures, data centers, stadiums, and authorities can secure their premises from remote controlled flying objects with the shield and thus defend themselves against espionage, smuggling, and vandalism.

The Magenta Drone Shield was developed to defend against professional perpetrators who fly commercial drones by remote control or GPS img. Various national and international providers of detection systems and providers of multi-sensor platforms for detecting and combating drones were rigorously tested under the strictest secrecy. The best available technologies based on video and audio analysis, radar, and frequency scanners were bundled for the drone shield into a simple and comprehensible graphical user interface. Drone defense is also being implemented at a government level using electronic jammers.