Secure your network, protect your business
With a managed, cloud-based next-generation firewall service
Introducing Touch Secure
Your managed, cloud-based Security as a Service
Protecting your organisation against external and internal threats is an increasingly complex activity. As the volume and sophistication of attacks are on the rise, your security technology must continuously stay ahead. Touch Secure is an advanced, cloud-based next-generation firewall that provides your business with multiple levels of security, application-level inspection and a range of service options designed to suit your needs.
Our Touch Secure platform secures your entire business, from your corporate network to the public cloud and your public internet. All while being monitored 24x7 from our Intercity Secure Operations Centre (ISOC). We use enterprise-grade devices and applications hosted in our UK-based Tier 3 data centres with 99.99% service availability. These data centres provide both traditional and next-generation inner and outer firewall protection, including email filtering, web filtering, Sandbox and remote access.
How can Touch Secure protect your organisation?
Only pay for what you need
As demand for secure bandwidth grows, pay only for the capacity you need. Scale your security up and down with your business.
Save on in-house knowledge
With Touch Secure, there’s no need to spend budget maintaining costly specialist in-house IT security knowledge.
Don’t tie up your valuable resources. Focus them on business critical information, applications and data.
Secure your online access as a standalone service or combine it with our other services to provide a full security suite:
- Protected web access and applications
- Full Intrusion Prevention System (IPS) firewall
- End-to-end Unified Threat Management with antivirus, web filtering and application control
Secure Cloud Compute
Our Secure Cloud Compute service is included in the Secure Internet service:
- Protected workloads hosted on cloud platforms, including Touch Cloud
- Detect and prevent attacks within network traffic
- Screen against DoS and DDoS attacks
Choose to either secure your email correspondence as a stand-alone service, or add it to your Secure Internet option:
- Protect against malware and spam
- Examines email, searching for and removing any viruses, Trojans and worms
- Filters unsolicited marketing, phishing and spam messages
Secure Remote Access
Remote access security can be arranged individually, or supplied as an add-on to Secure Internet:
- Protect remote users accessing your organisation’s network
- Provide secure access for remote workers using Two-Factor Authentication
- Authorise users of any device or network to connect securely to their organisation’s network.
Service Monitoring & Self-Serve
Real-time dashboard of events displayed by quantity, type and severity.
Generate reports on web browsing time and bandwidth by user and most-blocked users, categories and sites.
Examine traffic shaping, session concurrency and web filtering policies by user group.
Examine an individual’s Internet usage in terms of site categories, sites visited and bandwidth used.
Add/remove senders to/from your organisation’s email whitelist and blacklist.
Retain full access to our technical experts and talk directly to the people who manage your service.
“Intercity fully understood the challenge and went the extra mile during the project. We trust the team implicitly and know that our infrastructure will meet future demands.”
Touch Secure Pricing
The cost of Touch Secure depends on the number of users, bandwidth and the modules you need.
To provide you with the most accurate pricing possible, we need to know more about you and your company. That’s why Touch Secure is only available upon request.
Complete the form below and one of our consultants will be in touch within the same business day and help you choose the right plan for your business.
BlogIT Security /
3 minute read
As we all remember, in May 2017 NHS England fell victim to a vast global cyber attack; the WannaCry...Read more
BlogIT Security /
7 minute read
As an IT professional, no doubt you’re familiar with the ongoing security risks with business...Read more