Call us on 0330 332 7933

Secure your network, protect your business

With a managed, cloud-based next-generation firewall service

Introducing Touch Secure
Your managed, cloud-based Security as a Service

Protecting your organisation against external and internal threats is an increasingly complex activity. As the volume and sophistication of attacks are on the rise, your security technology must continuously stay ahead. Touch Secure is an advanced, cloud-based next-generation firewall that provides your business with multiple levels of security, application-level inspection and a range of service options designed to suit your needs.

Touch Secure from Intercity: Topology Diagram

Our Touch Secure platform secures your entire business, from your corporate network to the public cloud and your public internet. All while being monitored 24x7 from our Intercity Secure Operations Centre (ISOC). We use enterprise-grade devices and applications hosted in our UK-based Tier 3 data centres with 99.99% service availability. These data centres provide both traditional and next-generation inner and outer firewall protection, including email filtering, web filtering, Sandbox and remote access.

How can Touch Secure protect your organisation?

globe icon

Only pay for what you need

As demand for secure bandwidth grows, pay only for the capacity you need. Scale your security up and down with your business.

mobile-heart icon

Save on in-house knowledge

With Touch Secure, there’s no need to spend budget maintaining costly specialist in-house IT security knowledge.

checkbox icon

Focused resources

Don’t tie up your valuable resources. Focus them on business critical information, applications and data.

Secure Internet

Secure your online access as a standalone service or combine it with our other services to provide a full security suite:

  • Protected web access and applications
  • Full Intrusion Prevention System (IPS) firewall
  • End-to-end Unified Threat Management with antivirus, web filtering and application control
Touch Secure: Secure Internet

Secure Cloud Compute

Our Secure Cloud Compute service is included in the Secure Internet service:

  • Protected workloads hosted on cloud platforms, including Touch Cloud
  • Detect and prevent attacks within network traffic
  • Screen against DoS and DDoS attacks
Touch Secure: Cloud Compute

Secure Email

Choose to either secure your email correspondence as a stand-alone service, or add it to your Secure Internet option:

  • Protect against malware and spam
  • Examines email, searching for and removing any viruses, Trojans and worms
  • Filters unsolicited marketing, phishing and spam messages
Touch Secure: Secure Email

Secure Remote Access

Remote access security can be arranged individually, or supplied as an add-on to Secure Internet:

  • Protect remote users accessing your organisation’s network
  • Provide secure access for remote workers using Two-Factor Authentication
  • Authorise users of any device or network to connect securely to their organisation’s network.
Touch Secure: Remote Access

Service Monitoring & Self-Serve

line-graph icon

Events Dashboard

Real-time dashboard of events displayed by quantity, type and severity.

document icon

Reporting

Generate reports on web browsing time and bandwidth by user and most-blocked users, categories and sites.

map-pin icon

Policy monitor

Examine traffic shaping, session concurrency and web filtering policies by user group.

profile icon

User investigation

Examine an individual’s Internet usage in terms of site categories, sites visited and bandwidth used.

checkbox icon

Email filtering

Add/remove senders to/from your organisation’s email whitelist and blacklist.

care icon

Customer Support

Retain full access to our technical experts and talk directly to the people who manage your service.

“Intercity fully understood the challenge and went the extra mile during the project. We trust the team implicitly and know that our infrastructure will meet future demands.”

Network Manager

The Royal Mint

Touch Secure Pricing

The cost of Touch Secure depends on the number of users, bandwidth and the modules you need.

To provide you with the most accurate pricing possible, we need to know more about you and your company. That’s why Touch Secure is only available upon request.

Complete the form below and one of our consultants will be in touch within the same business day and help you choose the right plan for your business.

Intercity people

IT Security insights

Don’t take our word for it. See Touch Secure for yourself.

We’re passionate about your business security, so we’d love to tell you more about our Touch Secure services. Fill in the form below and we’ll be in touch.

At Intercity we are serious about data protection and the rights of our website visitors. We process your data to improve and personalise our visitors' online experiences, and based on legitimate interests. To learn more about how and why we do so, see our privacy policy