Sorry, you need to enable JavaScript to visit this website.

Enter the characters shown in the image.

Security services

Protect your business with enhanced security services

need better security?


Keeping your communications systems safe is fundamental to keeping your business safe. For protection against new and increasingly sophisticated threats, our security services help ensure that your business goes on running.



create an environment in which your business can grow


end-user devices

embrace today’s technology and its uses


supervision and governance

take control of what circulates inside and outside your business

  • security monitoring for transparency and validation of the compliance process for your information systems
  • consulting services
  • day-to-day security management

BYOD security

security and BYOD

The security risks of BYOD are on the minds of many people at the moment, especially following the Mobile World Congress and the RSA Conference. This infographic may help you get a handle on how BYOD impacts corporate security.
contact us

why Orange?



we take your security seriously

  • 30 years of experience in developing professional networks and integration solutions globally
  • 15 Orange Labs on four continents
  • 8 Security Operation Centers (SOCs)
  • more than 500 companies’ security solutions managed worldwide
  • 300,000 users of our remote access solutions
  • the largest seamless IP network in the world




our expertise is proven

  • more than 350 security consultants around the world
  • nearly 10,000 pieces of security equipment managed
  • more than 100,000 users of our strong authentication solutions



Asian woman

we are certified

  • “common criteria” level EAL 2+-certified international IP VPN backbone
  • ISO 27001-certified service-platform management
  • ISO 27001-certified customer support
  • SAS 70 type 2-certified (ISAE 3402) data centers

mobile security: wrapper or container? part 1


mobile security

After our article on BYOD security questions raised by personal tablets and mobile phones in the workplace, what changes are taking place concerning the security of company applications and communications on personal mobile phones?

read the blog >

mobile security: wrapper or container? part 2



After my first blog post on the mobile security solution called container, here's the other one:

the wrapper, or sandbox

The idea here is based on Java and its famous virtual machine, but we can also call this solution a sandbox or wrapper.

Basically it’s an application that controls the professional area in a secure bubble.

read the blog >

the missing link: the information security officer


missing link

This paper discusses some of the challenges posed by allowing an outsourcer to take over your IT infrastructure. We see that whatever the form, the challenge of managing risks and security in a heterogeneous environment remains the same. This challenge is often a show stopper, but a few good habits on the part of the outsourcer can help significantly.

get the white paper >

AkzoNobel optimizes the security of its information



AkzoNobel, the world’s largest coatings manufacturer, chose Orange to standardize and rationalize its security architecture using managed services. Watch this case study video to find out more about the solution and how we helped AkzoNobel meet its business objectives.

see the video >




Passwords and Security Over a Coffee
passwords and security over a coffee

focus on your business, we focus on your security


Your cybersecurity challenges include IT infrastructure protection, risk visibility and management, data protection, access rights and user identity. Our comprehensive approach to security and a complete, consistent range of services help you meet these challenges.

read more in the brochure >



Orange MPLS network supports growing, world-class, pan-African bank

the security issues on the cloud


Peter Glock

During the Total Telecom World 2011 event in London, Peter Glock, Cloud Services Director at Orange Business Services, identified the main issues concerning security in the cloud as data location and compliance.

see the video >





Change the display