Start here with cybersecurity
SMEs are also targets of cyber attacks
Self-employed & small businesses
Automatic protection against cyberattacks
Secure Net
- No installation needed, secure browsing on Proximus fixed and mobile networks
- Protection on all connected devices
- Against malware, phishing and other cyber threats
instead of €4.50 €0 /month per pack
for 3 months, then €4.50/month
per pack (all mobile subscriptions included)
App for extended security
Norton Security
- Install the Norton app on maximum 5 devices (PC, smartphone, tablet, etc.)
- More protection: public Wi-Fi, abroad, and offline
- Includes VPN, password manager, dark web monitoring
All-in-one with Secure Net & Norton Security
EasyProtect
- Optimal protection on all fixed and mobile networks (Proximus and others)
- Activate Secure Net & Norton Security 5 together and save 20%
During the last 30 days, Proximus Secure Net has blocked on average:
0
Cyberthreats by customer
of which
0
Malwares
0
Phishing
0
Crypto
0
Commands
For SMEs with 9+ employees
NIS2 regulation in effect from October 18, 2024
Cybersecurity regulations in Belgium are evolving.
- Is your company affected?
- What are the new obligations?
- How to comply?
To assist you, we have decoded it all.
Secure your e-mail traffic
Prevent phishing and spam and protect your confidential business information from malware and intentional or accidental leaks.
Mobile Threat Defense, protect your employees' mobile devices
Mobile Threat Defense is an advanced security option that protects your employees' mobile devices (smartphone or tablet) against various types of threats.
These threats can be phishing-, device-, network- or app-related. Security is provided by means of a security app that is installed and activated on each of your mobile devices that you wish to secure.
With access to the Mobile Threat Defense portal, you as an administrator can manage the security rules yourself, with direct access to online dashboards, reports and security alerts.
Mobile Threat Defense offers protection against the following threats:
Phishing
- Email phishing
- SMS phishing (smishing)
- Social media phishing
- etc.
Device
- OS/kernel exploitation (Android/iOS)
- Configuration/system changes
- SMS
- USB/SD card exploitation
- etc.
Network
- Reconnaissance attacks
- Man-in-the-Middle
- SSL stripping
- SSL decryption
- Fake Wi-Fi access points
- etc.
Apps
- Malicious apps
- Known and unknown malware
- Sideloaded apps
- etc.
This option is available on different Proximus Mobile Connect subscriptions.
As an administrator, you can configure the security policy yourself on the MTD portal.
If desired as an option, Proximus can further assist you with configuring and fine-tuning your security policy.
Talk to an expert Opens a new window
Help
You want to find more technical support, the end-user guide and the Mobile Threat Defense option management guide, ...?
Protection against DDoS attacks
Keep Internet access to your organization's website and applications available at all times, even during a Distributed Denial of Service attack (DDoS attack), such as volumetric attacks, TCP State-Exhaustion attacks and Application Layer attacks.
For each type of attack, we offer a solution that will help keep your organization accessible.
DDoS Protection
For Professional Internet and Explore Fibermax Monosite. Protection against volumetric attacks:
- Detection and mitigation of volumetric DDoS attacks
- Automatic DDoS mitigation, or on customer request
Explore DDoS Wall
For Explore Intense Monosite and Explore Multisite. Advanced protection against volumetric attacks with SLA:
- Detection and mitigation
- Automatic DDoS mitigation, or on customer request
- Reporting
- Personalized detection and mitigation template
- Attack notifications
- Integration with onsite DDoS Protection possible
- Service Level Agreement (SLA)
Onsite DDoS Protection
For data centers.
- Protection against:
- TCP State-Exhaustion attacks
- Application Layer attacks
- Integration with Explore DDoS Wall possible to activate this solution when a volumetric DDoS attack is detected