Menu
Business Needs
Business Needs
Elevated Customer Experience
Hybrid Workplace Transformation
Secure Managed Cloud
Secure Network Transformation
Products & Solutions
Products & Solutions
Network
Transformational Hybrid Solutions
Core Networks
Network Resources
Unified Communications
GlobalRapide - Unified Communications As A Service (UCaaS)
InstaCC™ - Contact Centre As A Service
CPaaS – Communications Platform as a Service
Unified Communications Resources
Connected Solutions
IoT Solutions
Enterprise Mobility
Tata Communications MOVE™ Private Network
Mobility & IoT Resources
Our Global Presence
Cloud
IZO™ Cloud for Enterprise
IZO™ Cloud Platform & Services
Industry Specific Cloud Platform and Services
Multi-Cloud Solutions
Managed Services
Cloud Resources
Cyber Security
Governance, Risk, and Compliance
Cloud Security
Threat Management
Advanced Network Security
Cyber Security Resources
Carrier Services
Hosted and Managed Services
Wholesale Voice Transport and Termination
Voice Access Services
Mobile Services
Carrier Services Resources
Content Delivery Network
CDN Acceleration Services
CDN Security
Video CDN
CDN Resources
Industries
Industries
Manufacturing Solutions
Elevate CX
Run Factories Efficiently
Become Agile
Automotive Solutions
Single Pane of Glass
Intelligent Connectivity
Software Over-the-Air (SOTA) Optimization
Employee Health and Safety solution
Banking & Finance Solutions
Secured Access Performance
Productive Collaboration
Customer Experience
IT Agility with IZO™ Financial Cloud
Consumer Goods & Retail
Customer Engagement Transformation
Agile Digital Infrastructure
Interconnected Warehouse Management
Integrated Supply Chain Operations
Media & Entertainment
Live Event Services
Media Cloud Infrastructure Services
Global Media Network
Use Cases
Remote Production Solutions
Media Cloud Ecosystem Solutions
Global Contribution & Distribution
Satellite Alternative Solutions
Sports
Formula 1®
Formula E
MotoGP
World Rally Championship
DP World Tour
Healthcare
Gloheal
Insights
Insights
Hyperconnected Hub
Resources
New World Blog
Knowledge Base
Customers
Customers
Our Customers
Customer Success Team
Gartner Peer Insights
Partners
Partners
Global Strategic Alliances
Partner With Us
Company
Company
About Us
Leadership
Culture & Diversity
Vision, Mission and Values
Offices
Sustainability
FAQ
Investor Relations
Board
Results
Investor Presentations
Filings
Investor Events
Governance
Shares
Support
Analyst Relations
Awards & Recognition
News Centre
Enabling Digital India
Digital Futures
Smart Cities
Corporate Venturing & Innovation
Careers
Contact Us
Business Needs
Elevated Customer Experience
Hybrid Workplace Transformation
Secure Managed Cloud
Secure Network Transformation
Products & Solutions
Industries
Insights
Hyperconnected Hub
Resources
New World Blog
Knowledge Base
Customers
Our Customers
Customer Success Team
Gartner Peer Insights
Partners
Global Strategic Alliances
Partner With Us
Company
Search Here
Filter
Sort & Filters
Adoption
All
Cisco Webex
16
MS Teams Direct Routing
21
MS Teams TC Connections
8
Corporate Resources
All
Analyst Resources
37
Policies
25
Sustainability
17
Digital Platforms
All
Digital Customer Experience
18
Work from Anywhere
16
Industry Solutions
All
Automotive
36
Aviation
18
Banking & Financial Services
39
Conglomerate
1
Consumer Goods & Retail
11
Manufacturing
37
Media & Entertainment Services
15
Telecom
4
Products & Solutions
All
Carrier Services
31
Cloud
231
Content Delivery Network
21
Core Mobility
21
Global SIP connect
11
Hyperconnected Ecosystem
15
InstaCC™ - Contact Centre As A Service
6
Mobility and IoT
119
Mobility and IoT Solutions
27
Network
233
Private Network
8
Security
348
Strategic Alliance
11
Tata Communications MOVE
1
Unified Communications
169
Regional Resources
All
China
3
Japan
3
Korea
3
Webinars
All
Network
1
Others
3
SCDx
1
Unified Communications
1
Webinars
All
Cloud
3
Mobility
1
Network
9
SCDx
1
Security
0
Unified Communications
9
Work From Anywhere
0
Others
31
Filter By type
Analyst Report
Article
Brief
Brochure
Case Study
Commercial Agreement
Datasheet
eBook
Factsheet
Flyer
Infographic
Others
Podcast
POV
Presentation
Price List
Report
SLA
Use Case
User Guide
Video
Webinar
Whitepaper
Apply
Report
Threat Actor targets governments through phishing campaigns
Report
Backdoor persists in collaboration software despite patching
Report
Healthcare major attacked by ransomware group
Report
Ransomware steals employee identities and pilfers cryptocurrencies
Analyst Report
Unveiling the Invisible : Effective Detection of Advanced Threats
POV
Embracing MITRE ATT&CK: Strengthening Defense Strategies throughout the Threat Lifecycle
Analyst Report
Best Practices for Successful Secure Service Edge Deployment
Report
Malicious hacktivists target pro-Israel nations amid geopolitical tensions
Report
DDoS attacks target routers and internet protocols
Report
Web skimming campaign conducts data theft on online payment firms
Report
Malware poses threat to Indian taxpayers
Report
Malware targets telecom service providers and government agencies
Report
Malware targets OS via search ads
Report
Zero-day vulnerability exposing users’ true IP addresses
Report
Malware targets the banking sector
Report
Ransomware campaigns target infrastructure and demand payment
Report
Advanced backdoors compromise servers and systems
Report
Ransomware attacks on the rise in English-speaking nations
Report
Malware spreads through multi-stage attacks, phishing, and smishing techniques
Report
Malware targets cryptocurrency wallets and Google Ads
Report
Malware spreads via trojanised application
Video
F&S Analyst Video: Building the Future Enterprise
Video
F&S Analyst Video: Why Hyperconnect? Unlocking a Growth Mindset
Analyst Report
F&S Insight Paper: Fuel Your Growth: Breaking Down the Silos in a Hyperconnected Ecosystem
Analyst Report
F&S Insight Paper: Unlocking Business Agility & Innovation in a Hyperconnected Ecosystem
Analyst Report
F&S Insight Paper: Unlocking the Top Growth Drivers in a Hyperconnected Ecosystem
Analyst Report
F&S Insight Paper: Dealing with Hypervulnerability in a Hyperconnected World
Analyst Report
Thriving in a Disruptive World: The Power of Hyperconnected Ecosystems
Report
RCE vulnerability uncovered in Microsoft Word and Citrix Secure Access
Report
Vulnerabilities uncovered in Google Android OS and Mozilla products
Report
kira ransomware targets VMware ESXi
Report
New ransomware variant targets India
Report
Sophisticated malware targets Windows OS
Report
New ransomware attacks Windows OS
Report
MOVEit Transfer’s zero-day vulnerability exploited
Report
Hackers are exploiting vulnerabilities in WordPress sites
Infographic
Infographic: Tata Communications Enterprise-grade MDR to protect your scaling operations
Report
New ransomware targeting Linux systems
Report
New malware targeting victims with spear-phishing emails
Report
Multipurpose malware targeting operating systems
Webinar
On-Demand Webinar | Simplifying your Security Stack with Security Service Edge (SSE) Integration
Webinar
On-Demand Webinar | The 5Is of Advanced Threat Management
Report
Hacktivists mount threat campaign against Indian infrastructure
Report
Threat actor targets OS users with phishing techniques
Report
Multiple hacktivist groups targeting Indian websites and ICT infrastructure
Report
ALPHV Ransomware exploits Veritas Backup Exec vulnerabilities for initial access
Report
Dark Power emerges with double extortion threat
Report
New botnet can launch massive DDoS attacks
Datasheet
Datasheet: Security Service Edge (SSE)
eBook
Ebook: Proven best practices for effective threat management
Report
Clipper malware inside fake messaging apps
Analyst Report
IDC Technology Spotlight: Digital Trust, The New Business Foundation
Report
New enhanced version of Xenomorph Android malware is out
Report
Ransomware attacks threaten healthcare sector
Report
Malware targets government entities in APAC and North America
eBook
eBook: definitive guide to driving a high-performance, secure and collaborative workplace
Report
WordPress sites extensively infected
Report
Mirai poses new threat to Linux users
Report
Gootkit malware adds to toolset
Video
Tata Communications’ DDoS protection Overview
Report
Ransomware attacks are on the rise
Report
Android malware deployed to control phones remotely
Analyst Report
Named a Major Player in the IDC MarketScape for Asia/Pacific Managed Security Services 2022
Report
Vulnerabilities found in WordPress plugins
Report
Cybersecurity tops organisational agenda in 2023
Report
Tata Communications wins the ‘2022 Indian Company of the Year Award in the MSS industry – Excellence in Best Practices’
Report
New technologies increase cyber attack surface
Report
Threat actors leverage blockchain technology to launch cyber attacks
Datasheet
Datasheet: Managed detection and response
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Brief
Ensuring CERT-In compliance for reporting cyber security incidents
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
eBook
eBook: Tata Communications GlobalRapide Cloud Collaboration
Report
Telecom giant under ransomware attack
Report
PowerShell backdoor gains stealth disguised as Windows update
Analyst Report
Recognised a Leader in NelsonHall Cyber Resiliency Services NEAT report 2022
Report
New threat group targets Middle East and Asian companies
Whitepaper
Delivering Integrated Network Security at the Edge
Infographic
Build your digital resilience with Tata Communications Cyber Security
Report
BlackByte deploys innovative technique to exploit flaw
eBook
CISOs Handbook for DDoS Protection
Report
Search engine poisoning targets all industries
Report
Malware attack on banks in India
Report
Uber under cyber attack
Report
Hackers attack energy companies around the world
Report
LockBit back in business
Report
Threat actors access PII of bank customers
Report
Cyberespionage campaign lures job seekers
Report
Windows malware attacks government organisations
Report
Bookmark syncing exploited for stealth purpose
Report
Info-stealer source code leaked on cyber crime forums
Report
QBot leverages Windows Calculator to side-load malicious payload
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Analyst Report
Secure Transformation can only be achieved with a Unified Enterprise Network
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Others
Tata Communications recognised as the ‘2021 Company of the Year for Indian Managed Security Services Industry – Excellence in Best Practices’
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
Borderless Security: Why Zero Trust Networks are the new essential for today’s anywhere operations
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Case Study
Tata Communications: Key Tech Enabler In vHealth By Aetna
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory – DDoS attacks on ISPs to cripple businesses
Report
Threat Intelligence Advisory Report
Analyst Report
Tata Communications Positioned in the ‘Major Players’ Category
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Datasheet
Tata Communications DDoS protection service
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Infographic
The Digital Trust Imperative
Report
Threat Intelligence Advisory Report
Datasheet
Datasheet: Enhanced detection and response services
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Case Study
“How can we safely stem the ever-rising cyber attack tide?”, enquired a major finserv firm.
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Infographic
IDC Infobrief: Best practices to accelerate your secure network transformation.
Infographic
Reimagine security to align with network transformation goals
Whitepaper
Securely transform your network with Secure Access Service Edge (SASE)
Infographic
Evolve your network securely with Secure Access Service Edge (SASE)
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Infographic
Tata Communications recognised as the leading Managed Security Services provider in India by Frost & Sullivan (Infobrief)
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
eBook
How can the BFSI sector prepare for the digital age?
Report
Threat Intelligence Advisory Report
Case Study
How DNV achieved secure and cost-effective access to worldwide corporate services
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
eBook
Holistic solutions to transform your customers’ experiences and accelerate digital growth
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Infographic
Infographic: “Modernise your security with the latest advances in threat management capabilities delivered through cloud
Report
Threat Intelligence Advisory Report
Case Study
How our CSRC superheroes prevented a DDoS disaster for one of India’s largest banks
Datasheet
Tata Communications Managed Proxy Services (mProxy)
Datasheet
Tata Communications Ready mail secure
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
Cloud security in the era of digital India – the role of MSSP
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
Modernising security operations with next-gen cyber defence delivered from the cloud
Video
CASB Overview video
Datasheet
Tata Communications – Managed Privilege Access Management Service
Datasheet
Flexible security to help you protect data in a multi-cloud environment
Datasheet
Managed Security Services: Firewall audit & optimisation
Datasheet
Tata Communications Secure Private Access – In partnership with NetFoundry
Video
Overview video: Digital Exposure Monitoring Service
Datasheet
Tata Communications Red Teaming service
Datasheet
Tata Communications Web Defacement Monitoring Service
Video
Video: Overview | The managed approach to security monitoring
Video
Video: Tata Communications’ Cyber Threat Intelligence as a Service
Video
Video: Tata Communications’ Managed Endpoint Security Service
Video
Video: MSS demo series (Threat Management) – IT analyst threat dashboard
Video
Video: MSS demo series (Threat Management) – Executive level threat dashboard
Video
Video: MSS demo series (Threat Management) – SOAR automation for threat dashboard
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Case Study
Providing secure connectivity to Liberty General Insurance remote branch offices
Others
MSS customer bios – Down to the wire
Others
MSS customer bios – Stopping cyber villains in their track
Others
Threat Intelligence Advisory – DDoS attacks in BFSI
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Datasheet
Comprehensive OT Cyber Security offerings
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Analyst Report
IDC technology spotlight – reimagining security to align with network transformation goals
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Analyst Report
Frost and Sullivan – Indian Managed Security Services Market, Forecast to 2023
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
Secure implications for a distributed workforce
Infographic
MSS customer bio – DNS water torture DDoS attack
Infographic
Counting the cost of cloud misconfigurations
Infographic
Modernise your security with the latest advances in tools and tech
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Analyst Report
451 Research – Market impact report
Analyst Report
Frost and Sullivan India – Best Practices Awards 2020
Analyst Report
Frost and Sullivan India – Best Practices Awards 2020, MSSP
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
How to establish a fully secure multi-cloud strategy
Report
Threat Intelligence Advisory Report
Infographic
Understanding cloud management and cloud security challenges
Infographic
Ready, steady, secure – 3 steps towards a secure managed cloud
Brochure
Cloud assured, cloud secured – maximise value of hybrid multi-cloud
Whitepaper
How to establish a fully secure multi-cloud strategy
Report
Threat Intelligence Advisory Report
Case Study
Global IT & Business Consultancy company swiftly connects 18,000 employees worldwide during COVID-19
Case Study
World-leading digital transformation firm meets stringent regulations while enabling work-from-home
Case Study
Indian conglomerate achieves near-normal operating efficiency during COVID-19
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Analyst Report
Tata Communications named ‘Major Player’ in IDC MarketScape APAC Managed Security Services
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Report
Threat Intelligence Advisory Report
Whitepaper
Managed Security Services
Datasheet
Advanced endpoint security
Datasheet
Managed Web Application Firewall (MWAF)
Datasheet
Premium Protection in a single Service
Datasheet
Data Loss Prevention
Video
Tata Communication Secure Web Gateway
Brochure
Secure WiFi Gateway – surf, stream, and share safely
Report
How to Shield Your Organisation from COVID-19 Cyberattacks
Brochure
Global secure internet gateway service (GSIGS) 2.0
Use Case
Secure Remote Access
User Guide
Business Continuity Management
Case Study
Tata Communications’ managed hybrid DDoS solution assures cyberdefence against DDos attacks for Sharekhan, ensuring secure online trading activities for its end customers
Report
Ransomware Threat Intelligence Advisory
Case Study
Global Cybershield copes up with internet downtime with the help of Tata Communications vProxy
Case Study
Cyber improves their security measures with Tata Communications
Case Study
Robert Bosch Engineering network is protecting from cyber-attacks with SaaS
Brochure
Delivering connected security from Cloud to Edge
Brochure
Delivering connected security from Cloud to Edge
Report
Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Report
Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Infographic
Combating threats with DDoS defenders at Tata Communications at Tata Communications CSRC
Report
Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Report
Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Datasheet
Tata Communications’ Managed DDoS platform is a best-in-breed protection service delivered over one of the largest DDoS mitigation networks in the world.
Report
Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Datasheet
451 Research Business Impact Brief – Secure and protect IT hiding in the shadows
Datasheet
Managed Security Services: Ddos
Datasheet
How Can We Safely Stem The Everrising Cyberattack Tide?
Analyst Report
451 Research Pathfinder Report – Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP
Datasheet
Simplifying Security In Finance
Datasheet
Controlling cyber security and incident response
Report
Rbei Partners With Tata Communications For Watertight Cyber Security
Datasheet
Datasheet: Governance, Risk and Compliance (GRC) consulting service
Datasheet
Datasheet: Cyber Threat Intelligence as a Service (CTIaaS)
Datasheet
Datasheet: Digital Exposure Monitoring Service
Datasheet
Managed Security Services : Multi-Layer DDoS
Datasheet
Managed Security Services: Managed firewall and unified Threat Management services
Datasheet
Managed Security Services : Managed Idps
Datasheet
Managed Security Services : Secure Web Gateway
Report
Idc Marketscape: Asia/Pacific Managed Security Services 2018 Vendor Assessment
Datasheet
Managed security services: Vulnerability Assessment and Penetration Testing
Datasheet
Managed Security Services: Managed SIEM
Report
Tata Communications bolsters its cybersecurity services
Infographic
Overcome The Challenges Of Building Your Own Cybersecurity
Datasheet
Managed Security Services : Cloud Web Application Firewall
Datasheet
Managed Security Services: Cloud Access Security Broker (Casb)
Datasheet
Managed Security Services: Identity as a Service
Datasheet
Managed Security Services: Cloud Security Information and Event Management (SIEM)
Datasheet
Control Your Security Policy With A Secure Solution That Frees Resources And Navigates Change Easily
Datasheet
Managed Advanced Malware Protection Service (MAMPS)
Datasheet
Keep all your cloud data ultra-secure with Tata Communications’ Cloud Access Security Broker (CASB)
Factsheet
Managed Authentication – Secure your valuable data
Brochure
Subscriber Management and Blocking Service
Brochure
Minimise risk to maximise your potential