T-Systems Open Telekom Cloud
T-Systems is partnering its customers as they address the digital transformation. The company offers integrated solutions for business customers. The Deutsche Telekom subsidiary offers one-stop shopping: from the secure operation of legacy systems and classical ICT services, the transition to cloud-based services (including international networks, tailored infrastructure, platforms and software) as well as new business models and innovation projects in the Internet of Things. T-Systems can provide all this thanks to its global reach in fixed-network and mobile communications, its highly secure data centers, a comprehensive cloud ecosystem built around standardized platforms and global partnerships, and the ability to offer top levels of security.
Location(s)
OTC has 2 zones(s) in 2 countries:
- Europe
- North America
- South America
- Central America
- Asia
- Africa
- Russia
- Pacific
Elastic Compute Service
Elastic, scalable computing servers
208 CPU
6.3 TB of RAM
8 GPU
Instance types
Bare Metal Server
Both the scalability of VMs and high performance of physical servers
192 CPU
4.4 TB of RAM
8 GPU
Instance types
Object Storage Service
Scalable cloud storage
![BSI C5 Type 1](/static/img/certs/bsi-c5-1.png)
BSI C5 Type 1
Specifies minimum requirements for secure cloud computing and is primarily intended for professional cloud providers, their auditors and customers.
![BSI C5 Type 2](/static/img/certs/bsi-c5-2.png)
BSI C5 Type 2
Specifies minimum requirements for secure cloud computing and is primarily intended for professional cloud providers, their auditors and customers.
![Cloud Data Protection Level 1](/static/img/certs/coc-data-data-protection-1.png)
Cloud Data Protection Level 1
The Cloud Service Provider confirms compliance with the Code through internal review and documentation, while the Monitoring Body verifies it with information provided by the provider.
![Cloud Data Protection Level 2](/static/img/certs/coc-data-data-protection-2.png)
Cloud Data Protection Level 2
Additional to the “First Level of Compliance”, Compliance with the Code is partially supported by independent third-party certificates and audits.
![ISO 27001:2013](/static/img/certs/iso27001-2013.png)
ISO 27001:2013
Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.
![ISO 27015:2017](/static/img/certs/iso27017-2015.png)
ISO 27015:2017
Code of practice for information security controls based on ISO/IEC 27002 for cloud services
![ISO 27018:2019](/static/img/certs/iso27018-2019.png)
ISO 27018:2019
Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
![PCI-DSS](/static/img/certs/pci-dss.png)
PCI-DSS
Information security standard for organizations that handle branded credit cards from the major card schemes