Skip to content

Business

Business

Running your business
is now easy.

Business

The Connectivity Management Solution helps you to know, understand and manage the usage and costs of your organization’s mobile communication devices.
Features & Benefits

Security

Monitors all device traffic and users to get rid of abuse and configure procurement and allocation devices and contracts.

Efficiency

Simplifies SIM administration by supporting easy maintenance and tracking of SIM cards

Control

Provides business intelligence reporting by pushing relevant data to decision makers.

Risk Management

Let’s you manage the APN data more efficiently to prevent expensive out of bundle costs

Visibility

Provides you with a consolidated point of your company’s mobile device spend and usage in a single reporting tree.

Cost Control

Bill shock and Out of Bundle exposure is reduced with total control over data allocations and top ups

Frequently asked questions.

Through your Telkom Kenya Account Manager.

The portal is a web application accessible on any web browser.

Yes, one is able to define customized limit notifications/ alerts allowing the SIM to receive an email or SMS notifying them that the set limit has been reached. E.g 50%, 75% and 90%.

Mobility profiles are defined and customized by the customer thereby raising an alert when the SIM user has consumed the allocated allowable resources. 

The platform has multiple level access allowing different users to have different views based on their business needs.  

Through bulk or individual SIM administration, the portal allows customers to add, remove or edit SIM allocations through People Directory

The customer will have visibility of all consumption costs and traffic down to an individual SIM which will assist them in identifying any potential abuse of services

Yes, the customer has the capability to customize and define data allocation within a Mobility Profile which then can be associated to a single or multiple SIMs on an APN.

The Report library within the portal allows users to predefine reports including the schedule of reporting 

The portal provides detailed reports from granular SIM reports to analytical reports that show total spend over a set period of time.

Business

Browse throughout with no interruptions.

Business

Telkom Clean Pipe solution is a Managed Secure IP Service that extends our internet security services to guarantee your availability with minimal service disruption due to cyber-attacks.
Features & Benefits

Predictable Path during DDoS mitigation:

Back to the customer via a known and controlled traffic path

kIncoming traffic is diverted to SC within Telkom network

Scrubbing Centres (SC) are located within the Tier 1 Global ISP IP network

Result in predictable traffic performance

To get a comprehensive proposal structured around your exact Clean Pipe requirements, contact our customer service number on

T 0800 200 000 | 020 4600 200 M 200 | - or write to our sales team E corporatecare@telkom.co.ke | corporatesales@telkom.co.ke

Frequently asked questions.

is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS attack. The hallmark of DDoS attacks is the distributed nature of the malicious traffic, which typically originates from a botnet—a criminally-controlled network of compromised machines spread around the globe.

  • Volumetric attacks: The classic types of DDoS, these attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to eat up the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications with malicious connection requests.
  • Application attacks: Some of the more sophisticated DDoS attacks, these exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
  • Business competition: In competitive industries a DDoS attack can be used to take down a rival’s website.
  • Extortion: Certain industries, such as e-commerce, are dependent on their online presence and are easy prey for perpetrators extorting money in exchange for keeping a specific website online.
  • Hacktivism: Hacktivists typically target political, media, or corporate websites to protest their actions.
  • Vandalism: Cyber vandals, typically disgruntled users or random offenders, often attack high-profile targets.

Business

Browse throughout with no interruptions.

Business

Telkom Clean Pipe solution is a Managed Secure IP Service that extends our internet security services to guarantee your availability with minimal service disruption due to cyber-attacks.
Features & Benefits

Predictable Path during DDoS mitigation:

Back to the customer via a known and controlled traffic path

kIncoming traffic is diverted to SC within Telkom network

Scrubbing Centres (SC) are located within the Tier 1 Global ISP IP network

Result in predictable traffic performance

To get a comprehensive proposal structured around your exact Clean Pipe requirements, contact our customer service number on

T 0800 200 000 | 020 4600 200 M 200 | - or write to our sales team E corporatecare@telkom.co.ke | corporatesales@telkom.co.ke

Frequently asked questions.

is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS attack. The hallmark of DDoS attacks is the distributed nature of the malicious traffic, which typically originates from a botnet—a criminally-controlled network of compromised machines spread around the globe.

  • Volumetric attacks: The classic types of DDoS, these attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to eat up the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications with malicious connection requests.
  • Application attacks: Some of the more sophisticated DDoS attacks, these exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
  • Business competition: In competitive industries a DDoS attack can be used to take down a rival’s website.
  • Extortion: Certain industries, such as e-commerce, are dependent on their online presence and are easy prey for perpetrators extorting money in exchange for keeping a specific website online.
  • Hacktivism: Hacktivists typically target political, media, or corporate websites to protest their actions.
  • Vandalism: Cyber vandals, typically disgruntled users or random offenders, often attack high-profile targets.

Business

Browse throughout with no interruptions.

Business

Telkom Clean Pipe solution is a Managed Secure IP Service that extends our internet security services to guarantee your availability with minimal service disruption due to cyber-attacks like Distributed Denial of Service (DDOS).
Features & Benefits

Predictable Path during DDoS mitigation:

Back to the customer via a known and controlled traffic path

Incoming traffic is diverted to SC within Telkom network

Scrubbing Centres (SC) are located within the Tier 1 Global ISP IP network

Result in predictable traffic performance

To get a comprehensive proposal structured around your exact Clean Pipe requirements, contact our customer service number on

T 0800 200 000 | 020 4600 200 M 200 | - or write to our sales team E corporatecare@telkom.co.ke | corporatesales@telkom.co.ke

Frequently asked questions.

is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS attack. The hallmark of DDoS attacks is the distributed nature of the malicious traffic, which typically originates from a botnet—a criminally-controlled network of compromised machines spread around the globe.

  • Volumetric attacks: The classic types of DDoS, these attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to eat up the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications with malicious connection requests.
  • Application attacks: Some of the more sophisticated DDoS attacks, these exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
  • Business competition: In competitive industries a DDoS attack can be used to take down a rival’s website.
  • Extortion: Certain industries, such as e-commerce, are dependent on their online presence and are easy prey for perpetrators extorting money in exchange for keeping a specific website online.
  • Hacktivism: Hacktivists typically target political, media, or corporate websites to protest their actions.
  • Vandalism: Cyber vandals, typically disgruntled users or random offenders, often attack high-profile targets.

Business

Uninterrupted wireless access wherever you work

Business

We offer a secure end-to-end wireless networking solution that provides your business with seamless Wi-Fi Internet access virtually anywhere across the enterprise.

Frequently asked questions.

10 minute, 33 minute and 66 minute bundles are valid for 30 days while the 333 minute bundle is valid for 45 days.

Yes, you can subscribe to the same bundle, a lower or higher bundle before the expiry of your existing bundle. When you buy any bundle before the expiry of your existing bundle, the minutes resources will accumulate.

Yes, you earn ziada points on the cost of the bundle.

Business

All you need for a reliable network

Business

With our Managed WAN solution, you can connect to all remote sites both locally and internationally with inbuilt redudant links for all sites. Through our superior MPLS infrastructure, we guarantee security at the highest level.

Features & Benefits
Type of Device
Gold
Silver
Lite
MPLS Implementation
Yes
Yes
Yes
Dual Circuits
Yes
Yes
Yes
Monitoring & Notification
Yes
Yes
Yes
Field Support
Yes
Yes
Yes
Device Management
Yes
Yes
No
Resident Engineer Hours
Yes
No
No
Service Level Agreement
Yes
No
No

Frequently asked questions.

10 minute, 33 minute and 66 minute bundles are valid for 30 days while the 333 minute bundle is valid for 45 days.

Yes, you can subscribe to the same bundle, a lower or higher bundle before the expiry of your existing bundle. When you buy any bundle before the expiry of your existing bundle, the minutes resources will accumulate.

Yes, you earn ziada points on the cost of the bundle.

Business

Offload your IT operations

Business

Sift through our fixed data and connectivity services to find the one that suits all your ICT needs.

Business

Offload your IT operations

Business

Sift through our fixed data and connectivity services to find the one that suits all your ICT needs.

Business

Stay in control of your usage .

Business

This is a connectivity management solution for Corporate Customers using Digital Mobile Products. It provides a clear understanding of the usage and costs of your organisation’s mobile communication devices, giving you control over your usage by providing:
Features & Benefits

Security

Monitors all device traffic and users to get rid of abuse and configure procurement and allocation devices and contracts.

Efficiency

Simplifies SIM administration by supporting easy maintenance and tracking of SIM cards

Control

Provides business intelligence reporting by pushing relevant data to decision makers.

Risk Management

Let’s you manage the APN data more efficiently to prevent expensive out of bundle costs

Visibility

Provides you with a consolidated point of your company’s mobile device spend and usage in a single reporting tree.

Cost Control

Bill shock and Out of Bundle exposure is reduced with total control over data allocations and top ups

Frequently asked questions.

Through your Telkom Kenya Account Manager.

The portal is a web application accessible on any web browser.

Yes, one is able to define customized limit notifications/ alerts allowing the SIM to receive an email or SMS notifying them that the set limit has been reached. E.g 50%, 75% and 90%.

Mobility profiles are defined and customized by the customer thereby raising an alert when the SIM user has consumed the allocated allowable resources. 

The platform has multiple level access allowing different users to have different views based on their business needs.  

Through bulk or individual SIM administration, the portal allows customers to add, remove or edit SIM allocations through People Directory

The customer will have visibility of all consumption costs and traffic down to an individual SIM which will assist them in identifying any potential abuse of services

Yes, the customer has the capability to customize and define data allocation within a Mobility Profile which then can be associated to a single or multiple SIMs on an APN.

The Report library within the portal allows users to predefine reports including the schedule of reporting 

The portal provides detailed reports from granular SIM reports to analytical reports that show total spend over a set period of time.

Business

You’re in charge

Business

Manage your business connectivity on digital mobile products and control your usage
Skip to content