3M uses cookies on this site. This site and 3M selected service providers place cookies, containing text files, on your computer to recognize your computer and:

  • personalize your experience on 3M websites
  • show you ads tailored to your interests
  • collect anonymous statistical information to enhance site functionality and performance.

Learn the benefits of accepting these cookies

You can change your cookie settings at any time by clicking on the Cookie Preferences link at the bottom of the page.

Some opt-outs may fail due to your browser's cookie settings. If you would like to set opt-out preferences using this tool, you must allow third party cookies in your browser settings.

By clicking Accept and Proceed, you confirm your understanding and agreement for cookie settings as indicated on the left.

Accept and Proceed

Skip to Primary Navigation Skip to Site Navigation Skip to Main Content All 3M.com Site Map

Access protection more important than ever


Despite increasing requirements regarding the protection of sensitive data and communication channels, several network providers still rely on selective, static security measures. 3M Telecommunications offers an integrated security concept to protect against terrorism, sabotage, and fraudulent use.

This concept of protection is based on a secure subscriber line network. The sensitive cable distributor and block terminal is located between the switching exchange and subscriber. At these switching points, the proven systems from 3M Telecommunications come into operation, offering the highest possible mechanical protection from environmental influences as well as unauthorised access.

3M Telecommunications' security concept offers more than just mechanical solutions; the comprehensive, customisable protection package also includes an intelligent locking mechanism. On the one hand, this allows employees to gain temporarily limited access rights during regular maintenance. On the other hand, it allows the central gathering of all access information as well as monitoring in real-time. Unauthorised access, wilful destruction, or other acts of manipulation are quickly identified and are prevented in the early stages.


Back to: