de | English

Enterprise networking – The backbone of your business.

Networks play a crucial role in today’s business world, controlling, networking and analysing all communications, whether incoming, outgoing or within your organisation. Especially now that employees are becoming increasingly mobile, networks must also integrate and manage a growing number of end devices—and they must do so securely. After all, mobile workers are accessing valuable business information stored in your equally valuable network. Because many cyber attacks are unwittingly facilitated by staff, certain security protocols must be in place to ensure that only those authorised to do so are actually able to access your network.

Questions about enterprise networking?

Simply e-mail us at or call us on:

+49 7132 981-1600. We’re happy to help.


Send e-mail

LAN switching – More than just a network.

Cabled large-area networks (LAN) are a cornerstone of business technology, not only enabling the growing number of broadband-intensive applications such as video communication, but also supporting the upsurge in wireless technology. LAN switching infrastructure connects countless devices and systems communicating with one another over your business network. While connectivity and broadband performance are certainly important, there are many other considerations as well. For instance, networks are increasingly relied upon to guarantee high communication security and prevent unauthorised access. In addition, networks must prioritise the transmission of data intended for business-critical applications, a criteria known as Quality-of-Service. All of these aspects work together to provide a wide range of end devices with the services they need for optimum communication.

Modern LAN switches not only supply power to connected devices through PoE, they open the door to new network functions. For instance, they support building technology and accommodate numerous sensors—devices that can be controlled and managed intelligently through switches.


The newest paradigm of highly flexible networking is software-defined networking (SDN), which allows you to virtualise and centrally manage hardware, control software and applications.


Network control is thus separated from physical infrastructure and relocated to a type of network abstraction layer. This enables you to automate and simplify network operation, including system configuration. In addition, data streams for business-critical applications can be controlled and optimised to meet demand.



Bechtle enhanced their IT performance with a new network backbone and an upgraded Cisco Unified Communications solution.



Christian Priske from Bechtle's Networking Solutions Presales Team explains what you have to consider when it comes to your passive infrastructure.

Bechtle honoured at the Cisco Partner Awards in the categories Clouds and Architectural Excellence.

Bechtle came out top in two categories at the Cisco Partner Summit 2018 in Las Vegas in November: Cloud Partner of the Year Germany and Partner of the Year Architectural Excellence Enterprise Networks Germany.

Wi-Fi – Quality is key.

The variety of mobile end devices that connect with enterprise wireless networks is increasing. This ranges from notebooks, tablets and smartphones to intelligent building management and surveillance, and manufacturing machinery. It’s no longer a question of whether or not to use Wi-Fi, but rather where and with which framework parameters.

The following aspects also play a role:

  • The stability of your Wi-Fi connection
  • Adequate coverage with predictable performance
  • Secure Wi-Fi access for both business and personal devices (BYOD), as well as guests
  • Value-added services in addition to a data link (UC/video, analytics, localisation services)
  • Easy management, transparency, diagnosis/analysis options in RF field
  • Supported troubleshooting

The choice is yours.

In addition to market leaders Cisco, Cisco Meraki and HPE Aruba, we also have other vendors in our portfolio, that cover everything from controller-based and controllerless, cloud-based WLAN solutions, which include cutting edge Wi-Fi 6 technology.

The right equipment for a WLAN survey.

Craftsmen use specific tools to ply their trade. It’s no different when planning and implementing high-quality Wi-Fi solutions. When planning and designed a solution, we use software tools such as Ekahau SiteSurvey Pro and modified equipment in order to ensure the best possible results during the Wi-Fi survey.


Location-based services.

Whether via Wi-Fi or Bluetooth beacons, ultra-specific geolocation has numerous advantages, for example allowing you to more quickly locate equipment that may have been moved, thanks to enhanced data quality and accuracy.



Thanks to the new on-premise cloud, dennree can manage the Wi-Fi network at all denn's organic stores from its headquarters, without the need to physically go there.


ASSENHEIMERMULFINGER: Reliable guest WiFi for customers.

Bechtle installed a wireless solution guaranteeing fast deployment and simple management managed via the cloud.


Lars Hartmann, Aruba Sales Director, Germany, talks to us in an interview on location-based services and the working environment of the future.


WAN – Putting global networks to work for you.

If your company has multiple branch offices or production sites, you want to ensure high quality communication. It’s therefore essential to choose a suitable method for connecting them, such as a wide area network (WAN) operated by yourself or a service provider, or through a virtual private network (VPN) over the internet.


You’ll also have to consider mobile staff accessing resources in your business network via a remote-access VPN solution, not to mention any small or home offices.

Operating your own WAN can entail substantial time and expense. Employees have expertise in the technology used and take on operation and monitoring. As a rule, subjects such as WAN optimisation and data encryption also arise. The benefits of this approach are that the business has full access to all systems and can make any necessary adjustments quickly themselves thanks to operational sovereignty.

Companies that shy away from this work usually decide to procure this managed service from a service provider. Such providers not only supply the connections and WAN router (CPE) for the different sites, but also offer an SLA guaranteeing service availability is also included for a full package. A wide variety of managed services are available.

Innovative solutions with Bechtle SD-WAN.

A growing number of enterprises are interesting in networking their dispersed locations via an SD-WAN. The proliferation of cloud services, basic changes in user behaviours, e.g. mobile working or linking up small branch offices and home offices, as well as the growing demands on bandwidths require the revolutionary network topologies that SD-WAN can deliver.

With the Bechtle SD-WAN as a Service solution, we over a complete solution from a single source. Here are just a few of the benefits:

  • Global reach – Global SLAs
  • Global service provider eco-system
  • End-to-end management
  • Innovative technology management
  • High degree of standardisation
  • High degree of automation
  • Numerous additional security features
  • One single point of contact (SPoC)

Network security – Keeping your business safe.

Cyber attacks and data theft have become an ever-present threat in the past few years, which is why network security should be a top priority. Your network manager must find an effective way to respond to threats and outside attacks while also setting up, implementing and enforcing internal security policies. Yet the biggest challenge of all may be protecting your company’s network not only from the outside, but also from within. Unfortunately, unauthorised access to sensitive data or even attempts to sabotage your business may take place within your in-house network – often by your own employees, whether unwittingly or maliciously.


Security solutions include:

  • Perimeter security with next-generation firewall solutions
  • Deep packet inspection
  • Intrusion prevention/detection methods
  • Network access control in LAN and wireless environments (NAC, 802.1X)
  • MAC-layer encryption (MacSEC)
  • Encryption of WAN connections (IPsec/AES)
  • Anomaly detection (malware, DDoS and DeOS attacks)
  • Advanced data-traffic visualisation and analysis (NetFlow, sFlow) to detect threats early on
  • Network components with integrated security features to protect against address spoofing, false identities and man-in-the-middle attacks
  • End-to-end implementation of security policies spanning all areas of your business network
  • Comprehensive, connected security management for a full overview of network security 

These solutions must be addressed through an appropriate IT security architecture suited to your company’s needs.

Network security means limiting access to your network.

Network access control (NAC) is essential for defining who is authorised to communicate via your network. Think of it as your house key – you wouldn’t give that to just anyone, would you?


NAC is a vital component of network security, authenticating and authorising end devices before granting them access. Through role-based policies, you can protect your business network against malware and unauthorised access from within the network. This is because only policy-compliant users and devices are given access to sensitive data.

Today’s smart networks are able to identify communication patterns that deviate from the norm (for instance if your system has been infected by malware or your servers have been attacked) and take immediate action. Anomaly detection and intrusion prevention can hinder an attack or keep it from spreading too far. Next-generation firewalls also play a key role, leveraging URL filtering, advanced malware protection and cutting-edge NGIPS integration not only to protect you from known threats, but also to respond swiftly to zero-day attacks.

The latest technology even makes it possible to analyse encrypted data and determine whether it contains any potential threats.

Today’s state-of-the-art technology coordinates integrated, sophisticated security features including routers, switches, firewalls, Wi-Fi controllers and access points, as well as network infrastructure components with cloud-based security features and services.

It’s important to note that because of this, it’s important to implement a management solution that brings together all of these network-security aspects in one central location. And management tasks should also be minimised and streamlined to ensure an effective, prompt response to threats.

Key aspects of network security:

  • Security architecture should take a comprehensive look at all aspects of network security
  • Technological innovations within your network infrastructure should offer new ways of responding to threats and cyber attacks
  • Analysing network data is important in order to respond to threats promptly


Sigel had the existing firewall concept documented, vulnerabilities uncovered and a new concept developed.



The next generation security architecture implemented at Yazaki Systems Technologies protects the company’s customer details.

Network management – The basis of your IT.

Modern IT infrastructures are becoming increasingly complex, requiring smart management to ensure everything functions reliably. After all, your network serves as the basis for communication and data exchanges within your business. Any malfunctions or downtime can cause serious damage to your bottom line. Intuitive, user-friendly network management tools can help you provision network services more quickly, manage them more easily and monitor them more reliably. These include:


Inventories and lifecycle management.

One of the primary roles of network management is to take constant inventory of all your network components. Not only does this provide you with a fully transparent overview of your network devices, it’s also invaluable for keeping abreast of lifecycle information. Real-time licensing data, software release statuses and end-of-life information make it easier to plan future investments and IT budgets. The automatic documentation of such information also prepares you for audits and certifications.


Information provision and monitoring.

In addition to providing hardware and software information, network management tools also facilitate the planning and operation of network infrastructure. Configuration and change management tools ensure that new devices are seamlessly incorporated into your network—making it easier to roll out network environments and integrate new company locations. Monitoring is another key task, allowing you to identify errors and malfunctions early on. Monitored parameters include not only performance data such as network speed and bandwidth, but also network health, which tracks the status of system-critical components such as CPU and RAM loads.


Network automation.

Digitalisation has opened the door to a panoply of new business requirements that demand even faster and more flexible provisioning models. Known as “Fast IT”, these models focus on breaking down and automating complex processes. Virtualisation and the central management of hardware, control software and applications through software-defined networking allows you to implement and enforce policies such as Quality-of-Service throughout your entire network—at the click of a button. Best of all, radically simplified configuration translates into significant time, money and resource savings.


A fail-safe network for undisrupted production.

Bechtle upgraded the network technology of Alfing Kessler Sondermaschinen GmbH, improving reliability, performance and availability.



Albert Ziegler GmbH and Bechtle optimised its core and access switch infrastructure, ensuring the necessary scalability and high availability.