• SUbmit support request
  • Customer control center
  • 877.263.8638

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
A white background featuring several faint, curved, parallel lines sweeping from the upper left corner toward the lower right corner, creating a subtle, minimalist abstract pattern.
A light gray and white abstract background featuring curved, semi-transparent bands or lines sweeping diagonally across the image.
Several people work at computer stations in a control room filled with large monitors displaying data, maps, and surveillance footage. The atmosphere appears focused and high-tech.
.st0 { fill: #1d1d1b; }

Real-time detection identifies threats before they impact your network. Comprehensive mitigation blocks malicious traffic while allowing legitimate traffic to flow uninterrupted, safeguarding your operations from disruption, and minimizing downtime. Distributed Denial of Service attacks can cripple business operations — our protection ensures your business remains resilient and accessible. 

  • Real-time threat detection and response 
  • Comprehensive traffic filtering 
  • Business continuity assurance 
  • Network reliability protection 
.st0 { fill: #1d1d1b; }

A key pillar of your network protection. From setup to maintenance, we ensure your firewalls are configured, deployed, and maintained to meet your specific needs. Powered by Fortinet’s Unified Threat Protection (UTP), you get comprehensive security features including firewall protection, intrusion prevention, application control, advanced malware protection, and web security with content and DNS filtering. 

  • Firewall procurement and configuration 
  • Self-service policy and rules management 
  • Event visibility and real-time reporting 
  • Comprehensive threat protection 
.st0 { fill: #1d1d1b; }

A specialized team backing your business without the cost of building one yourself. Our cybersecurity experts deliver proactive monitoring and management — from configuration, log review, and incident response to remediation guidance. Scheduled reporting, posture reviews, and change management create a proactive, adaptive strategy that lets you focus on your core business. 

  • 24/7 proactive monitoring 
  • Incident detection and response 
  • Regular log analysis and threat identification 
  • Expert remediation recommendations 
.st0 { fill: #333; }

Our managed security solutions align with your existing compliance and regulatory requirements — HIPAA, PCI DSS, or industry-specific standards. We work within your framework to deliver protection without disruption.

Adding DDoS Mitigation to your DQE Internet services ensures network reliability and accessibility. Keep operations running even during sophisticated attacks.

Gain the benefit of a full SOC without building one. Our specialists act as an extension of your IT team, delivering proactive monitoring, rapid incident response, and ongoing optimization.

Proactively detect suspicious activity before it escalates into a major incident. Our team identifies patterns and anomalies early — stopping threats before they impact your business.

Tailored automated alerts backed by expert intervention when needed. You get faster, more accurate protection — without the noise or false positives.

Stay ahead of compliance requirements with detailed reporting and posture reviews. Be ready for audits and assessments at any time.

Several people work at computer desks in a control room with large wall-mounted screens displaying data; the Fortinet logo is prominently overlaid on the image.

Enterprise Performance. Fortinet Power. DQE Expertise. 

A smiling doctor wearing glasses and a white coat sits at a desk, using a headset and looking at a laptop during a video call. Notebooks and a coffee mug are on the desk in front of her.

Healthcare Providers

A person in business attire uses a calculator and types on a laptop at a desk, with financial documents and charts visible, and soft sunlight in the background.

Financial Institutions

Three colleagues work together at a desk, looking intently at a large computer monitor. One woman is pointing at the screen while two men watch and take notes, suggesting a collaborative office environment.

Educational Institutions

A person uses a tablet to monitor or control an automated conveyor system in a modern, brightly lit factory with advanced machinery in the background.

Manufacturers

Let’s figure out what’s right for you without the hassle.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

DQE’s Managed Security runs on a 100% fiber-optic network engineered for reliability, security, and flexibility. Our utility-grade infrastructure gives you the high-performance foundation critical protection demands — combining robust connectivity with proactive monitoring to ensure your defenses stay are always on. 

Work directly with cybersecurity specialists who understand the threats businesses here face. Our in-house NOC delivers 24/7/365 support, rapid incident response, and industry-leading SLAs that keep your operations secure and running. When issues arise, our local teams mobilize fast to mitigate threats and restore service — minimizing impact and downtime.  

“Working with the Operations Team and the contractors has been a lot of fun. It’s nice to know that we can still have fun on our jobs, but most importantly, get it done in a prompt fashion.”  

A dark blue map shows a network of yellow lines winding through western and central Pennsylvania, with a light blue line running east-west near the southern border, marking major infrastructure routes.

DQE Communications CEO Mike Sicoli Featured in Inv…

PITTSBURGH, PA — DQE Communications CEO Mike Sicoli was featured in Invest: Pittsburgh 3rd Edition, a regional busines…

DQE Communications Announces Brand Refresh and Exp…

PITTSBURGH, January 29, 2025 – DQE Communications, a leading, regional business connectivity solutions provider, today…

Penn State and Carnegie Mellon researchers track g…

In many cities, aging infrastructure, climate change, and urban geohazards – such as flooding, sewer leaks, and landsl…

Ready?