2
Monitor our carrier networks to maintain a real-time and historic picture of the national cyber battlefield, leveraging to give us a richer intelligence picture. Carrier network visibility. 1 BT’s cyber portfolio supports all aspects of cyber defence analysis and operations. It scales to the variety, volume and velocity of data in the highly complex IT environments of global customers and across BT’s global networks. Big data. 2 Technology agnostic approach helps clients avoid siloed capability and vendor stovepipes, augment existing investment and evolve. Assure cyber architecture. 3 Intelligence-led, network-enabled and cyber-hardened security. BT is one of the leading global security providers (top 3 by revenue). As the trusted security partner for more than a 1000 customers worldwide, BT has the experience, the scale and the capabilities to help organizations effectively manage their cyber risks. BT Research and Innovation has developed an advanced cyber defence system to extend traditional SIEM and Security Monitoring technologies, to meet the need to provide cyber defence for new organisational mobility and global working and the complex data ecosystem across supply chains.

BT Security at a glance, 2016

Embed Size (px)

Citation preview

Page 1: BT Security at a glance, 2016

Monitor our carrier networks to maintain a real-time and historic picture of the national cyber battlefi eld, leveraging to give us a richer intelligence picture.

Carrier network visibility.1

BT’s cyber portfolio supports all aspects of cyber defence analysis and operations. It scales to the variety, volume and velocity of data in the highly complex IT environments of global customers and across BT’s global networks.

Big data.2

Technology agnostic approach helps clients avoid siloed capability and vendor stovepipes, augment existing investment and evolve.

Assure cyber architecture.3

Intelligence-led, network-enabled and cyber-hardened security.BT is one of the leading global security providers (top 3 by revenue). As the trusted security partner for more than a 1000 customers worldwide, BT has the experience, the scale and the capabilities to help organizations eff ectively manage their cyber risks.

BT Research and Innovation has developed an advanced cyber defence system to extend traditional SIEM and Security Monitoring technologies, to meet the need to provide cyber defence for new organisational mobility and global working and the complex data ecosystem across supply chains.

Page 2: BT Security at a glance, 2016

We are an end-to-end security partner with a comprehensive portfolio.

Offices worldwide

The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s respective standard conditions of contract. Nothing in this publication forms any part of any contract. © British Telecommunications plc 2016. Registered office: 81 Newgate Street, London EC1A 7AJ. Registered in England No: 1800000

0800 800 152 bt.com/globalservices52

Identify. Protect. Detect. Respond. Recover.

The challenge.You need to manage cyber security risk to systems, assets, data, and capabilities.

You need the appropriate safeguards to ensure delivery of critical infrastructure services.

You need the appropriate activities to identify the occurrence of a cyber security event.

You need the appropriate activities to take action regarding a detected cyber security event.

You need the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event.

BT solutions.Be clear on where you stand and what you need.

• Assure Cyber.

• Assure Threat Defence.

• Assure Vulnerability Scanning.

• Assure Ethical Hacking.

• Assure Threat Intelligence.

• GRC Consulting.

• Cyber Consulting.

Essential services to protect your network, applications, data and systems.

• Assure Cyber.

• Assure Managed Firewall.

• Assure Web Security.

• Assure Managed Cloud.

• Assure DDoS.

• Assure Cloud Identity.

• Assure PKI.

• Assure MessageScan.

• Assure Endpoint Protection.

• Infrastructure, Data Security and Cyber Consulting.

Active, real-time monitoring of your security estate.

• Assure Cyber.

• Assure Threat Monitoring.

• Assure Analytics.

• Assure Threat Intelligence.

• Assure Log Retention.

• Cyber Consulting.

Investigate and remediate computer security incidents.

• Assure Cyber.

• Assure Threat Defence.

• Cyber Consulting.

Policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems.

• Assure Cyber.

• Cyber Consulting.