BT Assure Threat Intelligence brochure Twist V4
Transcript of BT Assure Threat Intelligence brochure Twist V4
BT AssureThreat IntelligenceProviding you with the intelligenceto help keep your organisation safe
BT Assure. Security that matters
At all times, organisations are vulnerable to all kinds of cyber attacks that need defendingagainst. You need to have the peace of mind that comes from knowing what to look out forand how to create an effective defence. BT Assure Threat Intelligence can provide theknowledge and understanding to create that peace of mind.
BT Assure. Security that mattersAssure Threat Intelligence gives you the insightto help anticipate and defend against cyber threats.
DO YOU KNOW WHAT THE IMPACT OF CYBER ATTACKS CAN BE ON YOUR ORGANISATION?
THE NATIONAL CRIME AGENCY CONSIDER THE TARGETED COMPROMISE OF UK NETWORKED SYSTEMS IS LIKELY TO RISE3
RESPONSEPLAN
RESPONSEPLANRESPONSE
PLANRESPONSEPLAN
51% OF CHIEF EXECUTIVES SAY THEIRCOMPANY EXPERIENCESCYBER ATTACKS HOURLYOR DAILY1
40% OF IT DECISION MAKERS ARE NOT CONVINCED THAT
THEIR ORGANISATION HAS A RESPONSE PLAN TO COUNTERACT DDOS ATTACKS2
TWO THIRDS OF IT DECISION MAKERSSAY THEIR SYSTEMS WERE DOWNEDFOR MORE THAN
HACKERS ARE ‘RENTING-OUT’ THEIR SERVICES AND BESPOKE TOOLKITS, MAKING CYBER ATTACKS VIABLE FOR ALMOST ANYONE3
1Ponemon Institute study, Cost of a Data Breach, 20142BT DDoS research, June 20143The National Crime Agency (NCA), National StrategicAssessment of Serious and Organised Crime, 2014
Analysts identify existing and potential threats using our four key processes:
• Proactive – anticipating what could happen before it does
• Pre-emptive – based on proactive findings, helping you to put in place measures to mitigate the vulnerabilities before they are exploited
• Discovery – find existing vulnerabilities and threats already deployed
• Remediate – offering advice and support for vulnerabilities that have been exploited
• We understand risk and the importance of protecting assets. We rely on this service to protect BT’s assets and reputation
• Our reports don’t just provide data, they offer contextual information based on the ‘so what?’ or ‘what if’ factors, applicable to your network
• We have established secure communities that share information globally within sectors. This means we have access to accurate intelligence enabling you to take defensive action faster.
Behaviour-led
Risk-based
Analysis
Intelligence sharing
CYBER SECURITY SHOULD BE A PRIORITYFOR EVERY ORGANISATIONTo survive and thrive, any organisation needs to identify threats early. Intelligence is only useful if it is timely, relevant and actionable. The best way to defend against threats is to be prepared and proactive. Receiving a stream of data and analysis after an attack is really too late.
Our Assure Threat Intelligence Service helps protect in four key ways:
THE BENEFITS OF ASSURE THREAT INTELLIGENCE
WHAT WE OFFER
Minimise riskForewarned is forearmed, so we can tailor our intelligence reporting specifically to meet your needs, looking for threats and vulnerability against your organisation.
Improve securityWe can develop your cyber strategy to help you manage and minimise vulnerabilities that you are exposed to, giving you the peace of mind that you are doing all that you can to reduce the risk of cyber attack.
Give insight into the futureWith the nature of our business, we have insight of what lies ahead and needs defending against. We can therefore advise on threat trends and new technologies or solutions that drive a more informed protection against security incidences.
Save moneyAny breach of security has a financial impact, whether it’s on your reputation, theft of intellectual property or fraud. Assure Threat Intelligence gives you the latest knowledge so that you can protect your assets, customers and employees.
Timely and accurate cyber intelligence reporting needs to be at the heart of protecting your organisation if it is to proactively remain ahead of the threats.
Threat / customer-specific threat reports
Number of individual licenses
Customer workshop to establish intelligence requirements (IR)
Monthly review of IR’s with intelligence professionals
Technical intelligence
Weekly customer-bespoke intelligence reports
Weekly sector intelligence report
Weekly cross sector intelligence report
Monthly trend reports
‘Ad-hoc’ reports on key threats
Reports delivered in both English and customer specific language
Dedicated coverage relevant to customers and threat time zones
4 2
10 5 4 4
Advanced + Advanced Standard Entry
AND HOW WE DO IT
We gather information and turn it into intelligence that you can actually use and act upon. Our analysts have specialist sources for collecting data and assessing threats. Our unique position enables us to collect a hugeamount of intelligence from a variety of sources, both human and technical and draw conclusions on risk andthreat. We advise you of what you need to know rather than overwhelm you with non-relevant information.
Daily scanning of threats based on your intelligence requirements: dependingupon your chosen level of service we provide dedicated intelligence coverage and automated monitoring giving you round-the-clock coverage.
Cross sector threat report: casts a wideangle lens on a variety of sectors, regions and technical threats.
Bespoke and sector threat reports: these focus on specific and emerging threats tailored to you and/or your sector. These reports act as atactical heartbeat of the threat landscape,and allow operational teams to stay aheadof emerging issues.
Ad-hoc bespoke reports: these are threatreports specific to you and your intelligence requirements. They review hackers and third party assets of interest, in the context of your estate and intelligence requirements.
Monthly trend reports: these reports focus on incidents in the past month to ensure strategy remains focused on key threats facingyour organisation.
Technical threat reports and remediation advice: produced as and when a threat is identified.They focus on emerging threats and Advanced Persistent Threats (APTs) and their relevance to your estate, market sector and/or external interests. Topics range from advisingon potential mitigation strategies through tovery specific and directed intelligence threat assessment of a group, operation or hackerbased on your network topology.
WHY CHOOSE ASSURE THREAT INTELLIGENCE?
As a GLOBAL NETWORK OPERATOR we are in a position toimmediately identify emerging and potential threats wherever they may come from
We have a wide range of STRATEGIC PARTNERSHIPS withworld-class organisations that cooperate with us on gathering intelligence
We blend physical and logical information to build a full picture of threats, analysing
data in 14 follow-the-sun SECURITY OPERATIONS CENTRES
We have 600 global security specialists, 2,000 security practitioners
and over 4,000 professional services consultants world-wide
What we OFFER TO YOU is what we havesuccessfully used to protect our own business
WANT TO KNOW MORE? THEN GET STARTED TODAY…For further information and case studies go to: www.globalservices.bt.com/uk/en/casestudy
To arrange a consultation with one of our security experts just email [email protected]
Or, why not see our technology in action? Book a visit to one of our BT showcases at www.globalservices.bt.com/uk/en/insights/vehicle_for_change
Our service is not purely derived from open-source data and is
HIGHLY CUSTOMISABLE to meet your needs.
Offices worldwideThe services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s respective standard conditions of contract. Nothing in this publication forms any part of any contract.
© British Telecommunications plc 2014
Registered office: 81 Newgate Street, London EC1A 7AJ
Registered in England No: 1800000