8
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters

BT Assure Threat Intelligence brochure Twist V4

Embed Size (px)

Citation preview

Page 1: BT Assure Threat Intelligence brochure Twist V4

BT AssureThreat IntelligenceProviding you with the intelligenceto help keep your organisation safe

BT Assure. Security that matters

Page 2: BT Assure Threat Intelligence brochure Twist V4

At all times, organisations are vulnerable to all kinds of cyber attacks that need defendingagainst. You need to have the peace of mind that comes from knowing what to look out forand how to create an effective defence. BT Assure Threat Intelligence can provide theknowledge and understanding to create that peace of mind.

BT Assure. Security that mattersAssure Threat Intelligence gives you the insightto help anticipate and defend against cyber threats.

Page 3: BT Assure Threat Intelligence brochure Twist V4

DO YOU KNOW WHAT THE IMPACT OF CYBER ATTACKS CAN BE ON YOUR ORGANISATION?

THE NATIONAL CRIME AGENCY CONSIDER THE TARGETED COMPROMISE OF UK NETWORKED SYSTEMS IS LIKELY TO RISE3

RESPONSEPLAN

RESPONSEPLANRESPONSE

PLANRESPONSEPLAN

51% OF CHIEF EXECUTIVES SAY THEIRCOMPANY EXPERIENCESCYBER ATTACKS HOURLYOR DAILY1

40% OF IT DECISION MAKERS ARE NOT CONVINCED THAT

THEIR ORGANISATION HAS A RESPONSE PLAN TO COUNTERACT DDOS ATTACKS2

TWO THIRDS OF IT DECISION MAKERSSAY THEIR SYSTEMS WERE DOWNEDFOR MORE THAN

HACKERS ARE ‘RENTING-OUT’ THEIR SERVICES AND BESPOKE TOOLKITS, MAKING CYBER ATTACKS VIABLE FOR ALMOST ANYONE3

1Ponemon Institute study, Cost of a Data Breach, 20142BT DDoS research, June 20143The National Crime Agency (NCA), National StrategicAssessment of Serious and Organised Crime, 2014

Page 4: BT Assure Threat Intelligence brochure Twist V4

Analysts identify existing and potential threats using our four key processes:

• Proactive – anticipating what could happen before it does

• Pre-emptive – based on proactive findings, helping you to put in place measures to mitigate the vulnerabilities before they are exploited

• Discovery – find existing vulnerabilities and threats already deployed

• Remediate – offering advice and support for vulnerabilities that have been exploited

• We understand risk and the importance of protecting assets. We rely on this service to protect BT’s assets and reputation

• Our reports don’t just provide data, they offer contextual information based on the ‘so what?’ or ‘what if’ factors, applicable to your network

• We have established secure communities that share information globally within sectors. This means we have access to accurate intelligence enabling you to take defensive action faster.

Behaviour-led

Risk-based

Analysis

Intelligence sharing

CYBER SECURITY SHOULD BE A PRIORITYFOR EVERY ORGANISATIONTo survive and thrive, any organisation needs to identify threats early. Intelligence is only useful if it is timely, relevant and actionable. The best way to defend against threats is to be prepared and proactive. Receiving a stream of data and analysis after an attack is really too late.

Our Assure Threat Intelligence Service helps protect in four key ways:

Page 5: BT Assure Threat Intelligence brochure Twist V4

THE BENEFITS OF ASSURE THREAT INTELLIGENCE

WHAT WE OFFER

Minimise riskForewarned is forearmed, so we can tailor our intelligence reporting specifically to meet your needs, looking for threats and vulnerability against your organisation.

Improve securityWe can develop your cyber strategy to help you manage and minimise vulnerabilities that you are exposed to, giving you the peace of mind that you are doing all that you can to reduce the risk of cyber attack.

Give insight into the futureWith the nature of our business, we have insight of what lies ahead and needs defending against. We can therefore advise on threat trends and new technologies or solutions that drive a more informed protection against security incidences.

Save moneyAny breach of security has a financial impact, whether it’s on your reputation, theft of intellectual property or fraud. Assure Threat Intelligence gives you the latest knowledge so that you can protect your assets, customers and employees.

Timely and accurate cyber intelligence reporting needs to be at the heart of protecting your organisation if it is to proactively remain ahead of the threats.

Threat / customer-specific threat reports

Number of individual licenses

Customer workshop to establish intelligence requirements (IR)

Monthly review of IR’s with intelligence professionals

Technical intelligence

Weekly customer-bespoke intelligence reports

Weekly sector intelligence report

Weekly cross sector intelligence report

Monthly trend reports

‘Ad-hoc’ reports on key threats

Reports delivered in both English and customer specific language

Dedicated coverage relevant to customers and threat time zones

4 2

10 5 4 4

Advanced + Advanced Standard Entry

Page 6: BT Assure Threat Intelligence brochure Twist V4

AND HOW WE DO IT

We gather information and turn it into intelligence that you can actually use and act upon. Our analysts have specialist sources for collecting data and assessing threats. Our unique position enables us to collect a hugeamount of intelligence from a variety of sources, both human and technical and draw conclusions on risk andthreat. We advise you of what you need to know rather than overwhelm you with non-relevant information.

Daily scanning of threats based on your intelligence requirements: dependingupon your chosen level of service we provide dedicated intelligence coverage and automated monitoring giving you round-the-clock coverage.

Cross sector threat report: casts a wideangle lens on a variety of sectors, regions and technical threats.

Bespoke and sector threat reports: these focus on specific and emerging threats tailored to you and/or your sector. These reports act as atactical heartbeat of the threat landscape,and allow operational teams to stay aheadof emerging issues.

Ad-hoc bespoke reports: these are threatreports specific to you and your intelligence requirements. They review hackers and third party assets of interest, in the context of your estate and intelligence requirements.

Monthly trend reports: these reports focus on incidents in the past month to ensure strategy remains focused on key threats facingyour organisation.

Technical threat reports and remediation advice: produced as and when a threat is identified.They focus on emerging threats and Advanced Persistent Threats (APTs) and their relevance to your estate, market sector and/or external interests. Topics range from advisingon potential mitigation strategies through tovery specific and directed intelligence threat assessment of a group, operation or hackerbased on your network topology.

Page 7: BT Assure Threat Intelligence brochure Twist V4

WHY CHOOSE ASSURE THREAT INTELLIGENCE?

As a GLOBAL NETWORK OPERATOR we are in a position toimmediately identify emerging and potential threats wherever they may come from

We have a wide range of STRATEGIC PARTNERSHIPS withworld-class organisations that cooperate with us on gathering intelligence

We blend physical and logical information to build a full picture of threats, analysing

data in 14 follow-the-sun SECURITY OPERATIONS CENTRES

We have 600 global security specialists, 2,000 security practitioners

and over 4,000 professional services consultants world-wide

What we OFFER TO YOU is what we havesuccessfully used to protect our own business

WANT TO KNOW MORE? THEN GET STARTED TODAY…For further information and case studies go to: www.globalservices.bt.com/uk/en/casestudy

To arrange a consultation with one of our security experts just email [email protected]

Or, why not see our technology in action? Book a visit to one of our BT showcases at www.globalservices.bt.com/uk/en/insights/vehicle_for_change

Our service is not purely derived from open-source data and is

HIGHLY CUSTOMISABLE to meet your needs.

Page 8: BT Assure Threat Intelligence brochure Twist V4

Offices worldwideThe services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s respective standard conditions of contract. Nothing in this publication forms any part of any contract.

© British Telecommunications plc 2014

Registered office: 81 Newgate Street, London EC1A 7AJ

Registered in England No: 1800000