global_corporate_overview_public_approved_v3
TRANSCRIPT
www.nttsecurity.com Copyright© NTT Security 2016
Corporate Overview
Who we areWe’re a globally respected organization specializing in information security and risk management. With 233 data centers, 10 security operations centers (SOCs) and seven R&D centers, we have visibility into 40 percent of the world’s internet traffic. Our global visibility, advanced technology and local resources mean that we are uniquely positioned to identify and respond to threats before they impact your business.
We’re also part of the NTT Group, one of the largest information and communications technology (ICT) companies in the world. With Group annual revenues of $105bn, direct presence in over 88 countries, an annual R&D investment of $3.5bn and more than 240,000 employees, we are a part of a stable, profitable and well-respected global organization.
What we doNTT Security enables the digital, global economy through the seamless delivery of cyber resilienceTo do this, we enable organizations to build high-performing and highly effective security, risk and compliance programs and controls. Our goal is to ensure that every organization develops the cyber resilience required to make the most of every business opportunity. We don’t believe that one solution fits all. And we don’t simply give high-level advice without a practical plan. We’re acutely aware that our clients are facing the challenge of how to secure and manage an enormous amount of information and we recognize that high performing businesses now see the growing value of information security and risk management as a differentiator.
Through the Full Security Life Cycle, we ensure that your scarce resources are used effectively by providing you with the right
mix of consulting, managed, cloud, hybrid or outsourced services. And we deliver these services using local resources that leverage our global capabilities.
Our peopleOur exclusive focus on information security enables us to attract the world’s most experienced practitioners who are passionate about information security and risk, and want to work at the leading edge of this industry. Our people bring with them real life experiences at all business levels – from CISOs of world-leading companies to specific compliance and technology specialists.
Our customersWe are trusted by organizations of every size, in every sector to provide a practical approach to security solutions. With a track record of on-time, on-budget delivery of projects, more than 92 percent of clients engage us for additional work.
Our partnersWe are a highly accredited global partner for all of the leading security technology vendors. We invest in our employees to ensure they have a comprehensive knowledge of vendor products and associated services, and understand how these products and services fit within the increasingly complex information security and risk management landscape.
Collaboration with Group companiesOur collaboration with other NTT Group companies gives us the foundation to add value for our customers by seamlessly embedding security and risk management into innovative business solutions. Our unique position offers unrivalled insight to global threats, enabling us to provide better protection to our clients. And through R&D activities, threat analysis, threat reporting
Why organizations trust NTT SecurityNTT Security at a glance:• 6.2 Billion attacks detected and
defended against each year• 3.5 Trillion+ logs analyzed annually• 10,000+ clients spanning six
continents• 1,500+ security specialists, architects
and engineers across the globe• 167,000+ devices monitored,
managed, secured• 10 SOCs and seven R&D centers
and deep technology partnerships, our combined strength provides our clients with the information they need through a Global Threat Intelligence Platform (GTIP) to make informed business decisions around risk and security.
Solutions for the Full Security Life CycleOur clients rely on us to provide clear services that demonstrate value. They also rely on us to have the right people in our team who will quickly understand an organization’s business challenges. They also want objective advice to make technology choices.
Our services portfolio covers every aspect of information security and risk management from initial assessment through to strategic program planning, hands on deployment and round the clock management and support.
We understand that every client requirement is unique and we partner with you to navigate the range of security, risk and compliance services best suited to your needs. Using our full security life cycle approach, we can support you in the areas of consulting, managed services, cloud services or hybrid solutions.
www.nttsecurity.com Copyright© NTT Security 2016
Four phases of the Full Security Life Cycle
Plan & OptimiseEvery successful security program starts with a solid, well thought out plan. At NTT Security we’ll build a plan that considers your level of risk, potential regulatory and financial impact, specific ICT environment and staff capabilities. Alternatively, our team will work with you to optimize your existing security and compliance processes and controls. Our recommendations may range from a straightforward review and suggestions for improvement, to a study of alternative or supplementary solutions.
Architect & Deploy
Getting the most value from security solutions requires experience and expertise. This extends to both market-leading technologies and having a comprehensive understanding of how change can be managed. Our teams will gain a thorough understanding of your organization to guide the selection of the right mix of solutions and the resulting design and implementation. We’ll cut through the technical hype, understand benefits and drawbacks and avoid technical blind alleys and roads that lead you nowhere.
Manage & Operate
In our experience, the key to receiving maximum security and compliance value is simple. It requires supplementing managed services and vendor solutions with a number of other things. Either preparedness activities that will ensure the necessary foundational requirements are in place, or integration activities that will ensure that the solution produces the information you need, the way you need it, when you need it.
Our goal is to get the management information you need into a business risk context that will provide stakeholders with critical insights and the confidence of knowing where they stand.
Respond & EducateCyber resilience is based on the premise that incident avoidance is not always possible – you need to be ready and able to effectively respond to a security incident. Should the worst occur, our incident response team can be quickly engaged either remotely or on site. They will identify, document, contain and remediate a security incident to minimize the impact to your organization.
We can also develop a comprehensive program for the security education of your organization. We’ll work with you to ensure that your teams are fully aware of their own role in information security management.
Risk-Based Solutions
Risk Insight
Risk
Rem
edia
tion
Risk Operations
Respond Manage Operate
D
eplo
y
Plan Architect
Edu
cate
Optimize
Risk & Compliance
Management
Security Solution Design &
Integration
Threat Mitigation & Remediation
Strategy
Incident Response &
Forensics
Managed Security Services
Cloud & Data Center Services
Security Program Optimization & CISO Advisory Services
Security & Risk Assessment /
Planning
THREAT INTELLIGENCE
&DATA
ANALYTICS
To learn more about NTT Security and our unique services for information security and risk management, please speak to your account representative or visit: www.nttsecurity.com for regional contact information.
Working togetherAt NTT Security, we start with a conversation about risk and we go on to work with our clients to determine the right mix of services, when you need them, where you need them and how you need them.
Our experienced team will work with you to understand your environment and
requirements and guide you through the process of defining and prioritizing your investment and the activity you require to protect your information assets. As a result, you will invest scarce resources wisely, avoid solution dead ends and, most importantly, strengthen your cyber resilience.