View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 24, 2017

O2, BAE Systems to fight cyber-crime with cloud

O2 and BAE Systems join forces to fight cyber-crime with cloud.

By Tom Ball

O2 has joined with BAE Systems, to provide an all-encompassing ‘device to cloud’ cyber security proposition for enterprise customers.

This partnership will give O2 customers access to both the Managed Security Services and Cyber Technical Service capabilities, supplied by BAE.

This new initiative is intended to provide a service that can easily align with a customer’s network and processes, either as a stand-alone security solution or in conjunction with the O2 Gateway proposition.

Commenting on the partnership, Billy D’Arcy, Managing Director, Enterprise & Public Sector Business, Telefonica O2 UK said: “The ever changing cyber landscape means businesses need to be at the forefront of security research and development to help protect their customers in the best way possible.

“Our customers tell us that cyber-crime is among their top security concerns. This partnership enables us to expand our security offering, providing access to BAE Systems unparalleled cyber security expertise to help customers further mitigate risk, prevent fraud and provide more security for their own customers.”

BAE Systems provide technology-led defence, aerospace and security solutions. In working with customers and local partners, it also manufactures and supports products and systems to hold military capability, protect national security and to keep critical information and infrastructure secure.

Dr Scott Mcvicar, General Manager EMEA, BAE Systems Applied Intelligence, said they are working “with O2 to help defend businesses from cyber-crime. Our enterprise managed security solution protects any internet enabled device, and always has a human in the loop when it comes to threat detection and remediation. This ensures we can help to identify threats for O2 customers before they become business critical issues.”

Content from our partners
How to engage in SAP monitoring effectively in an era of volatility
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility

Topics in this article : , , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU