View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 10, 2015

BT helps organisations to sniff out cyber threats

Telecoms firm launches the BT Assure Threat Intelligence service.

By Amy-Jo Crowley

BT has launched its BT Assure Threat Intelligence service, which is designed to help organisations anticipate and defend against the growing number of cyber attacks.

The new service is said to minimise risk, enhance security and provide insight into real and potential cyber threats. As a result, organisations should have more time to address vulnerabilities and lower their risk profile.

Other features include round-the-clock global monitoring and assessment of cyber threats to help safeguard organisations’ electronic data and protect the interests of their shareholders and customers.

The launch coincides with a BT survey, which found that 59% of IT decision makers said that DDoS attacks are becoming increasingly better at subverting their IT security measures, while 40% are not convinced that their organisation has a response plan to effectively counter DDoS attacks.

"We want to provide our customers with the peace of mind that comes from knowing what to look out for and how to create an effective defence against cyber threats. Timely and accurate cyber intelligence reporting is central to this," said Mark Hughes, President of BT Security.

"As a global network operator, BT is in a position to identify emerging and potential threats wherever they may come from. We can draw on a huge amount of intelligence from a variety of sources, both human and technical and draw conclusions on risk and threat to help organisations survive, thrive and keep ahead of emerging issues."

Customers are also offered a range of pre-defined intelligence reporting options, and bespoke options to meet their specific needs of their organisation.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

These include include a face-to-face workshop to identify risk assets, advice on how to efficiently deploy resources and other technologies to meet current and developing threat vectors.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU