Preventing cyber attacks.

Preventing cyber attacks. Preventing cyber attacks.

Security solutions

The reality

Proactive threat defence

You can never eliminate risk completely, but you can manage it, get the measure of it and try to spot what’s coming next. Instead of just defensive security measures you need to be proactive, predicting where threats will come from and warding them off. Getting ahead.

With intelligence gathered from various sources – governments, partners and your global network, you need to get a birds-eye view of what’s going on. Using the data you’ll be able to deal with cyber threats while they’re still manageable and containable, and before they become too costly – or the stuff of headlines.

You’ll also need the people who understand what the data is saying and know how to respond. Quickly.

BT and Intel working together

Oliver Newbury, Chief Technology Officer BT Security and Raj Samani, Chief Technology Officer Intel Security discuss how BT and Intel Security are helping customers tackle the increase in cyber-attacks. Their strategy includes collaboration, up-to-date intelligence and a new managed security ecosystem. Join us at the booth to see product demonstrations.

Show more Show less

The problem

Identifying the real threats

When it comes to cyber security, it is becoming increasingly difficult to deal with the sheer volume of security alerts and spot the real business-affecting threats from the general “noise”.

Multiple boxes, multiple operating systems and multiple management platforms which are stitched together with a view to providing end-to-end security, often create gaps, are expensive, slow and fallible.

Trawling multiple intelligence sources, with limited security expertise and silos of technology (often legacy) are all hurdles that many companies face. Integrated threat intelligence seems like a distant dream.

All of this dramatically affects your ability to understand quickly if you are vulnerable and respond effectively.

How we can help

Working in real-time

Our global network means we see as much cyber activity as anyone in the world. So we’re good at spotting existing threats and staying up to date with emerging ones.

We focus on gathering, analysing and sharing the latest intelligence so that protective controls can be updated in real-time and organisations can respond faster, in a more joined up way and close the gap between detection and protection.

We can bring together the mass of data from across your security systems and analyse it alongside other information. To do it, we’ve built our own big data platform that can work out immediately which systems might be under threat – a job that normally takes days.

It weighs up the risk to the business from a would-be attack, which frees analysts to focus only on the ones they really need to, saving time. It also picks up anomalies that might otherwise slip through the cracks. It can look into unusual data transfers or login activity to see if the system is facing a persistent threat or if someone is abusing trust.

Cyber intelligence is increasingly collaborative. Organisations in both public and private sectors are coming together to pool intelligence and share best practice. The Government-led initiative CERT UK is one example of this in action. We provide threat intelligence services, and have done so for a very long time. It’s this type of collaborative approach that will help to create a more complete picture of security threats and how they’re changing.

Key portfolio

World-class cyber defence

  • Assure Cyber: A new all-in-one security platform that offers organisations comprehensive monitoring, detection and protection against cyber threats. It puts threats into context and prioritises them. It analyses the norm, so you can spot anomalies quicker.
  • Assure Threat Intelligence: A service which gives our customers intelligence drawn from multiple sources on potential threats that may affect their organisation.
  • Assure Threat Monitoring: Our unique security information and event management (SIEM) service collects and analyses security information 24X7 across your organisation.
  • Assure Threat Defence: Real-time response to any critical alerts or targeted malware detected within your network.

Why BT

BT has a ringside view

A ringside view
BT carries a vast amount of the world’s internet traffic which enables us to combine and analyse huge amounts of network and security data from our global network and 14 Security Operations Centres. We can quickly turn this into actionable intelligence for our clients using sophisticated data analytics. Intelligence is essential. 

Access a huge pool of security talent
With BT’s 2500 security professionals and more than 500 security consulting professionals globally, you’ll have access to specialists across all our solutions, programme and technical groups. 

Vendor neutral monitoring
BT offers a vendor neutral approach to network monitoring. This means that customer can select security devices from those vendors that are right for their organisation. BT supports more than one million event rules across a broad range of devices.




BT and Intel Security working together

PDF-924 KB

Managed Security Ecosystem

White paper

Aim Small, Miss Small


Producing a World-Class Threat Intelligence Capability