Protecting your network - Infrastructure security consultancy

Infrastructure Protecting your network

BT Infrastructure security consultancy

Contact a security expert

Overview

A secure network is your foundation.

You rely on your network infrastructure day-in, day-out. It is crucial to defend your critical business processes against today’s complex threats and malicious attacks. Many of these malicious attacks are designed to steal your valuable data, disrupt, deny access to, degrade, or destroy critical information on your IT systems. Some attacks may be the result of script kiddies or novice hackers, but there are also high-skilled criminal attackers using intelligent intrusion methods and custom developed attack scenarios to reach their targets.

Have you considered the potential reputational and financial impact of such a successful attack on your organisation?

A well-designed and robust network architecture will help to protect you. Not only does it need to protect you from threats coming from both outside and inside your organisation, but it should also operate without performance degradation and be flexible enough to support your evolving business.

Our approach is simple and aims to answer the question – is your network infrastructure secure?

Following our standardised approach, our accredited and highly skilled security consultants can help you to build secure (vendor agnostic) network architectures which are scalable and able to adapt to new strategies such as a move to the cloud.

Our credentials

Global talent
We have access to a huge pool of security talent. With over 2500 security professionals around the world, of which 500 are security consultants, you’ll have access to specialists in cyber defence, risk and compliance, application and data security and infrastructure. We can offer you the combined vast knowledge and experience of our highly skilled network security consultants alongside proven methodologies.

Breadth of experience
We have in-depth knowledge and experience of network infrastructures from which you will benefit. These resilient network infrastructures consists of all kind of devices like (web application) firewalls, IDS/IPS, security monitoring solutions, network components like router, switches, proxy servers and WAN acceleration appliances. We work with organisations such as the UK’s Ministry of Defence, who demand the highest level of protection. We have also consulted on security for large scale events such as the London 2012 Olympic games, the NATO summit and Expo Milano 2015. In the field of ethical hacking and penetration testing we have more than 20 years’ experience, testing both our own networks and those of our customers.

Accreditation
We are accredited to deliver professional services on a global scale, meeting ISO9001:2008 quality management system standards. We also design and build business continuity networks and systems according international standards (ISO22301).

Joined-up defence
BT is among only a handful of Managed Security providers that also has very strong global capabilities in Information Security Consulting and IT Risk Consulting. We are also one of only a few organisations providing integrated network and security solutions. This joined up approach means that we can look at all the elements of people, process and technology, prevent gaps and provide a joined-up strategy to protect against cyber threats.

For the growing number of enterprises seeking a broader, integrated solution rather than treating security as an isolated silo, BT can offer a one-stop shop security experience”.
- John Marcus, Current Analysis. BT was ranked as “Very Strong” by Current Analysis (2016).

The details

Our approach

  • Our unique program and project management methodology is based on MSP and PRINCE2 and provides a flexible and stable set of operating procedures which are independent of organisation structure.
  • Depending on the size of the engagement project management will be done by a consultant or a dedicated project or program manager.
  • Our proposal will include the basics of scope and deliverables and may also include managed security services, training (on-the-job), hard and software components as well as maintenance contracts to cover hardware break/fix and/or software updates.
  • During the project, we will report status updates and whenever needed exception reports as well. This enables you to understand the overall progress of the project and understand whether critical issues have arisen.
  • The project deliverables may, depending on the scope, include design, installation and implementation documents.
  • In order to guarantee high quality output the project deliverables go through a peer and document quality review before they are shared with you.
  • Once the project has been delivered and handed over to you, the next phase starts. Manage and maintenance of any infrastructure security solution is the next challenge and requires a continued focus.

Availability

Infrastructure security consultancy availability.

Available globally.