NTT Security Logo

At NTT Security, we provide managed security services with supplemental preparatory and integration options to ensure maximum effectiveness and value is realized by your organization.

We address your security challenges in the context of your organization’s risk parameters, security program, individual control maturity, ICT environment and staff capabilities using the Full Security Life Cycle approach.

Managed security services can be delivered in a best-fit manner ranging from turnkey Security as a Service solutions to out-of-hours or periodic engineering, analysis, and management support.

All managed services are delivered using our federated Global Services Platform (GSP) and built by our Security Engineering and Research Team (SERT) on a foundation of advanced analytics, correlation, and detection powered by our Global Threat Intelligence Platform (GTIP).

You Are Here

Find out more about the Full Security Life Cycle phases

Supplemental services can take the form of one-time consulting engagements; recurring consulting; or additional levels of engineering, analysis, and management delivered in addition to the core managed service.

Preparatory services:  Assist you in getting foundational information, configuration, and controls to the level of maturity needed to ensure the managed security services meet your success criteria.

Advanced services:  Allow you to increase SLAs or broaden the scope of the core managed security services as well as shift the burden of additional tasks from you to NTT Security.

Integration services:  Ensure that the outcomes of the managed security service becomes part of your overall security and compliance programs and that results can be communicated to business stakeholders efficiently and effectively. 

You Are Here

Find out more about the Full Security Life Cycle phases

NTT Security can provide service delivery models ranging from Security as a Service turn-key solutions, to cloud-delivered services, to remotely or locally managed on-premise solutions.

Security as a Service allows you to shift the burden of capital expenditure, ongoing maintenance, engineering, and management to NTT Security.  You specify the requirements without the concerns of ownership and staffing.

Cloud-delivered services utilize a shared infrastructure and enjoy the economies and capabilities of scale.  Well-defined services with processes honed from years of experience provide effectiveness and consistency of execution difficult to achieve on your own.

Remotely or locally managed on-premise solutions allow you to retain ownership while defining the extent of the assistance provided by NTT Security.  One-time engineering, ongoing full-time and out-of-hours or periodic management are available to best fit your needs.

You Are Here

Find out more about the Full Security Life Cycle phases

To be of value, threat intelligence must be actionable.  You need to be able to collect it, analyze it, and act on it.  Threat intelligence is at the heart of all the managed security services that we deliver.  It informs the architecture, design, configuration, and operation of everything we do.

As the largest telecommunications company in the world, NTT has visibility into 40% of all internet backbone traffic.  This unmatched vantage point enables us to collect intelligence at a truly global scale.  With a global honey-net infrastructure, we have visibility into the latest techniques, tactics, and procedures (TTP) attackers are using.

To analyze the threat intelligence collected we created the Global Threat Intelligence Portal (GTIP).  GTIP allows NTT Security Engineering and Research Team (SERT) members from around the globe to collaborate to identify actionable threat indicators (TI) that are used by our managed services to protect your assets.

You Are Here

Find out more about the Full Security Life Cycle phases

At NTT Security we have accumulated over 16 years of proven security analytics by analyzing trillions of security logs and events and identifying millions of attacks.  We’ll work with you to determine the right combination of security sensors and logs to spot attacks as early in the cyber kill chain as possible.

We’re constantly pushing the envelope at our global R&D centres and the NTT Innovation Institute, refining user behavior, big data and machine learning analytics to constantly identify new algorithms and methods to find malicious attackers, security missteps by employees, and vulnerabilities from third parties.

The best analytic capabilities are of little value if they aren’t customized for your organization’s risk parameters, ICT environment, and specific security and compliance use cases.  Our security engineers take actionable threat intelligence from our GTIP and focus on creating security analytics tailored to your needs.

You Are Here

Find out more about the Full Security Life Cycle phases

Utilizing your security controls and our advanced R&D helps you proactively boost your cyber resilience. Our innovative Global Services Platform (GSP) means we can detect infections of unknown malware and anomalous activity in real time using advanced correlation, complex event processing and machine learning.

With several hundred man years of development, our machine learning capability has been guided by data scientists working in conjunction with security experts to develop predictive security models trained with our global internet, honey net and client attack visibility.

Our goal is to mitigate your risks from complex and emerging security threats by detecting them as early in the cyber kill chain as possible.

You Are Here

Find out more about the Full Security Life Cycle phases

Just as one size doesn’t fit all customers, one system doesn’t fit all managed security services. At NTT Security, we have a federated Global Services Platform (GSP) that provides best-of-breed capability to deliver a diverse array of managed security services.

From well-defined, structured cloud security services, to custom on-premise solutions (and with several options in between) we use the Full Security Life Cycle approach to determine the managed security service and platform best-suited to meet your needs.

Whether you want to be a full participant with access to all the details of your minute-by-minute security posture, or prefer to stay informed through a security and compliance dashboard and periodic reports, NTT Security can deliver the information you need to control and manage your security.

You Are Here

Find out more about the Full Security Life Cycle phases

Managed Security Services

Correctly configured, managed and maintained devices are essential to protecting your organization’s assets and are a compliance requirement for regulations including PCI DSS, GLBA, HIPAA and SOX.

Learn More

Comprehensive log monitoring is a critical component of your security program and a requirement for complying with global regulations.

Learn More

Often security logs are archived to meet compliance requirements, but then become inaccessible due to performance and scale constraints. Cloud-based log search offers search and retrieval capabilities to support your organization’s needs.

Learn More

Hybrid and Managed SIEM services are an alternative to on-premise solutions that require continual investment in staff, configuration and operational processes.

Learn More

Controlling who and what can access your critical business applications and data requires policy-based, universal and automated network access control.

Learn More

To be of value, threat intelligence must be targeted for your industry, market, business model, locations and executives – and delivered in a manner that allows you to act on it efficiently.

Learn More

Enabling the mobile digital workforce while protecting critical business assets requires that the right combination of policies and controls are deployed and managed.

Learn More

Use the NTT Security global service platform, threat intelligence and exploit tracking to pragmatically focus your vulnerability management efforts on assessing and remediating the most important gaps in your security architecture - before they are exploited by attackers.

Learn More