SlideShare a Scribd company logo
1 of 9
Global
Telecommunication
Companies
Cyber Security Products, Services and Solutions
Global and APAC Top 10
Telecommunication Companies
Global Ranking* Enterprise
Security
Offering
1. China Mobile
2. Verizon Communications
3. Vodafone
4. AT&T
5. NTT
6. Deutsche Telekom
7. Softbank
8. Telefonica
9. America Movil
10. China Telecom
Asia Ranking* Enterprise
Security
Offering
1. NTT Communications
2. SK Telecom
3. Tata Communications
4. China Mobile
5. CSL
6. Singtel
7. Telekom Malaysia
8. Smart Communications
9. True Corporation
10. Telkomsel
• http://www.forbes.com/sites/liyanchen/2015/06/01/the-worlds-largest-telecom-companies-china-mobile-beats-verizon-att-again/
• http://top10asia.org/the-top10-telcos-in-asia.php
Summary of global and regional telcos
cyber security capability and market
position
Snapshot of Global &
Regional Players
Cyber Security Market Offering (Mid-Market, Enterprise and
Government) & Inherent Strengths or Weaknesses
Verizon in strategic
partnership with
Deloitte
- Offer a comprehensive suite of products and services across the security stack and lifecycle
- Has credibility in the market with Verizon’s Annual Data Breach Investigations Report
- Manages and controls the world’s most connected Internet backbone*
NTT commercialised
through WideAngle
- Offer a comprehensive suite of products and services across the security stack and lifecycle
- Comprehensive set of partners to delivery services
- Manages and controls Japan’s most connected Internet backbone
Singtel commercialised
through NCS
- Has a footprint in most capability areas however appear to be low in maturity
- Limited credibility as a security provider and has yet to be implicated in a major security breach
- Manages and controls Singapore’s most connected Internet backbone
Tata Communications
- Demonstrates a footprint in most capability areas
- Limited credibility as a security provider and has yet to be implicated in a major security breach
- Manages and controls India’s most connected Internet backbone
Telekom Malaysia
commercialised through
VDAS
- Limited capability with disparate set of products and services
- Does not appear to have a professional services capability
- Manages and controls Malaysia’s most connected Internet backbone
China Mobile (China), SK Telecom (South Korea), CSL (Hong Kong), True Corporation
(Thailand) and Telkomsel (Indonesia) did not appear to have any cyber security offering.
Smart Communications (Philippines) has a mobile device management capability however it
does not appear to target mid-market, enterprise and Government customers.
* https://www22.verizon.com/wholesale/newscenter/newsDetailsByNewsId.jsp?newsId=WSNEWS712423&page=news_archieve.jsp
Appendix
Snapshot of enterprise security offering by Verizon,
NTT, SingTel, Tata and Telekom Malaysia
Verizon Mid-Market, Enterprise & Government
Offering
In strategic partnership with Deloitte
Vulnerability
Management
Application
Security
Data Security
Mobile and
M2M Security
Asset &
Exposure
Management
Managed
Security
Services
SOC Services
Monitoring
& Analytics
Investigative
Response
E-Discovery
Research
RISK Labs
Infrastructure
Incident
Management
& E-
Discovery
Unified
Security
Services
Managed
Security
DOS Protection
Security
Gateway
Unified Threat
Management
Advanced
Security
Program
Enforcement
& Protection
Managed
Certificate
Services
User Identity
IAM
Professional
Services
Identity &
Access
Governance,
Risk and
Compliance
PCI
Compliance
Security
Management
Risk &
Compliance
Professional
Security Services
Managed Security
Services
1. http://www.verizonenterprise.com/products/security/
2. http://www.verizonenterprise.com/solutions/professional-services/professional-services-security/
3. http://www.verizonenterprise.com/products/cloud-it-infrastructure-services/security-services/risk-compliance-management.xml
NTT Mid-Market, Enterprise & Government
Offering
Commercialised through WideAngle and in strategic partnership with Dimension Data
Governance,
Risk and
Compliance
APT
Simulation
Incident
Response
Risk Insight
Advanced
SOC
PCI-DSS
Security
Consulting
Services
SecureCall
Security
Operations
Threat
Intelligence
Managed
Security
Services
Enterprise
Security
Architecture
Mobile
Device
Management
ID Federation
Security
Technology
Solutions
Professional
Security Services
Managed Security
Services
1. http://www.nttcomsecurity.com/as/services/
2. http://www.ntt.com/idf_e/
3. http://www.nttcomsecurity.com/as/about-us/partners/
Partnerships include:
• Accellion
• Bit9+CarbonBlack
• Blue Coat
• Bradford Networks
• Check Point
• Cisco
• Citrix
• Corero
• Courion
• F5
• ForeScout
• FireEye
• IBM
• Impreva
• Infoblox
• Juniper
• Kapersky
• Loglogic
• LogRhythm
• Intel Security
• Lumension
• PaloAlto Networks
• Riverbed
• RSA
• SafeNet
• ScanSafe
• Skybox
• Sonicwall
• Sophos
• Soucefire
• Symantec
• TippingPoint
• Trend Micro
• Tripwire
• Tufin
• Varonis
• Vasco
• Webroot
• Websense
• Xirrus
Singtel Mid-Market, Enterprise & Government
Offering
Commercialised through NCS
Risk
Assessments
Policy
Development
Standards
and Planning
Security
Review
Consultancy
ChatVault
Secure
Enterprise
Messenger
Enterprise
MobileCARE
Enterprise
Workspace
Mobile
Device
Management
Mobile
Threat
Prevention
Mobile Voice
Recording
Enterprise
Mobility
Managed
Application
Firewall
Service
Managed
Security
Services*
Web Security
SIEM
Intrusion
Prevention
Service
Email
Security
Endpoint
Security
Identity
Assurance
Service
Managed
Security
Services
Professional
Security Services
Managed Security
Services
1. http://info.singtel.com/business/enterprise-services/mobility/security
2. http://info.singtel.com/business/products-and-services/managed-services-hosting/managed-security
3. http://www.ncs.com.sg/enterprise-data-and-managed-services
4. http://www.ncs.com.sg/security-services
Managed security services
include:
• Security Information and
Event Management (SIEM)
Monitoring
• IT Governance and
Compliance Monitoring
• Insider Threat Monitoring
• SCADA Monitoring
• Security Device Management
• Rapid Threat Containment
• The Security Operations
Centre (SOC)
Tata Communications Mid-Market, Enterprise &
Government Offering
Vulnerability
Management
Managed Proxy
Virtual Proxy
Email Security
Vulnerability
Management
Controls
Penetration
Testing
Vulnerability
Assessment
ISO 27001
PCI-DSS
Web
Application
Hardening
Security
Architecture
Hardening
Testing,
Assessment &
Audit
Managed
Advanced
Malware
Protection
Security Event
Monitoring
Firewall-UTM
Managed
Authentication
DDoS Detection
& Mitigation
Managed
IDS/IPS
Cloud Security
Services
Network,
Application &
Data
Protection
Controls
Professional
Security Services
Managed Security
Services
1. http://www.tatacommunications.com/products-services/enterprises/managed-security-services
Supported delivery models
include:
• On-premise deployment with
remote monitoring and
management
• Network/cloud based
solutions
• Professional consulting
services
Telekom Malaysia Mid-Market, Enterprise &
Government Offering
Commercialised through VADS
Managed
Firewalls
Managed
Antivirus
Managed
Anti-spam
Managed
IDS/IPS
Data
Centre &
Cloud
Services Unified
Threat
Management
SecureWAN
Cloud based
Web Security
Managed
Web
Application
Firewalls
Managed
Security
Services
Professional
Security Services
Managed Security
Services
1. http://www.vads.com/integrated-ict-services/
Partnerships
include:
• CISCO
• NetApp
• BlueCoat
• McAfee
• VmWare
• IBM
• Barracuda
Networks
• Microsoft
• Fortinet
• Websense
• Riverbed
• Juniper
• TippingPoint
• Sourcefire

More Related Content

Viewers also liked

Internet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideInternet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideJames Stewart
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Prensentasi indosat
Prensentasi indosatPrensentasi indosat
Prensentasi indosatFarhan Akbar
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersCyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersDavid Sweigert
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 

Viewers also liked (18)

Internet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideInternet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital Divide
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Prensentasi indosat
Prensentasi indosatPrensentasi indosat
Prensentasi indosat
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersCyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency Managers
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
TELKOMSEL Research
TELKOMSEL ResearchTELKOMSEL Research
TELKOMSEL Research
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 

Recently uploaded

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Cyber Market Propositions by Global Telecommunications Companies

  • 2. Global and APAC Top 10 Telecommunication Companies Global Ranking* Enterprise Security Offering 1. China Mobile 2. Verizon Communications 3. Vodafone 4. AT&T 5. NTT 6. Deutsche Telekom 7. Softbank 8. Telefonica 9. America Movil 10. China Telecom Asia Ranking* Enterprise Security Offering 1. NTT Communications 2. SK Telecom 3. Tata Communications 4. China Mobile 5. CSL 6. Singtel 7. Telekom Malaysia 8. Smart Communications 9. True Corporation 10. Telkomsel • http://www.forbes.com/sites/liyanchen/2015/06/01/the-worlds-largest-telecom-companies-china-mobile-beats-verizon-att-again/ • http://top10asia.org/the-top10-telcos-in-asia.php
  • 3. Summary of global and regional telcos cyber security capability and market position Snapshot of Global & Regional Players Cyber Security Market Offering (Mid-Market, Enterprise and Government) & Inherent Strengths or Weaknesses Verizon in strategic partnership with Deloitte - Offer a comprehensive suite of products and services across the security stack and lifecycle - Has credibility in the market with Verizon’s Annual Data Breach Investigations Report - Manages and controls the world’s most connected Internet backbone* NTT commercialised through WideAngle - Offer a comprehensive suite of products and services across the security stack and lifecycle - Comprehensive set of partners to delivery services - Manages and controls Japan’s most connected Internet backbone Singtel commercialised through NCS - Has a footprint in most capability areas however appear to be low in maturity - Limited credibility as a security provider and has yet to be implicated in a major security breach - Manages and controls Singapore’s most connected Internet backbone Tata Communications - Demonstrates a footprint in most capability areas - Limited credibility as a security provider and has yet to be implicated in a major security breach - Manages and controls India’s most connected Internet backbone Telekom Malaysia commercialised through VDAS - Limited capability with disparate set of products and services - Does not appear to have a professional services capability - Manages and controls Malaysia’s most connected Internet backbone China Mobile (China), SK Telecom (South Korea), CSL (Hong Kong), True Corporation (Thailand) and Telkomsel (Indonesia) did not appear to have any cyber security offering. Smart Communications (Philippines) has a mobile device management capability however it does not appear to target mid-market, enterprise and Government customers. * https://www22.verizon.com/wholesale/newscenter/newsDetailsByNewsId.jsp?newsId=WSNEWS712423&page=news_archieve.jsp
  • 4. Appendix Snapshot of enterprise security offering by Verizon, NTT, SingTel, Tata and Telekom Malaysia
  • 5. Verizon Mid-Market, Enterprise & Government Offering In strategic partnership with Deloitte Vulnerability Management Application Security Data Security Mobile and M2M Security Asset & Exposure Management Managed Security Services SOC Services Monitoring & Analytics Investigative Response E-Discovery Research RISK Labs Infrastructure Incident Management & E- Discovery Unified Security Services Managed Security DOS Protection Security Gateway Unified Threat Management Advanced Security Program Enforcement & Protection Managed Certificate Services User Identity IAM Professional Services Identity & Access Governance, Risk and Compliance PCI Compliance Security Management Risk & Compliance Professional Security Services Managed Security Services 1. http://www.verizonenterprise.com/products/security/ 2. http://www.verizonenterprise.com/solutions/professional-services/professional-services-security/ 3. http://www.verizonenterprise.com/products/cloud-it-infrastructure-services/security-services/risk-compliance-management.xml
  • 6. NTT Mid-Market, Enterprise & Government Offering Commercialised through WideAngle and in strategic partnership with Dimension Data Governance, Risk and Compliance APT Simulation Incident Response Risk Insight Advanced SOC PCI-DSS Security Consulting Services SecureCall Security Operations Threat Intelligence Managed Security Services Enterprise Security Architecture Mobile Device Management ID Federation Security Technology Solutions Professional Security Services Managed Security Services 1. http://www.nttcomsecurity.com/as/services/ 2. http://www.ntt.com/idf_e/ 3. http://www.nttcomsecurity.com/as/about-us/partners/ Partnerships include: • Accellion • Bit9+CarbonBlack • Blue Coat • Bradford Networks • Check Point • Cisco • Citrix • Corero • Courion • F5 • ForeScout • FireEye • IBM • Impreva • Infoblox • Juniper • Kapersky • Loglogic • LogRhythm • Intel Security • Lumension • PaloAlto Networks • Riverbed • RSA • SafeNet • ScanSafe • Skybox • Sonicwall • Sophos • Soucefire • Symantec • TippingPoint • Trend Micro • Tripwire • Tufin • Varonis • Vasco • Webroot • Websense • Xirrus
  • 7. Singtel Mid-Market, Enterprise & Government Offering Commercialised through NCS Risk Assessments Policy Development Standards and Planning Security Review Consultancy ChatVault Secure Enterprise Messenger Enterprise MobileCARE Enterprise Workspace Mobile Device Management Mobile Threat Prevention Mobile Voice Recording Enterprise Mobility Managed Application Firewall Service Managed Security Services* Web Security SIEM Intrusion Prevention Service Email Security Endpoint Security Identity Assurance Service Managed Security Services Professional Security Services Managed Security Services 1. http://info.singtel.com/business/enterprise-services/mobility/security 2. http://info.singtel.com/business/products-and-services/managed-services-hosting/managed-security 3. http://www.ncs.com.sg/enterprise-data-and-managed-services 4. http://www.ncs.com.sg/security-services Managed security services include: • Security Information and Event Management (SIEM) Monitoring • IT Governance and Compliance Monitoring • Insider Threat Monitoring • SCADA Monitoring • Security Device Management • Rapid Threat Containment • The Security Operations Centre (SOC)
  • 8. Tata Communications Mid-Market, Enterprise & Government Offering Vulnerability Management Managed Proxy Virtual Proxy Email Security Vulnerability Management Controls Penetration Testing Vulnerability Assessment ISO 27001 PCI-DSS Web Application Hardening Security Architecture Hardening Testing, Assessment & Audit Managed Advanced Malware Protection Security Event Monitoring Firewall-UTM Managed Authentication DDoS Detection & Mitigation Managed IDS/IPS Cloud Security Services Network, Application & Data Protection Controls Professional Security Services Managed Security Services 1. http://www.tatacommunications.com/products-services/enterprises/managed-security-services Supported delivery models include: • On-premise deployment with remote monitoring and management • Network/cloud based solutions • Professional consulting services
  • 9. Telekom Malaysia Mid-Market, Enterprise & Government Offering Commercialised through VADS Managed Firewalls Managed Antivirus Managed Anti-spam Managed IDS/IPS Data Centre & Cloud Services Unified Threat Management SecureWAN Cloud based Web Security Managed Web Application Firewalls Managed Security Services Professional Security Services Managed Security Services 1. http://www.vads.com/integrated-ict-services/ Partnerships include: • CISCO • NetApp • BlueCoat • McAfee • VmWare • IBM • Barracuda Networks • Microsoft • Fortinet • Websense • Riverbed • Juniper • TippingPoint • Sourcefire