SlideShare a Scribd company logo
Global
Telecommunication
Companies
Cyber Security Products, Services and Solutions
Global and APAC Top 10
Telecommunication Companies
Global Ranking* Enterprise
Security
Offering
1. China Mobile
2. Verizon Communications
3. Vodafone
4. AT&T
5. NTT
6. Deutsche Telekom
7. Softbank
8. Telefonica
9. America Movil
10. China Telecom
Asia Ranking* Enterprise
Security
Offering
1. NTT Communications
2. SK Telecom
3. Tata Communications
4. China Mobile
5. CSL
6. Singtel
7. Telekom Malaysia
8. Smart Communications
9. True Corporation
10. Telkomsel
• http://www.forbes.com/sites/liyanchen/2015/06/01/the-worlds-largest-telecom-companies-china-mobile-beats-verizon-att-again/
• http://top10asia.org/the-top10-telcos-in-asia.php
Summary of global and regional telcos
cyber security capability and market
position
Snapshot of Global &
Regional Players
Cyber Security Market Offering (Mid-Market, Enterprise and
Government) & Inherent Strengths or Weaknesses
Verizon in strategic
partnership with
Deloitte
- Offer a comprehensive suite of products and services across the security stack and lifecycle
- Has credibility in the market with Verizon’s Annual Data Breach Investigations Report
- Manages and controls the world’s most connected Internet backbone*
NTT commercialised
through WideAngle
- Offer a comprehensive suite of products and services across the security stack and lifecycle
- Comprehensive set of partners to delivery services
- Manages and controls Japan’s most connected Internet backbone
Singtel commercialised
through NCS
- Has a footprint in most capability areas however appear to be low in maturity
- Limited credibility as a security provider and has yet to be implicated in a major security breach
- Manages and controls Singapore’s most connected Internet backbone
Tata Communications
- Demonstrates a footprint in most capability areas
- Limited credibility as a security provider and has yet to be implicated in a major security breach
- Manages and controls India’s most connected Internet backbone
Telekom Malaysia
commercialised through
VDAS
- Limited capability with disparate set of products and services
- Does not appear to have a professional services capability
- Manages and controls Malaysia’s most connected Internet backbone
China Mobile (China), SK Telecom (South Korea), CSL (Hong Kong), True Corporation
(Thailand) and Telkomsel (Indonesia) did not appear to have any cyber security offering.
Smart Communications (Philippines) has a mobile device management capability however it
does not appear to target mid-market, enterprise and Government customers.
* https://www22.verizon.com/wholesale/newscenter/newsDetailsByNewsId.jsp?newsId=WSNEWS712423&page=news_archieve.jsp
Appendix
Snapshot of enterprise security offering by Verizon,
NTT, SingTel, Tata and Telekom Malaysia
Verizon Mid-Market, Enterprise & Government
Offering
In strategic partnership with Deloitte
Vulnerability
Management
Application
Security
Data Security
Mobile and
M2M Security
Asset &
Exposure
Management
Managed
Security
Services
SOC Services
Monitoring
& Analytics
Investigative
Response
E-Discovery
Research
RISK Labs
Infrastructure
Incident
Management
& E-
Discovery
Unified
Security
Services
Managed
Security
DOS Protection
Security
Gateway
Unified Threat
Management
Advanced
Security
Program
Enforcement
& Protection
Managed
Certificate
Services
User Identity
IAM
Professional
Services
Identity &
Access
Governance,
Risk and
Compliance
PCI
Compliance
Security
Management
Risk &
Compliance
Professional
Security Services
Managed Security
Services
1. http://www.verizonenterprise.com/products/security/
2. http://www.verizonenterprise.com/solutions/professional-services/professional-services-security/
3. http://www.verizonenterprise.com/products/cloud-it-infrastructure-services/security-services/risk-compliance-management.xml
NTT Mid-Market, Enterprise & Government
Offering
Commercialised through WideAngle and in strategic partnership with Dimension Data
Governance,
Risk and
Compliance
APT
Simulation
Incident
Response
Risk Insight
Advanced
SOC
PCI-DSS
Security
Consulting
Services
SecureCall
Security
Operations
Threat
Intelligence
Managed
Security
Services
Enterprise
Security
Architecture
Mobile
Device
Management
ID Federation
Security
Technology
Solutions
Professional
Security Services
Managed Security
Services
1. http://www.nttcomsecurity.com/as/services/
2. http://www.ntt.com/idf_e/
3. http://www.nttcomsecurity.com/as/about-us/partners/
Partnerships include:
• Accellion
• Bit9+CarbonBlack
• Blue Coat
• Bradford Networks
• Check Point
• Cisco
• Citrix
• Corero
• Courion
• F5
• ForeScout
• FireEye
• IBM
• Impreva
• Infoblox
• Juniper
• Kapersky
• Loglogic
• LogRhythm
• Intel Security
• Lumension
• PaloAlto Networks
• Riverbed
• RSA
• SafeNet
• ScanSafe
• Skybox
• Sonicwall
• Sophos
• Soucefire
• Symantec
• TippingPoint
• Trend Micro
• Tripwire
• Tufin
• Varonis
• Vasco
• Webroot
• Websense
• Xirrus
Singtel Mid-Market, Enterprise & Government
Offering
Commercialised through NCS
Risk
Assessments
Policy
Development
Standards
and Planning
Security
Review
Consultancy
ChatVault
Secure
Enterprise
Messenger
Enterprise
MobileCARE
Enterprise
Workspace
Mobile
Device
Management
Mobile
Threat
Prevention
Mobile Voice
Recording
Enterprise
Mobility
Managed
Application
Firewall
Service
Managed
Security
Services*
Web Security
SIEM
Intrusion
Prevention
Service
Email
Security
Endpoint
Security
Identity
Assurance
Service
Managed
Security
Services
Professional
Security Services
Managed Security
Services
1. http://info.singtel.com/business/enterprise-services/mobility/security
2. http://info.singtel.com/business/products-and-services/managed-services-hosting/managed-security
3. http://www.ncs.com.sg/enterprise-data-and-managed-services
4. http://www.ncs.com.sg/security-services
Managed security services
include:
• Security Information and
Event Management (SIEM)
Monitoring
• IT Governance and
Compliance Monitoring
• Insider Threat Monitoring
• SCADA Monitoring
• Security Device Management
• Rapid Threat Containment
• The Security Operations
Centre (SOC)
Tata Communications Mid-Market, Enterprise &
Government Offering
Vulnerability
Management
Managed Proxy
Virtual Proxy
Email Security
Vulnerability
Management
Controls
Penetration
Testing
Vulnerability
Assessment
ISO 27001
PCI-DSS
Web
Application
Hardening
Security
Architecture
Hardening
Testing,
Assessment &
Audit
Managed
Advanced
Malware
Protection
Security Event
Monitoring
Firewall-UTM
Managed
Authentication
DDoS Detection
& Mitigation
Managed
IDS/IPS
Cloud Security
Services
Network,
Application &
Data
Protection
Controls
Professional
Security Services
Managed Security
Services
1. http://www.tatacommunications.com/products-services/enterprises/managed-security-services
Supported delivery models
include:
• On-premise deployment with
remote monitoring and
management
• Network/cloud based
solutions
• Professional consulting
services
Telekom Malaysia Mid-Market, Enterprise &
Government Offering
Commercialised through VADS
Managed
Firewalls
Managed
Antivirus
Managed
Anti-spam
Managed
IDS/IPS
Data
Centre &
Cloud
Services Unified
Threat
Management
SecureWAN
Cloud based
Web Security
Managed
Web
Application
Firewalls
Managed
Security
Services
Professional
Security Services
Managed Security
Services
1. http://www.vads.com/integrated-ict-services/
Partnerships
include:
• CISCO
• NetApp
• BlueCoat
• McAfee
• VmWare
• IBM
• Barracuda
Networks
• Microsoft
• Fortinet
• Websense
• Riverbed
• Juniper
• TippingPoint
• Sourcefire

More Related Content

Viewers also liked

Internet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideInternet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideJames Stewart
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Prensentasi indosat
Prensentasi indosatPrensentasi indosat
Prensentasi indosatFarhan Akbar
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersCyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersDavid Sweigert
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 

Viewers also liked (18)

Internet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital DivideInternet and Society: Internet Use And Digital Divide
Internet and Society: Internet Use And Digital Divide
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Prensentasi indosat
Prensentasi indosatPrensentasi indosat
Prensentasi indosat
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency ManagersCyber Security Risk Assessment Awareness for Emergency Managers
Cyber Security Risk Assessment Awareness for Emergency Managers
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
TELKOMSEL Research
TELKOMSEL ResearchTELKOMSEL Research
TELKOMSEL Research
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 

Recently uploaded

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 

Recently uploaded (20)

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 

Cyber Market Propositions by Global Telecommunications Companies

  • 2. Global and APAC Top 10 Telecommunication Companies Global Ranking* Enterprise Security Offering 1. China Mobile 2. Verizon Communications 3. Vodafone 4. AT&T 5. NTT 6. Deutsche Telekom 7. Softbank 8. Telefonica 9. America Movil 10. China Telecom Asia Ranking* Enterprise Security Offering 1. NTT Communications 2. SK Telecom 3. Tata Communications 4. China Mobile 5. CSL 6. Singtel 7. Telekom Malaysia 8. Smart Communications 9. True Corporation 10. Telkomsel • http://www.forbes.com/sites/liyanchen/2015/06/01/the-worlds-largest-telecom-companies-china-mobile-beats-verizon-att-again/ • http://top10asia.org/the-top10-telcos-in-asia.php
  • 3. Summary of global and regional telcos cyber security capability and market position Snapshot of Global & Regional Players Cyber Security Market Offering (Mid-Market, Enterprise and Government) & Inherent Strengths or Weaknesses Verizon in strategic partnership with Deloitte - Offer a comprehensive suite of products and services across the security stack and lifecycle - Has credibility in the market with Verizon’s Annual Data Breach Investigations Report - Manages and controls the world’s most connected Internet backbone* NTT commercialised through WideAngle - Offer a comprehensive suite of products and services across the security stack and lifecycle - Comprehensive set of partners to delivery services - Manages and controls Japan’s most connected Internet backbone Singtel commercialised through NCS - Has a footprint in most capability areas however appear to be low in maturity - Limited credibility as a security provider and has yet to be implicated in a major security breach - Manages and controls Singapore’s most connected Internet backbone Tata Communications - Demonstrates a footprint in most capability areas - Limited credibility as a security provider and has yet to be implicated in a major security breach - Manages and controls India’s most connected Internet backbone Telekom Malaysia commercialised through VDAS - Limited capability with disparate set of products and services - Does not appear to have a professional services capability - Manages and controls Malaysia’s most connected Internet backbone China Mobile (China), SK Telecom (South Korea), CSL (Hong Kong), True Corporation (Thailand) and Telkomsel (Indonesia) did not appear to have any cyber security offering. Smart Communications (Philippines) has a mobile device management capability however it does not appear to target mid-market, enterprise and Government customers. * https://www22.verizon.com/wholesale/newscenter/newsDetailsByNewsId.jsp?newsId=WSNEWS712423&page=news_archieve.jsp
  • 4. Appendix Snapshot of enterprise security offering by Verizon, NTT, SingTel, Tata and Telekom Malaysia
  • 5. Verizon Mid-Market, Enterprise & Government Offering In strategic partnership with Deloitte Vulnerability Management Application Security Data Security Mobile and M2M Security Asset & Exposure Management Managed Security Services SOC Services Monitoring & Analytics Investigative Response E-Discovery Research RISK Labs Infrastructure Incident Management & E- Discovery Unified Security Services Managed Security DOS Protection Security Gateway Unified Threat Management Advanced Security Program Enforcement & Protection Managed Certificate Services User Identity IAM Professional Services Identity & Access Governance, Risk and Compliance PCI Compliance Security Management Risk & Compliance Professional Security Services Managed Security Services 1. http://www.verizonenterprise.com/products/security/ 2. http://www.verizonenterprise.com/solutions/professional-services/professional-services-security/ 3. http://www.verizonenterprise.com/products/cloud-it-infrastructure-services/security-services/risk-compliance-management.xml
  • 6. NTT Mid-Market, Enterprise & Government Offering Commercialised through WideAngle and in strategic partnership with Dimension Data Governance, Risk and Compliance APT Simulation Incident Response Risk Insight Advanced SOC PCI-DSS Security Consulting Services SecureCall Security Operations Threat Intelligence Managed Security Services Enterprise Security Architecture Mobile Device Management ID Federation Security Technology Solutions Professional Security Services Managed Security Services 1. http://www.nttcomsecurity.com/as/services/ 2. http://www.ntt.com/idf_e/ 3. http://www.nttcomsecurity.com/as/about-us/partners/ Partnerships include: • Accellion • Bit9+CarbonBlack • Blue Coat • Bradford Networks • Check Point • Cisco • Citrix • Corero • Courion • F5 • ForeScout • FireEye • IBM • Impreva • Infoblox • Juniper • Kapersky • Loglogic • LogRhythm • Intel Security • Lumension • PaloAlto Networks • Riverbed • RSA • SafeNet • ScanSafe • Skybox • Sonicwall • Sophos • Soucefire • Symantec • TippingPoint • Trend Micro • Tripwire • Tufin • Varonis • Vasco • Webroot • Websense • Xirrus
  • 7. Singtel Mid-Market, Enterprise & Government Offering Commercialised through NCS Risk Assessments Policy Development Standards and Planning Security Review Consultancy ChatVault Secure Enterprise Messenger Enterprise MobileCARE Enterprise Workspace Mobile Device Management Mobile Threat Prevention Mobile Voice Recording Enterprise Mobility Managed Application Firewall Service Managed Security Services* Web Security SIEM Intrusion Prevention Service Email Security Endpoint Security Identity Assurance Service Managed Security Services Professional Security Services Managed Security Services 1. http://info.singtel.com/business/enterprise-services/mobility/security 2. http://info.singtel.com/business/products-and-services/managed-services-hosting/managed-security 3. http://www.ncs.com.sg/enterprise-data-and-managed-services 4. http://www.ncs.com.sg/security-services Managed security services include: • Security Information and Event Management (SIEM) Monitoring • IT Governance and Compliance Monitoring • Insider Threat Monitoring • SCADA Monitoring • Security Device Management • Rapid Threat Containment • The Security Operations Centre (SOC)
  • 8. Tata Communications Mid-Market, Enterprise & Government Offering Vulnerability Management Managed Proxy Virtual Proxy Email Security Vulnerability Management Controls Penetration Testing Vulnerability Assessment ISO 27001 PCI-DSS Web Application Hardening Security Architecture Hardening Testing, Assessment & Audit Managed Advanced Malware Protection Security Event Monitoring Firewall-UTM Managed Authentication DDoS Detection & Mitigation Managed IDS/IPS Cloud Security Services Network, Application & Data Protection Controls Professional Security Services Managed Security Services 1. http://www.tatacommunications.com/products-services/enterprises/managed-security-services Supported delivery models include: • On-premise deployment with remote monitoring and management • Network/cloud based solutions • Professional consulting services
  • 9. Telekom Malaysia Mid-Market, Enterprise & Government Offering Commercialised through VADS Managed Firewalls Managed Antivirus Managed Anti-spam Managed IDS/IPS Data Centre & Cloud Services Unified Threat Management SecureWAN Cloud based Web Security Managed Web Application Firewalls Managed Security Services Professional Security Services Managed Security Services 1. http://www.vads.com/integrated-ict-services/ Partnerships include: • CISCO • NetApp • BlueCoat • McAfee • VmWare • IBM • Barracuda Networks • Microsoft • Fortinet • Websense • Riverbed • Juniper • TippingPoint • Sourcefire