Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

BT Addresses Big Data and Security Challenges With New Visualization Service

British Telecommunications (BT) today launched a new security data analysis service designed to help organizations collect, arrange and evaluate big data sets, and present them in “visually insightful ways” in order to help make better decisions.

BT Logo

British Telecommunications (BT) today launched a new security data analysis service designed to help organizations collect, arrange and evaluate big data sets, and present them in “visually insightful ways” in order to help make better decisions.

BT Logo

Dubbed “Assure Analytics”, the service helps businesses make informed, split-second decisions and develop effective long-term policies to govern their use of resources and response to potential risks and security threats across their infrastructure and operations.

The service works by instantly fusing together structured and unstructured data from multiple sources sources such as emails, reporting systems, databases and Internet news feeds. It then generates insightful imagery and maps that highlights potential patterns, threats, interdependencies and outcomes across their organization.

The system learns as it runs, and provides businesses with the integrated information they want, when they want it.

BT says that it is already using Assure Analytics in its battle to protect the UK telecoms network from copper theft. The service is helping the company analyze crime statistics, fault reporting and geographical information – highlighting patterns and theft hotspots to inform its prevention and response policies.

“Organizations are facing an explosion in data generation and use, and they need to detect patterns or find answers faster than ever before to drive business and detect risks,” said Richard Villars, vice president for Datacenter and Cloud research at IDC. “Solutions like BT Assure Analytics provide organizations with access to tools and skills that were once too complex and inaccessible for use outside BT’s own facilities. BT’s new technology transfer model makes it easier for customers to focus on improving security and business value, while BT focuses on technology adoption and operational efficiency.”

BT Assure Analytics uses the Cisco UC Gateway Services API via SecureLogix, which has integrated its voice policy and security applications with Cisco voice gateways. By building on the SecureLogix and Cisco tools, the service is able to access data and voice, whether SIP or TDM-based, in order to provide security services integrated on one platform, the Cisco ISR G2.

“BT Assure Analytics is a real game changer which will allow businesses to visualize their complex ‘Big Data’ as well as the diverse security threat spectrum of data and voice events,” added Jeff Schmidt, global head of business continuity, security & governance, BT Global Services. “It gives organizations fresh and unique clarity and allows them to rethink the risk they face in defending against new and sophisticated cyber threats.”

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...