BT Security

BT logo
Address: BT Centre
81 Newgate Street
London
EC1A 7A
UK
137 Boulevard Voltaire
Paris 75011
France
Telephone: +31 6 5083 1181 +33 47215 5647
Email: [email protected] [email protected]
Website: https://www.globalservices.bt.com/en/solutions/products/security-ethical-hacking
Contact: Bas de Graaf
[email protected]
Damien Leduc

 

Address: Herikerbergweg 2
1101 CM Amsterdam
The Netherlands
Telecomlan 9
1831 Diegem
Belgium
Barthstrasse 4
80339 Munchen
Germany
Telephone: +31 6 5083 1181 +32 495 58 93 81 +49 40 6059 03040
Email [email protected] [email protected] [email protected]
Contact: Bas de Graaf Laurent De Vos Robert Bork

 

Address: 8951 Cypress Waters Blvd #200
Irving
Texas
TX 75019
USA
#08-51 UE Biz Hub East
8 Changi Business Park Avenue
486018 Singapore
Telephone: +1 530 409 8177 +65 9763 1270
Email: [email protected] [email protected]
Contact: Shawn Gustavel Sunny Tan

To assist our customers on a global scale, we have created a global Ethical Hacking capability.  This department, named Ethical Hacking Centre of Excellence (EHCoE), consists of highly skilled consultants all over the globe helping organisations protecting their information, assets and business reputation.  In fact, our dedicated EHCoE consultants have assisted many customers in financial institutions (insurance, (private) banking, leasing, payment service providers) and customers in the following markets:  healthcare, automotive, retail, electronics, software development, government, public transport, food, (application) service providers, construction, office products, petrochemical and refining industry, travel agencies and airlines.

Capabilities

Penetration Testing

Contact: Bas de Graaf
+31 6 5083 1181
[email protected]
https://www.globalservices.bt.com/en/solutions/products/security-ethical-hacking

How can we help you?

Backed by accreditation and a standardised methodology, our approach is simple and aims to answer the question – how secure are the critical systems that protect and grow your business?

We can help you identify vulnerabilities in your applications (both web and binary), mobile devices, systems and network infrastructure that support your business strategy.

Through a unique set of consultancy packages, we work with you to review your current risks against your desired risk profile, and then provide a reliable, flexible road map that will help you manage your vulnerabilities.

Working to fixed timescales and fixed costs, we produce deliverables that you can action quickly from web and mobile application testing, host configuration and firewall policy reviews, network testing (including wireless), red teaming (social engineering, physical security review, etc.), vehicle testing and secure code reviews.

CREST Qualified Consultants:
Practitioner Security Analysts:  No
Registered Penetration Testers:  Yes
Certified Web Application Testers:  No
Certified Infrastructure Testers:  Yes
Certified Wireless Testers:  No

Simulated Target Attack & Response (STAR) Penetration Testing

Contact: Bas de Graaf
+31 6 5083 1181
[email protected]

With BT’s simulated target attack and response service, our customers will benefit from a partner with enormous experience in penetration testing in the financial market with regards to critical network infrastructures, both wired and wireless, as well as all kinds of applications.  Our application experience includes fat client-server, web and mobile but also specific financial applications like ATMs, for example.  We also deliver other focused security assessments such as red teaming.

Our intelligence led approach for performing the simulated target attack and response service will help you to understand your current security posture and thus the risk profile of your business.  We then provide a reliable, flexible road map that will help you manage your weaknesses and control your risks.

CREST Qualified Consultants:
Certified Simulated Attack Managers:  No
Certified Simulated Attack Specialists:  No

Cyber Security Incident Response

Contact: Danny Porter
[email protected]

BT Assure Cyber capabilities:

CREST Qualified Consultants:
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No
Certified Incident Managers:  No

Simulated Target Attack and Response (STAR) Threat Intelligence

CREST Qualified Consultants:
Practitioner Threat Intelligence Analysts:  Yes

Security Architecture

CREST Qualified Consultants:
Registered Technical Security Architects:  Yes