Are you fit to resist today’s security threats?

With British Telecom’s Ethical Hacking services, you can find out just how well prepared your applications and network are to resist attacks.

July 24, 2015
Ethical hacking

With British Telecom’s Ethical Hacking services, you can find out just how well prepared your applications and network are to resist attacks.

BT can perform a vulnerability assessment of your applications, network, people, procedures, policies and may, on your request, exploit the identified vulnerabilities.

“This step, often called penetration testing or pentesting, is performed to demonstrate the consequences when these vulnerabilities were found and exploited by an attacker,” says BT.

Backed up by accreditation and standardized methodologies, BT can help to identify vulnerabilities in your applications, mobile devices, systems and the network that supports your business.

BT can review your current risks against your desired risk profile, and then provide a reliable, flexible road map that will help you manage your vulnerabilities.

“Our global Ethical Hacking capability with more than 20 years’ experience combines the vast knowledge and experience of our consultants with proven methodologies,” adds BT.

As a network operator, BT has specific and in-depth knowledge of network infrastructure devices.

The company’s own server and workstation platforms, mobile devices and applications are thoroughly tested by its Ethical Hacking capability before being deployed on BT’s own network infrastructure.

BT consultants hold industry certifications like CISSP, CISA, CISM, GPEN, CPTE, OSCP, OSCE, OSEE, OSWE, OSWP, CREST, CPTS, CCIE, LPT, PCI QSA, ECSA, CESG CHECK and CREST.

BT is also accredited for performing its professional services on a global scale by Lloyd’s Register Quality Assurance for the ISO9001:2008 quality management system.

“Holding the ISO9001 certification since July 2003 shows our long term commitment to continuously improve the quality of our services,” BT says.

Other relevant certification programs are CESG CHECK and the following CREST schemes: Penetration Testing and Simulated Target Attack & Response (STAR).

“We are one of the largest security and business continuity practices in the world, and one of only a few organisations providing integrated network and security solutions both commercially and technically,” the company adds.