SHARE
Facebook X Pinterest WhatsApp

BT Security and Risk Management: MSSP Overview and Analysis

See our complete list of top managed security service providers Company Description BT Security builds on the London-based company’s 70 years of experience as a service provider. The company operates in more than 180 countries and supports some of the world’s largest companies, from financial institutions to pharmaceutical firms. It offers a team of more […]

Written By
thumbnail Drew Robb
Drew Robb
May 17, 2018
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

See our complete list of top managed security service providers

Company Description

BT Security builds on the London-based company’s 70 years of experience as a service provider. The company operates in more than 180 countries and supports some of the world’s largest companies, from financial institutions to pharmaceutical firms. It offers a team of more than 2,500 experts and 15 security operations centers (SOCs). BT has four European SOCs, one North American SOC and three Asia/Pacific region SOCs providing 24/7 service, plus an additional seven non-24/7 SOCs worldwide.

Service Description

BT offers next-generation firewalls (NGFs), intrusion detection and prevention systems (IDPS), unified threat management (UTM), secure Web gateway (SWG), managed distributed denial of service (DDoS) protection, endpoint protection, application security, network access control, public key infrastructure (PKI) security, vulnerability scanning, patch management, email security, threat monitoring and intelligence, security information and event management (SIEM), and more. It has an incident response partnership with Mandiant, as well as partnerships with Trend Micro’s Deep Security and Symantec SSL decryption.

“BT Cyber Security uses machine learning to minimize false positives and reduce the time from detect to remediate dramatically – analysts can move from detection to mitigation within two minutes,” said David Stark, vice president of BT Security Portfolio.

Markets and Use Cases

BT serves companies and governments in the UK, Europe, the Americas and Asia, the Middle East and Africa (AMEA), providing both managed security and security intelligence. It also offers services for large and mid-size national corporations in the UK. It focuses on helping customers implement security for cloud services. It also serves small and medium-sized businesses.

Metrics

BT’s security team protects its operations and customers in 180 different countries from more than 4,000 cyberattacks a day against its network.

Delivery

All manner of delivery models, but primarily cloud or appliance based.

Intelligence

BT has 15 global SOCs that provide threat intelligence:

  • 4 in AMEA — Gurgaon, Kolkata, Mumbai and Sydney
  • 7 in Europe — Budapest, Paris, Skelmersdale, Sevenoaks, Frankfurt, Madrid and Milan
  • 3 in North America — New Jersey, California El Segundo and Virginia
  • 1 in South America — Sao Paolo

BT Cyber Operations provides shared and customer-dedicated SOCs globally. This includes dedicated centers for specific government and British Ministry of Defense contracts, large financial services customers and a contract providing cybersecurity services to a nation state.

Pricing

Average pricing ranges from tens or hundreds of dollars per month for cloud-based security or small-business scale appliance management, to multi-million-dollar outsourcing contracts.

Analyst View

BT is a Leader in IDC’s 2017 Worldwide MSS Marketscape. IDC said BT has made strides in addressing enterprise cloud migration challenges. It provides guidance that leverages BT’s cloud partnerships and other vendor technologies.

Gartner positioned BT in the Challengers quadrant due to the strength of its global capabilities, focus on network-based security event monitoring and variety of partnerships with security technology and service vendors. Gartner said, however, that buyers seeking endpoint, platform and application security event monitoring may require customized services.

thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

Proxy vs VPN: Which One Do You Really Need?
Matt Gonzales
Sep 24, 2025
5 AWS Security Tools Every Team Should Know
Matt Gonzales
Sep 24, 2025
The 6 Best Email Security Software & Solutions (Compared and Reviewed)
Matt Gonzales
Sep 24, 2025
5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.