Listing Thumbnail

    Security Advisory Services from BT: Cyber risk quantification with SAFE

     Info
    Sold by: BT 
    Visualise and quantify the cyber risk of your critical applications or assets across people, processes, and technology with cyber risk quantification with SAFE.
    Listing Thumbnail

    Security Advisory Services from BT: Cyber risk quantification with SAFE

     Info
    Sold by: BT 

    Overview

    Overview

    Cyber risk quantification with SAFE enables you to visualise and quantify the cyber risk of your critical applications and assets.

    Cybercriminals are increasingly evolving their attack methods, which can leave your organisation vulnerable and open to breach. Your estate will have differing risk vectors, depending on the mix of assets you have and how critical they are to your organisation. Being able to visualise and objectively measure the cyber risks across your estate, especially your critical assets and applications, will help you prioritise the most impactful security gaps and highlight where you need to take action in order to maintain a healthy security posture.

    SAFE enables you to predict cyber breaches in your environment while contextually aggregating signals from existing cybersecurity products, external threat intelligence and business context. We will assess the configuration and risk signals coming from your users and infrastructure to build up a real-time view of the risks and deliver a set of actionable insights. The outcome is a SAFE score which quantifies the breach likelihood of each assessed component, along with a figure representing the financial value of risk to your organisation.

    Benefits of cyber risk quantification with SAFE:

    • Enterprise-wide - Monitors your cyber risk posture across various technology stacks such as cloud workloads, apps, endpoints, databases etc consistently on the same scale of 0-5.
    • Objective - Quantifies the breach likelihood from a Bayesian network incorporating data of open gaps, business context and external threat intelligence and then derives the financial value of risk to your organisation.
    • Integrated - Quantifies risk across people, processes and technology together along with incorporating risks from the third party organisations in your supply chain.
    • Real-time - Assesses your cyber risk posture using signals from your existing cybersecurity products and SAFE’s own scanners, providing a real-time view of the risk.

    Deliverables

    You will receive:

    • a number of different options for access to a dashboard and visualisation tool to present and identify risk scores across the process, people and technology elements of your organisation.
    • detailed reports and visualisations into the findings and areas for improvement.
    • a set of recommendations on how to mitigate or close gaps in your risk control strategy.
    • options for continued ongoing assessment and support in resolving items found in the report or areas for concern.

    *This service can include an assessment of the security posture within your AWS environment.

    For this service, BT partners with SAFE Security. We can also resell the SAFE cyber risk quantification platform should you like to own your own instance.

    Highlights

    • Monitor, quantify, and report breach likelihood - SAFE measures the effectiveness and transparency of your cyber risk management by integrating technical cybersecurity signals, external threat intelligence, and the business context of what and where are the ‘weakest links’ across people, process, technology, and third party
    • Human risk and insider threats - Re-engineer your employees' cyber consciousness by continuously monitoring their cybersecurity awareness, behaviour, mobile devices, deep and dark web exposures, and more. SAFE offers mobile and web-based applications to engage with every employee making cybersecurity learning a customised and engaging experience while assessing their readiness.
    • Third party risk management - SAFE provides you with the visibility into your third parties’ cyber risk posture so that informed business decisions like vendor onboarding, M&A, sensitive data sharing, etc., can be made. By following this 360-degree approach of third party risk, you can reduce the likelihood of operational failures, data breaches and vendor bankruptcy.

    Details

    Sold by

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Please contact our sales team to discuss the service in more detail via the following email: security.advisory.services.uk@bt.com 

    For more details on Security Advisory Services from BT: