-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Nutzen Sie unsere Fähigkeiten, um die Transformation Ihres Unternehmens zu beschleunigen.
-
Services
Network-as-a-Service
Beliebte Produkte
-
Private 5G
Unser Cloud-nativer Secure-by-Design-Ansatz gewährleistet eine 24/7-Überwachung durch unsere Global Operations Centers, die Ihre Netzwerke und Geräte auf einer „As-a-Service“-Basis verwalten.
-
Verwaltete Campus-Netzwerke
Unsere Managed Campus Networks Services transformieren Campusnetzwerke, Unternehmensnetzwerke sowie miteinander verbundene lokale Netzwerke und vernetzen intelligente Orte und Branchen.
-
-
Services
Cloud and IT Infrastructure Services
-
Client stories
-
Penske Entertainment und die NTT INDYCAR SERIES
Gemeinsam mit Penske Entertainment liefern wir digitale Innovationen für ihre Unternehmen, darunter INDYCAR, die Genehmigungsbehörde der NTT INDYCAR SERIES, und Veranstaltungsorte wie der legendäre Indianapolis Motor Speedway, die Heimstätte eines der berühmtesten Sportereignisse der Welt, des Indianapolis 500.
-
NTT and Schneider Electric join forces to power IOT environments
Our combined capabilities enable a secure, end-to-end digital on-premises platform that supports different industries with the benefits of private 5G.
-
-
Services
Technology Solutions
Client stories
-
Services
Global Data Centers
-
Services
Digital Collaboration
IDC MarketScape: Anbieterbewertung für Rechenzentrumsservices weltweit 2023
Wir glauben, dass Marktführer zu sein eine weitere Bestätigung unseres umfassenden Angebotes im Bereich Rechenzentren ist.
Holen Sie sich den IDC MarketScape -
-
Erkenntnisse
Erfahren Sie, wie die Technologie Unternehmen, die Industrie und die Gesellschaft prägt.
-
Erkenntnisse
Ausgewählte Einblicke
-
Die Zukunft des Networking
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
So funktioniert Zero-Trust-Sicherheit für Ihr Unternehmen
Sorgen Sie dafür, dass Zero-Trust-Sicherheit für Ihr Unternehmen in hybriden Arbeitsumgebungen funktioniert.
-
-
Erkenntnisse
Copilot für Microsoft 365
Jeder kann mit einem leistungsstarken KI-Tool für die tägliche Arbeit intelligenter arbeiten.
Copilot noch heute entdecken -
-
Lösungen
Wir helfen Ihnen dabei, den Anforderungen an kontinuierliche Innovation und Transformation gerecht zu werden
NTT DATA von Gartner als ein Marktführer eingestuft
NTT DATA ist einer von 17 globalen Anbietern von Managed Network Services, die im Gartner® Magic Quadrant™ Managed Network Services 2023 aufgeführt sind.
Holen Sie sich den Gartner-Report -
Erfahren Sie, wie wir Ihre Geschäftstransformation beschleunigen können
-
Über uns
Neueste Kundenberichte
-
Liantis
Im Laufe der Zeit hatte Liantis, ein etabliertes HR-Unternehmen in Belgien, Dateninseln und isolierte Lösungen als Teil seines Legacysystems aufgebaut.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
Neueste Kundenberichte
-
Liantis
Im Laufe der Zeit hatte Liantis, ein etabliertes HR-Unternehmen in Belgien, Dateninseln und isolierte Lösungen als Teil seines Legacysystems aufgebaut.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
NTT DATA und HEINEKEN
HEINEKEN revolutioniert die Mitarbeitererfahrung und die Zusammenarbeit mit einem hybriden Arbeitsplatzmodell.
Lesen Sie die Geschichte von HEINEKEN -
- Karriere
Topics in this article
Cyber criminals are looking at taking advantage of the gaps in security in a work from home situation. Here is what to watch out for and protect your organization.
As the threat of coronavirus continues to spread, businesses are sending employees home to work remotely and students are moving to online classes. However, as organizations rush to shift their businesses and classes online, cybercriminals are ramping up their tactics to take advantage of those who may have inadequate or naive security postures.The scale of attacks can be seen from the following statistics. Google recently said that it was blocking more than 18 million Covid-19 related spam mails on a daily basis. A recent VMware-Carbon Black report found out that ransomware attacks went up 148% – a significantly higher number compared to numbers in February, as more firms shifted to remote or work from home. Hackers have been using every tool in their arsenal – from fake apps to phishing emails to trojans, to trap unsuspecting people.
As the threat landscape has grown exponentially, organisations have a challenging task to ensure robust security in a world that doesn’t have any perimeters.
We recommend the following best practices to protect your organization:
- Enable secure access to corporate applications and data: Organizations must adopt a zero trust secure access approach, that is,a ‘verify first, trust later’ approach. A zero trust framework provides authenticated users access to only those corporate applications to which they are authorized to access while also checking for security at the device level. It replaces network level access with case by case, custom, application level access. Zero trust also means that one moves away from opening the VPN traffic flow from the outside to the inside and shift to a traffic flow that requires the firewall to close all incoming ports while opening only outgoing ports. This in effect plugs the holes in your firewall.
- Documented policy for WFH: As working from home (WFH) is a new phenomenon, there aren’t many guidelines. For this reason, organizations must create a clear documented WFH policy, and educate staff on the critical need to protect data. This can be provided in the form of a basic guide, weekly or daily updates and constant reminders to regularly update security patches on their laptops or home computers. Employees must also be educated to avoid communication on unsecured communication channels or social media.
- Ensure secure collaboration channels: Popular collaboration and meeting platforms such as Zoom have seen hackers take control of lack of user knowledge about security settings. For example, organizations can use the waiting room option so that participants can't join until the meeting is officially open. There are also options for blocking file sharing and private chat.
- Educate staff on importance of secure WiFi network: A secure WiFi connection is a must. Make sure that the staff is educated to configure home routers for security settings (for example, WPA2) and that all the default credentials are changed.
- Maintain end point security: Even a single infected machine can end up infecting the whole network. Organizations must try to maintain end point security by ensuring that client machines must have hygiene implemented such as patching, privileged ID management and device hardening. Organizations should deploy cloud-based EDR solutions that enable identification of advanced malware and file-less threats before they're able to damage the end point device or spread laterally into the network.
- Monitor the external environment: Increased remote working tends to increase risk of data leakage and shadow IT sprawl. External threat monitoring is required to ensure that your assets, data or brand aren’t being targeted or used in the public domain. This can take multiple forms and generally falls into three categories: the deep/dark/surface web monitoring, brand monitoring and infrastructure monitoring. This helps cover any residual risks left over after implementing all controls necessary for remote access and working.
These methods must be combined with overall security monitoring efforts performed through the SOC. The output of these controls should be fed into the SOC to enable an efficient detection and response to threats targeting the organizations.
In the future, the WFH situation may well become the norm rather than the exception. For this reason, organizations would do well to prepare themselves for this new world through a holistic WFH policy that ensures robust security of data, assets, brand and communications.