-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Private 5G
Our turnkey private 5G network enables custom-built solutions that are designed around unique use cases and strategies, and deployed, run and optimized through a full network-as-a-service model.
-
Managed Campus Networks
Our Managed Campus Networks services transform campus networks, corporate area networks and interconnected local area networks, and connect smart places and industries.
-
-
Services
Cloud and IT Infrastructure
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
Client stories
-
Penske Entertainment and the NTT INDYCAR SERIES
Together with Penske Entertainment, we’re delivering digital innovations for their businesses – including INDYCAR, the sanctioning body of the NTT INDYCAR SERIES – and venues such as the iconic Indianapolis Motor Speedway, home to the Indianapolis 500.
-
Using private wireless networks to power IoT environments with Schneider Electric
Our combined capabilities enable a secure, end-to-end digital on-premises platform that supports different industries with the benefits of private 5G.
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Global Data Centers
-
Services
Digital Collaboration and CX
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
Topics in this article
Securing your network is a challenging and ever-changing exercise. Adversaries constantly adapt and refine their attack methods and continue to find ways into many corporate networks, despite significant security investments and technological advancements.
So, how do you find a security partner that can rise above the hype and deliver the outcomes you’re after?
A former mentor once challenged me to reconsider my pitch after I completed an overview of a solution and its features and functions. I felt I’d articulated the solution effectively, but I’d neglected to ask any questions about how it might fit the needs of the client’s organization. My mentor asked me, “So, what would I get if I bought five pounds of that solution?”
Well, of course, the solution wasn’t sold by the pound, but his point was clear. All the effort describing the offering never translated into something meaningful to my client and, therefore, prompted him to consider a purchase. This important lesson in client-centricity has stuck with me over the years and is a constant reminder that value is more than just technology.
Find a partner who knows your stuff too
Partner relationships are critical as they help provide greater insights, visibility, education and direction around new threats in this dynamically changing security “playground”. Service providers are naturally pressured to outsell the competition and create offerings that address the changing threat landscape and differentiate themselves from their rivals.
But imagine you sit down with your service provider to discuss the next cybersecurity threat, market issue and the new hot technologies they’re selling. Terms like UEBA, XDR, SASE, SOAR and deception technology come up. They might deliver a solid pitch that thoroughly covers what their product or service can do and how it works. You’re certain that what they’re offering is incredibly smart – but there’s no clear articulation of why you need it and how it relates to what you’re trying to achieve as a business.
Furthermore, with what used to be a defined network perimeter now blurring, it’s likely you’re also making security investments to ensure that no new threats penetrate your network. Many businesses have made so many investments in this area that their IT and security teams are overwhelmed trying to coherently integrate these tools – potentially creating extra noise or increasing the chance of threats being missed.
If you’re unsure of what problem you’re trying to solve or what your precise needs are, a detailed consultative discussion is a good place to start. This will allow you to match the technology to both the problem and your desired outcome – and secure the correct level of investment.
Moreover, if you’re not explicit about the connection between your need and the new technology, it can lead to costly missteps both in terms of misplaced investment and business risk. A true partner should know your business intimately to ensure the right alignment of technologies and services that deliver outcomes without adding additional complexity to your security environment.
All you need is…
As mentioned, when engaging your partners, the discussion shouldn’t begin with the new technology but the outcomes you’re looking to achieve and a needs discovery. Needs include both organizational aspects (a company requirement to address a problem or opportunity) and functional considerations (operational processes or tasks – that is, what you need to deploy the solution).
Here’s an example of how a purchase can result in an ineffective outcome if it’s based on technology alone. A CIO is working with their preferred partner on a large-scale software deployment that was “needed” across all the organization’s business units. The investment exceeded US$1 million but, because this cost was within budget, the CIO cut the check. But unbeknownst to him, it turned out that the partner would need an additional US$3 million in professional services fees to effectively roll out the solution. None of the business units had additional budget to pay for the professional services, so the software ended up on the shelf and was never leveraged. An expensive lesson indeed.
What’s clear here is that the buyer’s desired outcomes were overlooked, and the focus was solely on the perceived attractiveness of the solution.
If quality time is spent working through the needs, outcomes, purchasing and deployment, you’re far more likely to be satisfied and see the return on investment you’re after. Furthermore, the chances are good that your partnership will emerge stronger than ever post-purchase.
Think five pounds
NTT DATA has deep skills and experience in security technologies and services that allow us to help our clients protect their organizations from the consequences of a security breach. The outcome is a team effort delivered through close cooperation between our R&D, product, operations and customer service teams – and critically, a solid partnership with our clients that includes a detailed upfront discussion about their desired outcomes and key needs.
It’s great if your service provider is proud of their offering, but make sure you both have a clear and common understanding of the outcome. So, don’t be afraid to challenge them. Ask what you’ll get for five pounds.
Read more about NTT DATA's cybersecurity solutions and move to real-time threat-prevention technology and services with advanced security across networks, clouds and data centers.