Slide 1

Slide 1 text

BT and Akamai Competitive Edge Track Day Wednesday 5 December 2018

Slide 2

Slide 2 text

Insert picture Agenda 08:30 – 09:00 Safety Briefing 09:00 – 11:00 Enjoy Morning Activities: Ariel Atom 3 and BMW M4 11:00 – 12:00 ‘Driving Secure Digital Innovation’ Seminar 12:00 – 12:30 Workshop Tour 12:30 – 13:30 Networking Lunch 13:30 – 15:30 Enjoy Afternoon Activities: F3000, JP-LM, and Karting 15:30 – 16:30 Afternoon Tea and Prize Giving 16:30 Close

Slide 3

Slide 3 text

‘Driving Secure Digital Innovation’ Seminar • Conor Quinn, BT • Peter Holgate, Akamai Technologies

Slide 4

Slide 4 text

British Telecommunications plc 2017 Security from BT Conor Quinn Security Sales Specialist

Slide 5

Slide 5 text

British Telecommunications plc 2017 Technology agnostic working with over 20 partners and 200 security vendors Why BT for Security We see millions of cyber attacks, and save thousands of global reputations We protect BT from over 125,000 cyber attacks a month 2,500 security practitioners Our cyber defence operations unit provides insight ahead of and during security incidents We monitor and manage over 100,000devices for BT and our customers in 180 countries Providing managed security services for over 1,700customers 14 follow-the-sun SOCs Over 108 registered patents and Over 109 security papers

Slide 6

Slide 6 text

British Telecommunications plc 2017 A view of security in 2020 We expect digital security demand to be shaped by a number of key trends. The overriding trend, which will drive all of the others, is the adoption of cloud services by enterprises. Adoption of cloud services and infrastructure Accelerated focus on compliance Virtualised security services become reality Cloud security and SaaS commercial models Integration of AI technologies delivered from cloud Integrated threat prevention Growth in mid-market demand • By 2020 over 25 per cent of enterprises will secure their IT architecture through cloud, hosted or SaaS security services • By 2020, over 50 per cent of all large IoT implementations will require cloud- based security services to operate within acceptable risks • By 2017, 70 per cent of enterprise security environments will use cognitive / AI technologies to help analysts deal with scale and complexity of cyber attacks • By 2018, 60 per cent of all advanced security analytics products will be delivered over the cloud as part of SIEM as Service offerings • By 2020, regulatory compliance, as part of critical infrastructure protection (CIP), will become the key driver pushing the demand for IoT security to $840 million

Slide 7

Slide 7 text

British Telecommunications plc 2017 How we can secure a digital enterprise A secure journey to the cloud Protect what matters most, regardless of location or device 1 Harness big data for actionable intelligence Use big data to spot, and take action quickly against, advanced threats 2 A trusted partner for GDPR and other compliance requirements Ensure your customer data and organisation are protected in line with regulations 3

Slide 8

Slide 8 text

British Telecommunications plc 2017 Infrastructure consultancy Ensure your core business operations are secure. Data security consultancy Keep your data protected from corruption and unauthorised access. Identity consultancy Protecting digital identities, so you know who is who and access to your resources is controlled. Governance, risk and compliance Ensuring people, process and technology are compliant. Cyber security consultancy Stay ahead of the changing cyber threat landscape. Security intelligence Providing improved visibility of the latest threats and the tools to respond. Managed security Integrated end-to-end managed services for essential security controls. Security consulting Advisory services, helping to translate business priorities into security strategy and operations. We have a market-leading security portfolio Our range of security consulting services includes: Our range of security services include:

Slide 9

Slide 9 text

© British Telecommunications plc 2018 Securing the digital possible Key criteria for portfolio inclusion is the ability for technology to secure our customers’ digital transformation Cyber assessment lab radar New technology evaluated via structured process Actively engaged in delivering to portfolio / protect BT Prospective capabilities on the horizon Key: Current priority themes are: identity, endpoint, secure browsing, automation / orchestration, advanced analytics, industrial control system, and blockchain Security strategy Embed and align product and proposition with market needs Staying ahead of the curve

Slide 10

Slide 10 text

WHY AKAMAI: The World’s Largest and Most Trusted Cloud Delivery Platform Peter Holgate, Major Account Executive @Akamai

Slide 11

Slide 11 text

The Internet is the backbone of your digital business AKAMAI — THE ENTERPRISE-CLASS INTERNET THAT ELEVATES YOUR BUSINESS ABOVE THE UNPREDICTABILITY AND INSECURITY OF CLOUD-BASED EXPERIENCE DELIVERY

Slide 12

Slide 12 text

The digital economy is transforming faster than ever, creating a world where everything is connected. THIS CALLS FOR A COMPLETE RETHINK OF HOW YOU ENGAGE YOUR CUSTOMERS

Slide 13

Slide 13 text

How do you deliver on such enormous expectations? You need a cloud delivery platform. • 100 percent uptime SLA • Resilient, predictable performance • Intelligent routing and acceleration • Layered, cloud-based security • Experience integrity

Slide 14

Slide 14 text

MEDIA DELIVERY Consumers expect flawless multi- channel digital experiences. Our next-generation CDN services deliver the highest quality media at scale. The Akamai Intelligent Platform. CLOUD SECURITY Protect against website, web app attacks, malware, phishing, data exfiltration, bots, DNS, and other advanced threats – keeping data safe. EXPERTISE 1,900+ experts ready to support you with strategic expertise, 24/7 proactive monitoring and responsive troubleshooting. WEB PERFORMANCE We give you the expertise and proven technology to provide the customers with consistent, fast, secure web experiences.

Slide 15

Slide 15 text

Accelerate online experiences, grow revenue and conduct business globally WEB PERFORMANCE Engage consumers with fast, personalized online experiences, enabling you to increase revenue opportunities, gain IT agility and scale globally.

Slide 16

Slide 16 text

Tools to tackle the most demanding digital platforms. • Insight into how your content, website and digital experiences are performing • Technology to maximize user experiences with faster performance and device-optimized content • Tools to validate the business impact of reliability and performance WEB PERFORMANCE

Slide 17

Slide 17 text

Our latest web performance products. Measure what matters WEB PERFORMANCE Differentiated web and mobile apps Correlate business and performance KPIs Prioritize efforts based on business impact Validate user experience improvements based on their behavior Automated acceleration, advanced caching & compression, and fast routing Built-in Mobile App performance Maximize uptime while reducing costs with global scale, reliability and offload Secure delivery of websites, apps, APIs Real-User Monitoring Mobile Performance Maximize media’s impact Media collections group & tag images, video Artistic transformations and auto- cropping Dynamic policies for app developers Interactive viewers with zoom and 360 spin Image Optimisation

Slide 18

Slide 18 text

Security that evolves faster than your attackers CLOUD SECURITY Protect websites and infrastructure without sacrificing performance for security.

Slide 19

Slide 19 text

Our latest Web security products. Security for business-critical applications CLOUD SECURITY Detect the most sophisticated bots Web Application Firewall Bot Management • Mitigate DDoS attacks • Protect websites and APIs from exploits • Gain real-time insight into evolving threats • Extend with client reputation, SIEM integration, and a managed services option • Detect even the most advanced bots • Protect sites and apps with behavioral analysis • Defend against credential stuffing • Manage bot activity from web scraping, to fraud, to the most advanced use cases

Slide 20

Slide 20 text

Our latest enterprise security products. Secure Access To All Enterprise Apps CLOUD SECURITY Proactively Prevent Malware Using DNS Secure Access Malware Protection • Provide clientless, app-specific access • Support RDP, SSH & HTTP apps on-prem and in the cloud • Leverage easy SSO, MFA & IDP integration • Get visibility with full access logging • Understand new threat vectors and DNS traffic patterns across the enterprise globally • Enforce acceptable Internet usage policy • Prevent DNS based data exfiltration, command & control callbacks, and access to malicious malware and phishing domain

Slide 21

Slide 21 text

Unmatched global service and support 1,900+ experts ready to support you with strategic expertise, 24/7 proactive monitoring and responsive troubleshooting. EXPERTISE

Slide 22

Slide 22 text

Who relies on Akamai to help grow and protect their digital businesses? • More than half of the Fortune 500 and Global 500 • All top 10 US TV networks • 19 of the top 20 social media platforms • 7 of the world’s 10 largest insurers • 9 of the top 10 global auto manufacturers • All top 20 US banks • All top 10 global software companies • All top 10 US magazine publishers • 9 of the 10 largest airlines in the world • 8 of the 10 largest global hotel chains • All top 10 US eCommerce companies • 7 of the world’s 10 largest newspapers • All top 10 US gaming companies • 18 of the top 20 asset managers • 13 of the top 15 global pharmaceutical companies

Slide 23

Slide 23 text

AKAMAI IS TRUSTED BY THE WORLD’S LEADING BRANDS.

Slide 24

Slide 24 text

The Internet is the backbone of your digital business AKAMAI — THE ENTERPRISE-CLASS INTERNET THAT ELEVATES YOUR BUSINESS ABOVE THE UNPREDICTABILITY AND INSECURITY OF CLOUD-BASED EXPERIENCE DELIVERY

Slide 25

Slide 25 text

Q&A