Home > ICT Solutions > Security > 360° Security

A 360 ° security approach protects you best

Below you will find more information about what our 360 ° security approach entails.

You will learn

  • the main threats
  • to protect the different layers in your IT infrastructure
  • which security activities you need to organize


Finally, we provide an overview of the security specializations at the Proximus Accelerators, the ICT ecosystem of Proximus.

The consequences of security problems

 

Risk factor 6

The average cost to repair the damage of a security leak is six times the cost of the investment in a security policy.

 

Below is an overview of the potential costs:

 

directe kosten

Direct costs

The money you lose after a phishing attack or theft, the buyout sum paid in case of ransomware, hardware and software replacements, damaged equipment, lost data, and fines to public authorities and customers.

indirecte kosten

Indirect costs

The costs of recovery and missed orders when your applications are down. In addition, the opportunity cost of lost working hours and communication with your employees and customers.

directe kosten

Functional damage

When your company is partially or fully at a standstill and your service is jeopardized. When your know-how and/or data is stolen and your competitive position is weakened.

reputatieschade

Reputational damage

When your name or that of your company is associated with weak management because of data theft, privacy leaks, services that are not delivered or negative presscoverage.

How do you view Security? A multi-level model

At the core of the model is your company with its people, processes and digital tools.

Around that there are a number of circles containing the elements from the context surrounding your company:

  • Technological trends which you are working with for your digitalization can entail risks and require changes to your security policy
  • New laws and standards which you need to comply with, e.g.: GDPR
  • All manner of cyber-attacks you have to prevent, detect and be able to respond to, and the points where hackers could enter.
  • A good insight into who is carrying out the attacks and with what motivation: money, causing damage, espionage, revenge, activism, etc.
  • And finally, the risks for your company. The '"what if...?" scenarios.
People, Technology, Process
Een meerlagig beschermingsmodel

What can you protect with technology?

All data traffic that you can screen technologically, must be screened. Such automation reduces your risks considerably.

Learn more about our 360° approach in our e-guide

Even though employees are only human and make mistakes. You must make them aware of the dangers. We come back to that in our 360° approach.

 

Secure the points of access to your data

 

Netwerk

 
 
Your network

Build a fence and gates for easy access.

Toestellen

 
 
Your devices

PCs, smartphones, printers, tablets, WiFi-access points, IoT devices.

Applicaties

 
 
Your applications

All software with access to your data and network.

E-mail

 
 
Your e-mail

The favorite vulnerability of cybercriminals.

A 360° approach: your best insurance

At the core is your company with your employees, their tools and the processes they follow.

Around the core there are four large bundles of activities:

  1. Predict: first cover your greatest risks, anticipate and make sure you continuously improve your basic protection.
  2. Prevent: the multi-level protection of your network, devices, e-mail and data.
  3. Detect: monitoring, and screening logs to find and report infections retroactively.
  4. Respond: analysis, system updates (patches) and your response to an incident.

Strategy as the final piece

Items that must certainly not be missing:

  • Project or program management, who follows up things?
  • Clear rules for data privacy & security
  • Security awareness for your employees
  • An eye on new laws and rules
  • Measurements: penetration tests, vulnerability assessments, etc.
  • (Re)evaluation of (new) risks

What can we do for you?

data privacy & security processen en policies

Security & Data Privacy: process & policies

  • Data mapping
  • Security assessment
  • Privacy audit
  • Compliancy (GDPR, NIS) 
  • Security awereness
  • Risk management
  • Data Protection Officer & Security Officer-as-a-service

data privacy & security processen en policies

Protect: network, devices, data & applications

  • Firewalls
  • Secure (remote) Network Access
  • Identity&Access Management
  • E-mail & application protection
  • Endpoint protection, incl. mobile & IoT
  • Data protection, data loss prevention

incident response

Incident response

  • Response readiness
  • Analytics & breach forensics
  • Quarantaining
  • (Data) Recovery
  • Evidence collection 

Get started, request your security assessment

The largest pool of security specialists

When other ICT companies come to follow a security course at the Proximus ICT Academy, you can argue that you are a leader in this field.

 

Our strengths

  • Proximus SpearIT: a security offering tailored to the needs of medium-sized companies, with attractive entry-level models which can gradually grow into a 360° approach.
  • Davinsi Labs: Specialist in Vulnerability Management, Security Information and Event Management (SIEM) and User Activity Monitoring (UAM).
  • Umbrio: Managing and protecting complex data streams such as those found on larger networks.
  • ProximusManaged Security Services, a collective name for services that can manage and support your IT security remotely.
  • Proximus ICT Academy: a comprehensive range of security training courses.
Proximus ICT Ecosysteem

Read more about IT security:

Scareware plays on a user's fear and ignorance.
/getmedia/5ea716fa-3bab-4aa8-9fcc-06b87aac6ab0/GettyImages-605695797.aspx?width=340&height=207&ext=.jpg
Have you addressed these 10 components in your security strategy?
/getmedia/f0cd8402-f7c7-407e-a004-907ef6e5e154/GettyImages-578578380_1.aspx?width=340&height=227&ext=.jpg
In more than half of attacks on Belgian businesses, cybercrime abused the confidence of employees.
/getmedia/499207ea-6f22-437e-af29-39a95cf5fc5a/GettyImages-817486390_9.aspx?width=300&height=168&ext=.jpg
Not only the big companies need to record their personal data processing activities.
/getmedia/b5d608bd-7345-4863-b3b3-ab93f454279b/GettyImages-876838166_paars.aspx?width=340&height=226&ext=.jpg
Loading
Contact