Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies


These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.


Emerging technology strengthens defences

Dr Kenji Takahashi

VP, Innovation – NTT Security

Dr Kenji Takahashi is a global innovation visionary. For over 30 years, he’s successfully led global innovation projects in cybersecurity, cloud computing, and software engineering.

Follow on LinkedIn

Cybersecurity innovations for the future

Leaders should embrace innovative, emerging cybersecurity technology solutions, provided that they’re a good fit and deliver true value

Although innovation is by no means a new concept, over time it’s evolved to include more than just product and service innovation. It’s become a new way of thinking, working, and living, and a valuable means to accelerate an organisation’s digital transformation journey, ensuring they remain competitive in their marketplace.

Today, the ever-evolving threat landscape, and increasing compliance requirements and security risks are driving greater levels of cybersecurity innovation. More businesses are seeking to implement emerging solutions to bolster their cyber-resilience.

To illustrate this point, let’s create an analogy between an organisation’s technology environment and the automotive industry. Car manufacturers know that robust safety features are a major influencing factor when you’re purchasing a new vehicle. For this reason, they invest significantly in the latest innovative safety features. However, the risk factors associated with driving a car remain the same. Doing business on the Internet inherently involves risks, in the same way that driving cars on public roads does.

Legacy methods and tools require cybersecurity innovations

I believe that legacy methods and tools are still relatively effective at providing a solid foundation to help organisations mitigate the challenge of cybersecurity. Most attacks can be prevented with basic security controls. But tactics change, and malicious actors are constantly developing new attack methods.

Most attacks can be prevented with basic security controls. But tactics change, and malicious actors are constantly developing new attack methods. Read more @Dimensiondata Tweet this


Business leaders should ensure that their basic controls remain effective, but also embrace innovative solutions if they provide a good fit and deliver true business value. In addition, they should keep improving security capabilities for the following reasons:

  • As digital transformation accelerates within all industries, increasing business value is being created in cyberspace.
  • Cybersecurity is fundamental to winning your customers’ trust, and ensuring that your organisation’s reputation isn’t damaged as a result of a security breach.

It’s also important to remember that legacy methods and tools are only effective if they’re properly deployed and operated. Challenges associated with deployment and operation are escalating due to the increased complexity and size of organisations’ IT environments, as well as the shortage of skilled security experts. For these reasons, I believe that innovations in automated security operations will become ever-more critical.

Technology advances add to the complexity of managing cyber-risk

Ongoing digital transformation and advances in the Internet of Things technologies, blockchain, and cloud – which extend a business’ traditional security perimeters – are only increasing the pressure on, and the complexity facing, IT security teams.

In addition, according to Dimension Data’s Executive Guide to the NTT Security 2019 Global Threat Intelligence Report, new compliance regulations, and an increase in illicit coin mining, web-based attacks, and credential theft, have also emerged as new challenges to organisations over the last year, and will likely continue into 2019.

As attackers continue to expand and refine their tools and capabilities, NTT Security continues to hone the existing and emerging cybersecurity technologies that underpin our security services, and develop groundbreaking new cybersecurity innovations.

How is NTT Security looking to innovative solutions to address current and future challenges?

Dimension Data and NTT Security, along with our extended NTT affiliates, are seeking to push the boundaries of cybersecurity innovation. As a tier 1 backbone Internet carrier, we’re in a unique position to drive the development of these innovations, as we have the access required to analyse much of the traffic that flows across the Internet.

Let’s take a closer look at three of our most promising innovations and how they’re helping our clients to identify and mitigate threats more quickly, and make doing business across the Internet safer for everyone:

  1. Botnet monitoring and global backbone visibility
  2. NTT Security is leading the way in botnet detection by analysing our own substantial Internet backbone traffic and drawing on the power of machine learning. Our botnet monitoring capabilities can detect command-and-control (C&C)1 servers weeks before commercial vendors locate them. This enables us to identify attacks on clients’ Internet-connected devices in real time and help affected organisations react more quickly, minimising any disruption to their businesses. These C&C servers are subsequently added to NTT Security’s ‘blacklist’, where the threats are analysed in further detail.

    We’re also currently working on botmaster detection, which will ultimately provide us with the ability to ‘take down’ botnets. This will go a long way to giving organisations an additional layer of Internet security. We’ll be applying this innovation to bolster the existing threat intelligence capabilities we offer our clients, including threat intelligence services based on botnet analysis.

    Find out more about our botnet infrastructure detection capabilities here.

  3. Cyber Threat Sensor
  4. Our recently developed Cyber Threat Sensor provides location-agnostic, holistic, software-defined threat detection. Using software-defined networking (SDN) and container technologies, our Cyber Threat Sensor enables clients to orchestrate security features and define and enforce network policies across globally distributed edges in a flexible, timely, consistent, and centralised manner.

    While our current application of this innovation allows us to deliver a more streamlined Managed Security Service to our clients and make updates using containerised ‘all-in-one’ solutions, there are some exciting additional future use cases for the Cyber Threat Sensor. These include zero-touch deployment of security services to clients and/or to cloud environments, through integration with SDN technologies.

  5. San-Shi
  6. San-Shi enables the calculation and analysis of data, such as statistics, from multiple sources without the disclosure of any confidential information, through the use of end-to-end encryption technologies. It allows you to obtain, for example, the average blood pressure readings of patients from a number of different hospitals in a country or region, without any personal details pertaining to the patient being decrypted or revealed. San-Shi is currently the world’s fastest confidential computing technology available and it’s also natively compliant with strict compliance regulations.

    While this innovation is currently being used to securely analyse vast amounts of clinical data for medical research, we see the potential for it to be applied in a range of other areas, for example, privacy-protected analysis of consumer marketing data.

What’s the role of co-innovation in the world of cybersecurity?

Security is inherently an interdisciplinary practice, as it’s a common concern across all sectors . However, collaboration and the sharing of deep domain expertise in vertical industries is a fundamental requirement, if we want to accelerate our innovation efforts. For instance, expertise in industrial control systems is needed for operation technology security. In terms of research, security professionals need to unite and co-innovate with experts in other areas such as hardware device manufacturing, software engineering, mathematics, and human-centred design.

Security is inherently an interdisciplinary practice, as it’s a common concern across all sectors. Read more @Dimensiondata Tweet this

Security providers also need to co-innovate with their clients to help them solve real-world business challenges by leveraging intellectual property that can be re-used and, if necessary, customised in line with the organisation’s specific requirements.

Where to next?

Keeping an eye on and investing in cybersecurity innovations will ensure that you remain agile and that your business is geared to adapt to the ever-evolving threat landscape. But organisations who do so need to adapt and change their mindset. Security must be embedded into the business’ strategy upfront, not as an afterthought. I also recommend that business leaders establish DevSecOps processes that are focused on continuous improvement, and consider a ‘zero-trust’ security architecture on cloud-native environments, as their future reference architecture.

1Command and Control (C&C) are communications channels used by bots in a botnet to receive instructions.

Recommended for you

How we can help you

Two people sitting in a meeting

Cybersecurity Advisory

Get the insights and action you need to improve your security posture

Read more
A person standing on a cliff with a starry sky

Managed Security Services

Management and optimisation of your security infrastructure to shield and protect your data and applications no matter where they reside.

Read more

Get the Executive Guide to the NTT Security 2019 Global Threat Intelligence Report


By clicking submit below, you are agreeing to the Dimension Data Terms and Conditions and Privacy Policy