Opting for a coordinated approach to cybersecurity
To address cybersecurity challenges, it is now essential to adopt a comprehensive approach, as explained by Yvon Boutry, Security Team Leader at Proximus NXT. In practice, this means that the various areas of expertise need to work together to implement the most suitable solutions for each organization.
Mobilizing the Right Expertise
Given this context and the stakes involved, it is important to rethink how security is managed, as well as the organization of the teams and services responsible for protecting a company’s digital assets. In this spirit, Proximus NXT has redesigned its entire service offering.
"Meeting security needs involves mobilizing a diversity of expertise and ensuring the different teams communicate," says Yvon Boutry. "Those responsible for infrastructure security must collaborate with teams that understand how attackers operate or exploit vulnerabilities. Solutions must comply with the regulatory requirements applicable to each client. Risk management, compliance, and governance specialists must be involved in defining the security policies implemented. By taking a holistic approach, we can better guide the client in their choices, ensuring data sovereignty while allowing access to advanced processing solutions."
A Comprehensive Support Approach
With unique cybersecurity expertise in Luxembourg, Proximus NXT supports companies in managing security holistically. "Our offering is structured around four complementary pillars to better assist our clients with these challenges," explains Yvon Boutry.
- Operational Monitoring
"The Cyber Security & Intelligence Operations Center (CSIOC) ensures continuous 24/7 monitoring to anticipate, detect, and respond rapidly to cyberattacks. We rely on advanced technologies such as machine learning, automation, and threat intelligence to quickly detect anomalies in IT systems and significantly reduce the mean time to resolve incidents. The team also develops a deeper understanding of attack patterns and contributes to better risk prevention." - Governance, Risk, and Compliance (GRC)
A solid security approach requires identifying risks, implementing appropriate policies, and establishing governance to ensure a coherent strategy. "Our GRC experts help organizations implement a robust security approach and manage it effectively, contributing to continuous improvement of procedures and strengthening client resilience," adds Yvon Boutry. - Design and Management of Secure Infrastructures
Based on CSIOC insights and strategic recommendations, IT infrastructures can be secured. "We provide tailored global solutions, considering client constraints and regulatory requirements. With 32 infrastructure security specialists, our expertise covers network security, internet access, remote access, and storage systems. Through strong partnerships with leading technology providers, we design robust architectures and ensure optimal protection of sensitive business assets." - Tailored Solutions and Data Sovereignty
Proximus NXT’s support for data protection extends to implementing innovative cloud solutions. "Together with our partners, we develop unique solutions that provide clients with data sovereignty guarantees, as demonstrated by our implementation of Clarence. This approach allows companies to better control sensitive data in compliance with European directives such as NIS2 and DORA," explains Yvon Boutry.
Leveraging these four pillars, and by mobilizing expertise with an agile approach, Proximus NXT helps clients prevent risks and secure their environments in the most optimal way.
Photo Credit: ITnation - Michel Brumat