Yvon Boutry 3

Opting for a coordinated approach to cybersecurity

To address cybersecurity challenges, it is now essential to adopt a comprehensive approach, as explained by Yvon Boutry, Security Team Leader at Proximus NXT. In practice, this means that the various areas of expertise need to work together to implement the most suitable solutions for each organization.

 

27/05/2025
Cybersecurity
Security, resilience, and data protection are now among the top priorities for business leaders. Ensuring oversight across all these areas, while IT environments become increasingly complex and threats continue to grow, remains a significant challenge.
"The world of cybersecurity has changed profoundly in recent years," comments Yvon Boutry, Security Team Leader at Proximus NXT. "Securing environments that are now distributed, with resources managed locally and others deployed in the cloud across multiple geographies, requires comprehensive and robust approaches. From infrastructure security to governance tailored to each company, including security management, operational monitoring, and incident response, security must be addressed in a coherent and coordinated manner."

Mobilizing the Right Expertise

Given this context and the stakes involved, it is important to rethink how security is managed, as well as the organization of the teams and services responsible for protecting a company’s digital assets. In this spirit, Proximus NXT has redesigned its entire service offering.

"Meeting security needs involves mobilizing a diversity of expertise and ensuring the different teams communicate," says Yvon Boutry. "Those responsible for infrastructure security must collaborate with teams that understand how attackers operate or exploit vulnerabilities. Solutions must comply with the regulatory requirements applicable to each client. Risk management, compliance, and governance specialists must be involved in defining the security policies implemented. By taking a holistic approach, we can better guide the client in their choices, ensuring data sovereignty while allowing access to advanced processing solutions."


A Comprehensive Support Approach

With unique cybersecurity expertise in Luxembourg, Proximus NXT supports companies in managing security holistically. "Our offering is structured around four complementary pillars to better assist our clients with these challenges," explains Yvon Boutry.

  1. Operational Monitoring
    "The Cyber Security & Intelligence Operations Center (CSIOC) ensures continuous 24/7 monitoring to anticipate, detect, and respond rapidly to cyberattacks. We rely on advanced technologies such as machine learning, automation, and threat intelligence to quickly detect anomalies in IT systems and significantly reduce the mean time to resolve incidents. The team also develops a deeper understanding of attack patterns and contributes to better risk prevention."
  2. Governance, Risk, and Compliance (GRC)
    A solid security approach requires identifying risks, implementing appropriate policies, and establishing governance to ensure a coherent strategy. "Our GRC experts help organizations implement a robust security approach and manage it effectively, contributing to continuous improvement of procedures and strengthening client resilience," adds Yvon Boutry.
  3. Design and Management of Secure Infrastructures
    Based on CSIOC insights and strategic recommendations, IT infrastructures can be secured. "We provide tailored global solutions, considering client constraints and regulatory requirements. With 32 infrastructure security specialists, our expertise covers network security, internet access, remote access, and storage systems. Through strong partnerships with leading technology providers, we design robust architectures and ensure optimal protection of sensitive business assets."
  4. Tailored Solutions and Data Sovereignty
    Proximus NXT’s support for data protection extends to implementing innovative cloud solutions. "Together with our partners, we develop unique solutions that provide clients with data sovereignty guarantees, as demonstrated by our implementation of Clarence. This approach allows companies to better control sensitive data in compliance with European directives such as NIS2 and DORA," explains Yvon Boutry.

Leveraging these four pillars, and by mobilizing expertise with an agile approach, Proximus NXT helps clients prevent risks and secure their environments in the most optimal way.

Photo Credit: ITnation - Michel Brumat

Contact us
Accueil
By submitting this form, I accept the Proximus NXT personal data protection
*required fields