
Zero Trust
NTT DATA provides end-to-end services of Zero Trust, including policy formulation, implementation, and security operation and improvement, based on our rich global implementation experience.

Start Your Zero Trust Journey with NTT DATA
NTT DATA has the deep industry expertise and market-leading technologies to help you build and realize your vision of cybersecurity with Zero Trust. Partner with NTT DATA to benefit from agnostic and unbiased recommendations on your Zero Trust journey.
We will help you explore key considerations that need to be addressed and itemize initiatives based on criticality. Our holistic view of what others are facing across industries and against countless use cases helps ensure that your plans are future-ready.
NTT DATA Making Zero Trust Real
Leading experts on cybersecurity and information security at NTT DATA, Hiroshi Honjo and Steve Williams, share their learnings from NTT DATA’s implementation of Zero Trust and why Chief Information Security Officers (CISOs) must look to Zero Trust as the means to not only secure their business but also to continue earning the trust of their clients and customers.
Watch the video to learn how your organization can gain the benefits through implementing a Zero Trust framework.
Benefits of Zero Trust Model
Implementing Zero Trust requires a cultural change but brings many benefits including:
- Optimized vendor relationships and reduced training and license costs by leveraging a common set of technology
- Decreased security vulnerabilities by leveraging a common global security framework
- Cost reduction and optimization through standardization
- Cost and risk reduction through automation
- Decreased support costs and help-desk tickets
NTT DATA Making Zero Trust Real (10:40)
Meet Our Experts

Steve Williams
Enterprize Chief Information Security Officer, NTT DATA Services

Hiroshi Honjo
Head of Digital Growth, NTT DATA's Global Innovation Headquarters in Tokyo
NTT DATA’s Zero Trust Architecture
NTT DATA made a head start in the completion of a Zero Trust architecture. The leading principle of Zero Trust is “Never Trust, Always Verify”. Zero Trust is composed of various elements necessary for a reliable security framework. NTT DATA will provide a full range of end-to-end security services from consulting to implementation and managed services of Zero Trust combining multiple services of our portfolio and the know-hows that we have obtained through years of experience.

Identities represent people, services, or devices and the most important control point. We provide meticulous administration and precise control over user identities and access privileges to ensure secure and authorized access with an end-to-end approach.








Data flows to various endpoints once access is granted: corporate-managed, IoT, smartphones, BYOD, and partner-managed. We revolve around the specialized safeguarding and fortification of various endpoints with antimalware protection.








Network controls enhance visibility and prevent lateral movement for data access. We support the identification, protection, detection, response, and recovery of an organization’s network infrastructure from various cyber threats and potential risks.












Apps and APIs enable data consumption, varying from legacy on-premises to cloud-native ones. We offer specialized measures for assessing, enhancing, and safeguarding software applications, from web application firewalls.







Data should be safeguarded even when it leaves controlled devices, apps, infrastructure, and networks. We implement best practices, encryption, access controls, and monitoring to protect sensitive data information.





Organizations face the challenge of limited quality security resources and need efficient security solutions to enable faster threat identification and resolution. We offer a comprehensive suite of capabilities, including SIEM integration, SOAR optimization, and real-time continuous monitoring.




Security governance is essential for the Zero Trust architecture, serving as its foundation. Cutting-edge technology alone won't maintain it. We help effective global governance including establishing rules, ensuring compliance, and training people.

We can design and build a Zero Trust architecture tailored to the customer's environment with an alignment of cybersecurity, corporate, and IT strategies.
Success Stories and Latest Insights
Success Stories
Read how companies in various industries solved their challenges by partnering with NTT DATA.

NTT's Contribution to Olympic and Paralympic Games Tokyo 2020
NTT Corporation, as a Olympic and Paralympic Games Tokyo 2020 Gold Partner, provided telecommunications services, network security for telecommunication services and various cybersecurity measures and contributed to the stable operation.
READ THE NEWS

One-Stop Support of Global Governance Structure for a Global Manufacturer Group
NTT DATA helped a global manufacturer with 15 group companies with rougly 30,000 employees around the world and provided a one-stop support from consulting, and implementation to operation of Zero-trust security architecture.
READ THE STORY

Managing the Detection and Response Service for a Tobacco Giant
NTT DATA worked with a global tobacco giant to evolve their threat management capabilities and implemented a next generation SIEM with zenSIEM and zenSOC.
READ THE STORY

Incident Response and MDR Service for Operational Technology
NTT DATA helped a leading manufacturer of construction materials recover a ransomware attack by providing a local incident response service and implementing a threat detection solutions, such as Fortigate and FortiEDR.
READ THE STORY

Monitoring and Incident Response for a Railway Company
NTT DATA helped a leading railway provider after a severe security incident by providing services in monitoring and incident response, digital forensics and threat hunting and establishing a mid/long-term security improvement plan.
READ THE STORY

NTT DATA’s Security Journey: “ZEN Project”
NTT DATA Group has over 140,000 employees in 55 countries, and its group companies had different levels of security protection. The group modernized its security governance with a model based on Zero Trust, global governance, and SOC.
READ THE STORY
Global manufacturer group
One-stop support for global governance structure
- Business need:
-
Standardization and implementation of global group information security management were the prerequisites for the client to boost the business globally.
- Information security was perceived to be one of the major risks in accelerating the business globally, as information security incidents could disrupt business and damage the brand of the client Group.
- However, there were no global standards or security infrastructure to defend the Group from threats, nor were there communication routes between the HQ and the global group companies to promote security and compliance.
- Due to the lack of security human resources, the client Group was outsourcing security consulting, implementation, and operation to multiple companies. However, they needed to manage them together from just one outsourcing company.
- Outcomes:
-
- Implemented global governance structure, information security policy and standard, and security assessment process to maintain and improve the security of 15 group companies with roughly 30,000 employees all over the world.
- Deployed standard security infrastructure (EDR, SIEM/UEBA, Cloud Proxy, CASB, and SOC) for several group companies after a thorough ROI evaluation.
- Improved maturity scores based on NIST Cybersecurity Framework after 2 years
- Solution:
-
Provided one-stop support from consulting, and implementation to operation of Zero-trust security architecture.
- Consulting
-
- Security and risk assessment on the client’s global group companies
- Issue identification and improvement plan formulation
- Governance and technical architecture design
- Implementation
-
- Plan, design, and implement of transfer from the existing environment to Zero-trust security architecture.
Tools to enable Zero-trust - EDR (CrowdStrike), SIEM/UEBA (Exabeam), Cloud Proxy (Zscaler), SOC
- Plan, design, and implement of transfer from the existing environment to Zero-trust security architecture.
- Operation
-
- 24/7 SOC operation to support detection, response, and recovery
NTTDATA Managed Detection and Response Service
Managing the Detection and Response services for a global tobacco giant, with locations around the world.
- Business need:
-
- The client needed to evolve the Threat Management capabilities by entrusting the detection and management of security events to an external provider.
- Starting from an old generation SIEM (200 GB per day collection) and an internal team managing events in the different vendor consoles (no technology continuity), the customer needed to implement a Next Generation SIEM, with specialized monitoring services
- Outcomes:
-
- Customer was able to delegate the monitoring activity and to extend by 5 times the visibility on logs
- Increased ability to detect threats, with high-level risk evaluation during periodic meetings with CISO
- Collection and analysis of logs generated by over 70.000 endpoints, distributed around the globe.
- 1 Terabyte per day log volume managed by NTT DATA zenSIEM manages.
- About 100 incidents per month were identified by the monitoring service.
- Multi-Language service and support (English and Japanese)
- Solution:
-
- NTT DATA zenSIEM provides a fully managed solution for collecting, analyzing, and reporting of threat data.
- NTT DATA zenSIEM is monitored by zenSOC analysts 24/7, with continuous improvement in detection techniques.
- The MDR services are complemented with a SOC staff augmentation that increases the internal capabilities for incident response.
OT Incident Response and MDR Service for OT
Customer is a leading manufacturer of construction materials for interior design, building insulation, and design ceilings. Customer plants across the globe produce state-of-the-art drywall systems, plasters, and insulating materials as well as external thermal insulation composite systems.
- Business need:
-
- After a Ransomware attack 253 plants of the customers were disconnected with unknown security status
- Customer needed a global partner for incident response in 68 countries with local capabilities to support plants on-site
- The security of all plants should be improved immediately with OT threat detection, OT EDR, and OT network segmentation as baseline measures
- In a second phase the customer requested a global MDR service for OT incl. threat detection, endpoint security, and virtual patching on network devices
- Outcomes:
-
- NTT DATA provides local incident response service for all plants
- Plants were prioritized based on business needs
- Main sites were back online and secured within two weeks
- Rollout of EDR solution for 253 sites was finished within 4 months
- Threat detection rollout was finished within 6 months
- Network segmentation and improvements are an ongoing project
- All new solutions are part of a global OT MDR service
- NTT DATA was able to finish the service transition for this customer within 4 weeks after the attack
- Solution:
-
- The solutions include Fortigate, FortiEDR, Claroty Threat Detection
- The installation is one of Claroty largest implementations globally
- NTT DATA provides also global project management
- Transition to 24/7 proactive management and monitoring
- Setup of all needed MDR processes on the customer site
Monitoring and Incident Response for a Railway company after severe Incident
Leading railway provider company
- Business need:
-
The client reported an emergency that affected their infrastructure and was putting their OT/IoT systems at risk, which manage critical infrastructure at a national level.
The attackers compromised the infrastructure, moved laterally, installed backdoors on multiple systems, and deployed ransomware over their internal infrastructure.
The client also feared the risk of sensitive information theft and the risk of attackers attempting to sell it.
- Outcomes:
-
Two teams were set up to coordinate the resolution:
- 24/7 Monitoring and Incident Response team, deploying temporary agents and providing coverage for their infrastructure, including uncatalogued assets.
- Digital forensics team, investigating the incident and determining the origin of the infection, which compromised the Active Directory and servers.
- Threat Hunting team monitored the Dark web and environments finding no trace of client information being sold.
- Solution:
-
Due to the complexity of the incident, several lines of work were defined:
- Maintained 24/7 Monitoring and Incident Response to ensure follow-up attacks were detected and stopped.
- Design and deployment of a new Active Directory infrastructure.
- Hardening critical systems and servers
- Establish mid/long-term plan of security improvements in all systems, traditional and OT/IoT.
NTTDATA Security Journey “ZEN Project”
Security Governance for 140k employees across 55 countries.
- Business need:
-
- NTT DATA Group has approximately 140k employees across 55 countries.
- NTT DATA has and continues to grow through acquisition. Each NTT DATA acquisition and geography had a different level of security protected with multi-layered perimeter security.
- Outcomes:
-
- Modernized - Transformed model based on Zero Trust
- Optimized vendor relationships and reduced training and license cost by leveraging a common set of solutions
- Decreased security vulnerabilities by creating a common global security strategy and framework
- Cost reduction and optimization through standardization using NIST Cybersecurity Framework across all businesses
- Cost and risk reduction through automation
- Decreased support costs and helpdesk tickets
- Solution:
-
- Zero Trust: Create a standard reference architecture built on a zero-trust framework to enable transformation
- Global Governance & SOC
- NTT DATA manage security incidents globally in 6 SOC center monitoring and handling 170 billion events per month 24/7
- Of the 630 million emails received yearly in Japan, 230 million emails per year are detoxified as suspicious emails
- Implement SOAR solution and success in automating security operations
Latest Insights
Read our latest insights on Zero Trust-related topics from around the world.

Zero Trust: Your Digital Transformation Requires a Risk Transformation
A parallel cybersecurity strategy is required to modernize your technology landscape to combat a corporate firewall no longer protecting your data and users. While the cloud can provide unsurpassed agility, it can also expose new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.
DOWNLOAD (PDF: 839KB)

Cyber Without Perimeters: Getting Your Zero Trust Journey with Identity
We explore the identity-based zero-trust approach in detail and provide a maturity assessment framework to help enterprises understand their current position and how they can progress in their zero-trust journey. Additionally, the report highlights the benefits of zero trust, such as improved employee experience, reduced legacy technical debt, decreased third-party risks, and improved compliance.
DOWNLOAD (PDF: 1.6MB)
Zero Trust Services in Your Country
We provide our zero trust services in the following countries. Follow the link to find out what specific services are available in your country.
NTT DATA Services
NTT DATA EMEAL
NTT Ltd.
NTT DATA
For Other Services
Select a country below to explore other services and solutions available in your country.
SELECT A COUNTRYWebinar
Register for future webinars or watch the past webinar archive videos to gain insights on zero trust and cybersecurity. To watch the past webinar archive videos, you will first need to register with BrightTALK.
More Stories from Our Blogs
Read our latest thinking, case studies, success stories, and more on our global blog, NTT DATA Focus, and on blogs in various countries.

8 Critical Areas for Your Next CIAM Implementation
READ THE ARTICLE

Evolving Security to Meet the Challenges of the Cloud, Part 2
READ THE ARTICLE

Evolving Security to Meet the Challenges of the Cloud, Part 1
READ THE ARTICLE

Best Practices for Identity and Access To Enable Zero Trust
READ THE ARTICLE

Implement Conditional Access to support Zero Trust Architecture
READ THE ARTICLE

NTT DATA’s identity journey towards Zero Trust
READ THE ARTICLE

NTT DATA’s Zero Trust Journey, Part Two: NTT DATA’s Zero Trust Architecture (and What We’ve Learned)
READ THE ARTICLE

NTT DATA’s Zero Trust Journey, Part One: Blazing the Trail
READ MORE