Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:17 PM
Dark Reading
Dark Reading
Products and Releases

Integralis Completes Name Change To NTT Com Security

Will continue promoting its portfolio of managed security, business infrastructure, consulting, and technology integration services

ISMANING, Germany, October 28, 2013 /PRNewswire/ --

NTT Com Security AG, a provider of global information security and risk management solutions, today announced that Integralis has formally changed its name to NTT Com Security [http://www.nttcomsecurity.com ] after the initial intention was announced earlier in June this year.

Today's news formally confirms that NTT Com Security has replaced Integralis and Secode and that it will continue promoting its portfolio of managed security, business infrastructure, consulting and technology integration services through its WideAngle brand.

This latest move is a natural progression for NTT Com Security to bring both the previous Integralis and Secode organisations within one corporate structure. The name change reflects NTT Com Security's intention to continue expanding its security capabilities to service global customers, which will mean ongoing investment into products, platforms, services as well as improved career opportunities for its employees. Initial feedback from customers, partners and industry analysts also indicated that this move will help better leverage the strength of NTT's identity in the global market.

Simon Church, CEO at NTT Com Security, said: "The name change makes good business sense and better aligns us to one of the world's largest companies and biggest brands. We remain 100% focused on information security and risk management and while other acquisitions throughout our industry have lost some of their identity and expertise, we continue to have the opportunity to become our industry's next powerhouse. As NTT Com Security, we are able to engage with customers at all levels across the globe to deliver a clear and consistent message that represents the core of the business and the value we can bring to our customers."

The change in name from Integralis to NTT Com Security does not involve any change in ownership of the organisation. With the exception of setting up NTT Com Security in Japan, there are no management or other operational changes planned. NTT Communications Group still owns approximately 80% of the shares and the listing of NTT Com Security AG (formerly Integralis AG) shares on the German stock exchange will continue.

Akira Arima, CEO at NTT Communications, added: "Naming NTT Com Security as our dedicated security arm will further establish us as a global entity committed to resolving IT challenges faced by today's businesses. Through the WideAngle brand, we will continue to promote our information security and risk management skills, expertise and services, as well as enhance our Global Cloud Vision to provide secure global cloud services on a seamless, end-to-end basis. "


Notes for Editors

About NTT Com Security (formerly Integralis)

NTT Com Security (formerly Integralis) is a global information security and risk management organisation, which delivers a portfolio of managed security, business infrastructure, consulting and technology integration services through its WideAngle brand. NTT Com Security helps organizations lower their IT costs and increase the depth of IT security protection, risk management, compliance and service availability. NTT Com Security AG, is headquartered in Ismaning, Germany and part of the NTT Communications Group, owned by NTT (Nippon Telegraph and Telephone Corporation), one of the largest telecommunications companies in the world. For more information, visit http://www.nttcomsecurity.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
AWS CISO Talks Risk Reduction, Development, Recruitment
Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-06-26
A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs.
PUBLISHED: 2019-06-26
A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The size of users' private file uploads via email were not correctly checked, so their quota allowance could be exceeded.
PUBLISHED: 2019-06-26
A flaw was found in Moodle before versions 3.7, 3.6.4. A web service fetching messages was not restricted to the current user's conversations.
PUBLISHED: 2019-06-26
The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_a...
PUBLISHED: 2019-06-26
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).