Select Language : English Français


Brazil: English / 日本語 / Português do Brasil
United States: English

Europe, Middle East, Africa (EMEA)

(Belgium, France, Germany, Netherlands, Spain, United Arab Emirates, United Kingdom)
English / 日本語 / Español / Deutsch / Français
Russia: English / 日本語 / русский

Asia Pacific

Japan(Business): English / 日本語
Japan(Residential): English / 日本語
Australia(NTT Com ICT Solutions): English
Mainland China: English / 日本語 / 簡體中文
Hong Kong & Macao: English / 日本語 / 繁体中文 / 簡體中文
India: English / 日本語
Indonesia: English
Korea: English / 日本語 / 한국어
Malaysia: English
Philippines(DTSI): English
Singapore: English / 日本語
Taiwan: English / 日本語 / 繁体中文
Thailand: English / 日本語
Vietnam: English / 日本語

2018 Global Threat Intelligence Report

Analysis for the 2018 Global Threat Intelligence Report (GTIR) includes real data from our 10 global security operations centers and seven research and development centers and real data from our continuous threat monitoring.

GTIR 2018


GTIR Report

NTT Security have created this report by analysing over 6.1 trillion logs and more than 150 million attacks, along with vulnerability scans, incident response engagements, and diverse findings from threat research and threat intelligence teams.

Infographic GTIR


With visibility into 40% of the world's internet traffic, NTT Security combines analysis of over 6.1 trillion logs and 150 million attacks for the Global Threat Intelligence Report.


Report Highlights

Read the key findings from the 2018 GTIR. This paper considers the application of three Security Leadership Principles to help drive security programs.


Executive Summary

The cyber world continues to expand, uniting information and operational technology, industrial controls and the Internet of Things into an ever-evolving environment across on-premises, cloud and mobile devices.

Related Material


Managed Security Services

Do you need a comprehensive alternative to managing all your threat dynamics in house? Consider a Managed Security Service.


Understand your Risk Exposure

Identify the activities that need to take place to move you to a continuous state of Risk Management.


More on Incident Response

How would you deal with a security incident if it happened today? Could you manage it yourself, or would you need to call in the experts?


Avoiding Ransomware

Ransomware has become one of the most common cyber threats to business. How can you prevent your organization from becoming the next victim?

Back to Top