
NTT DATA Middle East and Africa Company Cyber Security Posture
global.nttNTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity.
NDMEA Company Details
ntt-data-mea
10475 employees
426730.0
541
IT Services and IT Consulting
global.ntt
Scan still pending
NTT_1494657
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

NTT DATA Middle East and Africa Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
NTT DATA Middle East and Africa Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
NTT Communications Corporation | Breach | 85 | 4 | 3/2025 | NTT1055030725 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: NTT Communications Corporation reported a cybersecurity incident affecting approximately 18,000 corporate customers. Hackers compromised the 'Order Information Distribution System,' resulting in the potential theft of customer names, contact details, and service usage information. Despite the security breach discovery on February 5 and the containment of threats, further investigation revealed an attacker's pivot to another network device on February 15, which was also disconnected. NTT's incident response did not include personalized notifications; instead, a public website announcement was made. The breach did not affect contracts for smartphones and mobile phones provided by NTT Docomo. | |||||||
NTT Communications | Breach | 85 | 4 | 3/2025 | NTT030031025 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: NTT Communications, a Japanese telecoms service provider, has experienced a significant data breach with unauthorized access detected on February 5th and again on February 15th. The breach has potentially compromised data related to nearly 18,000 corporate customers' mobile phone contracts, including customer names, contacts, phone numbers, email addresses, and information about service usage. This data leak poses a risk to the confidentiality of customer information and could have severe repercussions for those affected. |
NTT DATA Middle East and Africa Company Subsidiaries

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity.
Access Data Using Our API

Get company history
.png)
NDMEA Cyber Security News
NTT DATA appoints Hani Nofal as Regional Head for Technology Solutions, Middle East and Africa
NTT DATA, a global leader in digital business and technology services, today announced Hani Nofal's appointment as Regional Head forย ...
Modern day cybersecurity: Enabled by automation, managed by human skills
Modern day cybersecurity is being polarised by increasing levels of embedded AI, yet requires the skills of mature security administrators to derive the bestย ...
NTT Data Appoints Hani Nofal As MEA Head Of Technology
โWe are thrilled to welcome Hani to the NTT DATA family,โ said Alan Turnley-Jones, CEO of NTT DATA for Middle East and Africa.
LEAP 2025: What tech leaders have to say about their participation
For Intel, LEAP 2025 has offered a strategic platform to showcase its latest technological advancements and engage with a diverse audience ofย ...
Announcing the Regional 2024 AWS Partners of the Year for Europe, Middle East, and Africa
by AWS Editorial Team on 02 DEC 2024 in Announcements, AWS Partner Network, AWS re:Invent, Customer Solutions, Foundational (100) Permalink Comments Share.
NTT Data appoints Rami Beidas as General Manager for Saudi Arabia
Global technology consultancy NTT Data has installed a new leader for its Saudi office: Rami Beidas.
Cyber resilience: how to limit the real cost of cyberattacks
Cyberattacks can lead to data losses and weeks or months of revenue losses โ unless you invest in cyber resilience.
Cybersecurity
Turn cybersecurity into your strategic advantage with NTT DATA's proven expertise and cutting-edge cybersecurity portfolio.
NTT Data partners Rubrik for ransomware protection
NTT Data has expanded its global strategic partnership with cybersecurity firm Rubrik that will see the operator offer advisory and consulting services.

NDMEA Similar Companies

LexisNexis
LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more e

Accenture in the Philippines
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functionsโunderpinned by t

Capgemini
Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 5

Peraton
Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thi

ManTech
ManTech is more than a technology company. We are a company dedicated to service, and we consider our work a part of the public trust. The people of ManTech are privileged to work for the security of the United States, the welfare of our service members and veterans, the protection of our communitie

Sutherland
Artificial Intelligence. Automation. Cloud engineering. Advanced analytics. For business leaders, these are key factors of success. For us, theyโre our core expertise. At Sutherland, we are a leading global business and digital transformation partner. Our services span a diversified range of categ

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
NDMEA CyberSecurity History Information
How many cyber incidents has NDMEA faced?
Total Incidents: According to Rankiteo, NDMEA has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at NDMEA?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach.
How does NDMEA detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Disconnection of Compromised Devices and communication strategy with Public Website Announcement.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: NTT Communications Data Breach
Description: NTT Communications, a Japanese telecoms service provider, has experienced a significant data breach with unauthorized access detected on February 5th and again on February 15th. The breach has potentially compromised data related to nearly 18,000 corporate customers' mobile phone contracts, including customer names, contacts, phone numbers, email addresses, and information about service usage. This data leak poses a risk to the confidentiality of customer information and could have severe repercussions for those affected.
Date Detected: ['2023-02-05', '2023-02-15']
Type: Data Breach

Incident : Data Breach
Title: NTT Communications Corporation Data Breach
Description: NTT Communications Corporation reported a cybersecurity incident affecting approximately 18,000 corporate customers. Hackers compromised the 'Order Information Distribution System,' resulting in the potential theft of customer names, contact details, and service usage information. Despite the security breach discovery on February 5 and the containment of threats, further investigation revealed an attacker's pivot to another network device on February 15, which was also disconnected. NTT's incident response did not include personalized notifications; instead, a public website announcement was made. The breach did not affect contracts for smartphones and mobile phones provided by NTT Docomo.
Date Detected: 2023-02-05
Date Resolved: 2023-02-15
Type: Data Breach
Attack Vector: Compromise of Order Information Distribution System
Threat Actor: Unknown Hackers
Motivation: Data Theft
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach NTT030031025
Data Compromised: customer names, contacts, phone numbers, email addresses, information about service usage

Incident : Data Breach NTT1055030725
Data Compromised: Customer Names, Contact Details, Service Usage Information
Systems Affected: Order Information Distribution System, Another Network Device
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are customer names, contacts, phone numbers, email addresses, information about service usage, Customer Names, Contact Details and Service Usage Information.
Which entities were affected by each incident?

Incident : Data Breach NTT030031025
Entity Type: Telecom Service Provider
Industry: Telecommunications
Location: Japan
Customers Affected: 18,000

Incident : Data Breach NTT1055030725
Entity Type: Corporation
Industry: Telecommunications
Customers Affected: 18000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach NTT1055030725
Containment Measures: Disconnection of Compromised Devices
Communication Strategy: Public Website Announcement
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach NTT030031025
Type of Data Compromised: customer names, contacts, phone numbers, email addresses, information about service usage
Number of Records Exposed: 18,000

Incident : Data Breach NTT1055030725
Type of Data Compromised: Customer Names, Contact Details, Service Usage Information
Number of Records Exposed: 18000
Personally Identifiable Information: Customer Names, Contact Details
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Disconnection of Compromised Devices.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Public Website Announcement.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Unknown Hackers.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on ['2023-02-05', '2023-02-15'].
What was the most recent incident resolved?
Most Recent Incident Resolved: The most recent incident resolved was on 2023-02-15.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were customer names, contacts, phone numbers, email addresses, information about service usage, Customer Names, Contact Details and Service Usage Information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident were Order Information Distribution System, Another Network Device.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disconnection of Compromised Devices.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were customer names, contacts, phone numbers, email addresses, information about service usage, Customer Names, Contact Details and Service Usage Information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 18.2K.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
