Slintel Image Slintel Image
  • Searcharrow
  • Product arrow
  • Product arrow

    Slintel Platform

    • Pricing
    • Our data

    Usecases

    • Slintel for sales
    • Slintel for marketing
    • Slintel for data management

    Top Features

    • Lead insights
    • Enrichment
    • Buyer intent
    • Technographics data
    • Integrations
    • API
    • Flat files
  • Resources arrow
  • Resources arrow

    Start here

    • Resources
    • Blog
    • Webinars
    • Customer stories

    Insights

    • Technographic insights
    • Company insights
    • Technographic analysis
    • Compare technologies

    Guides

    • Buyer intent
    • Sales intelligence
    • Technographics
    • Sales enablement

    Others

    • Glossary
    • How-To Guides
  • Company arrow
  • Company arrow
    • Our culture
    • Contact us
    • Support center
    • Partners
    • Careers
  • Login
  • Get a demo
Technologies
Companies
Generic placeholder image
Salesforce CRM

Sales-Contact Management

Generic placeholder image
QuantumMetric

Customer Management

Generic placeholder image
Pardot

Sales-Lead Capture

Generic placeholder image
Tableau Software

Business Intelligence & Analytics-Analytics

Generic placeholder image
Slack

Collaboration-Project Collaboration

Generic placeholder image
Segment

Business Intelligence & Analytics-Analytics

Generic placeholder image
Xerox

xerox.com

Generic placeholder image
Hashicorp

hashicorp.com

Generic placeholder image
Juniper Networks

juniper.net

Generic placeholder image
Usertesting

usertesting.com

Generic placeholder image
Buzzfeed

buzzfeed.com

Generic placeholder image
Coursera

coursera.org

Usecases

  • Slintel for sales
  • Slintel for marketing
  • Slintel for data management

Slintel Platform

  • Pricing
  • Our data
  • Chrome Extension

Guides

  • Lead insights
  • Enrichment
  • Buyer intent
  • Technographics data
  • Integrations
  • API
  • Flat files

Start here

  • Resources

    Improve your company revenue

  • Blog

    Stories and content around SalesTech

  • Webinars

    Sign up for events with sales, marketing

  • Customer stories

    Sign up for events with sales, marketing

Insights

  • Technographic insights

    Improve your company revenue

  • Company insights

    Stories and content around SalesTech

  • Technographic analysis

    Sign up for events with sales, marketing

  • Compare technologies

    Sign up for events with sales, marketing

Guides

  • Buyer intent
  • Sales intelligence
  • Technographics
  • Sales enablement
  • Glossary
  • How-To Guides
  • Our culture
  • Contact us
  • Support center
  • Partners
  • Careers

Data Change Request - BT

Before you request to edit the company profile on Slintel, Let us know who you are... Please enter a valid business email id.

Companies / BT
  • Company Profile
  • Technology Stack
  • Employee Profile
  • Market Competitors
  • Jobs
  • Hiring Categories
  • News & Media
  • FAQs
  • Copy link
  • Bookmark this page
    Save for later
  • Copy link
  • Bookmark this page
Last updated : Mar 10 2022

BT BT

We’ve always been an organisation with purpose; to use the power of communications to make a better world. You can trace this back to our beginning as pioneers of the world’s first telecommunications ... company. Over the past 180 years we’ve established ourselves as a strong brand capable of achieving great things. We support emergency services and hospitals, keep economies around the world online and secure, and deliver large scale infrastructure for global events such as the London 2012 Olympics. In recent years we’ve entered new markets and successfully launched BT Sport and BT Mobile, and acquired EE. So if you share in our vision then we’d love for you to be part of our future. To be part of progress. Visit www.bt.com/career to find out more. Read more

  • Telecommunications
  • Headquarters

    London, England, United Kingdom

  • Contact

    Unlock contact

  • Linkedin

  • Company Size

    10k+

  • Stock Symbol

    N/A

  • Website

    bt.com

  • Type

    Public

  Request change

Unlock 5k-10k b2b contact data and other insights for BT

BT Technology Stack

Use this section to learn more about the key technologies and tools used by BT. Explore 1585 technologies across 22 categories used by BT

Azure Active Directory

Azure Active Directory (Azure AD) is enterprise cloud-based identity and access management...

Azure Traffic Manager

Azure Traffic Manager is a DNS-based traffic load balancer that enables to distribute traf...

Incapsula

Incapsula delivers an enterprise-grade web application firewall.

OpenVPN

OpenVPN is an open-source software application that implements VPN techniques for creating...

CrowdStrike Falcon: Endpoint Protection

CrowdStrike Falcon: Endpoint Protection is an unified antivirus (AV), endpoint detection a...

Citrix Gateway

Citrix Gateway is an eimagine secure digital business with digital workspaces. They're par...

AlgoSec

AlgoSec automates and orchestrates network security policy management to deliver business ...

Cisco ASA

Cisco ASA Software delivers enterprise-class security capabilities for the ASA security fa...

BeyondTrust

BeyondTrust develops, markets, and supports a family of privileged identity management / a...

Active Dataguard

Active Data Guard is a technology by Oracle that enables read-only access to a physical st...

SAS/SECURE

SAS/SECURE software provides access to industry-standard encryption algorithms to protect ...

Cisco Stealthwatch

Cisco Stealthwatch provides pervasive network visibility and sophisticated security analyt...

AWS Firewall Manager

AWS Firewall Manager is a security management service which allows users to centrally conf...

Nagios XI

Nagios XI monitors its IT infrastructure, spot problems before they occur, know immediatel...

Prisma Cloud

Prisma Cloud is Cloud Native Security Platform that offers security and compliance coverag...

Global Models

Zabbix

Zabbix is the great performance for data gathering and can be scaled to very large environ...

Datadog

Datadog is a monitoring service for IT, dev & ops teams who write and run applications at ...

Google VPC

Google Cloud Virtual Private Cloud (VPC) provides networking functionality to Compute Engi...

AWS Single Sign-On

AWS Single Sign-On (AWS SSO) is a cloud service that allows you to grant users access to A...

Micro Focus ArcSight ESM

Micro Focus ArcSight ESM (Enterprise Security Manager) is a powerful, adaptable SIEM that ...

IBM Security Identity Manager

IBM Security Identity Manager is an automated and policy-based solution that manages user ...

IBM Security QRadar

IBM Security QRadar helps security teams accurately detect, understand and prioritize thre...

Cisco Email Security

Cisco Email Security protects against ransomware, business email compromise, spoofing, and...

Okta

Okta is an enterprise grade identity management service, built from the ground up in the c...

Tenable.io

Tenable.io Cyber Exposure platform helps to protect any asset on any computing platform an...

Cisco ACI

Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the applic...

Kaspersky

Kaspersky is a suite of antivirus and internet security protection software designed for h...

Zscaler

Zscalar is a cloud security platform that provides protection against cyber attacks, data ...

McAfee

McAfee is a cyber security platform that primarily develops digital-security tools for per...

Oracle Endeca

Self-service data discovery solution.

SailPoint IdentityIQ

IdentityIQ is an IAM solution that unifies identity management processes across cloud, mob...

Symantec Brightmail

Symantec Brightmail solution consists of the Brightmail AntiSpam software along with realt...

Oracle Identity Management

Oracle Identity Management enables organizations to effectively manage the end-to-end life...

IBM QRadar SIEM

IBM QRadar Security Information and Event Management (SIEM) helps security teams accuratel...

Google Cloud IAM

Google Cloud Identity & Access Management (IAM) lets administrators authorize who can take...

Microsoft Azure Active Directory

Azure Active Directory is a comprehensive identity and access management cloud solution th...

TripWire Enterprise

Real-time threat detection, security automation and business context.

Google Cloud Security Command Center

Google Cloud Security Command Center (Cloud SCC) is a built-in security control that helps...

Microsoft Graph

Microsoft Graph is a RESTful web API that enables users to access Microsoft cloud service ...

McAfee MVISION Cloud

McAfee MVISION Cloud is cloud access security broker (CASB) that can detect user behavior ...

Cloudflare

Cloudflare mitigates threats from website scraping to application level attacks e.g. SQL I...

Rapid7

Rapid 7 is a security solution provider that is devoted to providing services and products...

IBM Tivoli Remote Control

Tivoli Remote Control gives organizations tools that include central logging, video sessio...

Duo Security

Duo Security provides a Trusted Access platform offering multiple two-factor authenticatio...

IBM Intrusion Detection and Prevention System Management

IBM Intrusion Detection and Prevention System Management is designed to provide robust, re...

Anomali

Anomali provides cybersecurity solutions that develops and provides threat intelligence pr...

VMware Capacity Planner

VMware Capacity Planner offers capacity planning as a service to help IT departments plan ...

CyberArk

CyberArk is a security tool used for the security of privileged accounts through password ...

Microsoft Azure ExpressRoute

Microsoft Azure ExpressRoute it operates as cloud computing service. It offer services, co...

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitoring is a software makes it easy to quickly detect, d...

McAfee Foundstone

McAfee Foundstone provides enterprise-level vulnerability management software.

IBM QRadar

IBM QRadar is a network security intelligence and analytics that can detect cybersecurity ...

Microsoft Active Directory Federation Services

Microsoft Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution w...

Fortinet FortiGate 200

Fortinet FortiGate 200 is Next Generation Firewall (NGFW) that offers a network security p...

Aruba ClearPass

Aruba ClearPass leverages known and trusted contextual information to create policies that...

Splunk Enterprise Security

Splunk Enterprise Security (Splunk ES) is a security information and event management (SIE...

Dell Data Protection

Dell Data Protection offers comprehensive solutions with strong manageability to secure da...

Persona

EnCase

EnCase is a forensic security software that enables users to quickly search, identify, and...

Encase eDiscovery

EnCase eDiscovery helps litigation experts to establish best practices throughout the e-di...

Cisco NGIPS

Cisco Next-Generation IPS (NGIPS) provides contextual awareness, security intelligence, an...

FortiGate Cloud

FortiGate Cloud is a cloud-based management platform for FortiGate Unified Threat Manageme...

Aruba Networks

Aruba Networks is a suite of enterprise networking and security solutions designed for net...

Campaign Monitor

Campaign Monitor is the leading provider of professional grade email marketing and automat...

Radware

Radware Ltd. is an cybersecurity and application delivery product for physical, cloud and ...

McAfee Cloud Security

McAfee cloud security software offers a scalable solution for IT teams in small and medium...

RSA Security Analytics

RSA Security Analytics is designed to transform security operations by leveraging the pow...

Symantec Endpoint Security

Symantec Endpoint Security is a security software suite that consists of anti-malware, int...

DarkTrace

Enterprise immune system technology for cyber security.

Blue Coat ProxyAV

Blue Coat ProxyAV, is a component of the Blue Coat Security and Policy Enforcement Center,...

Splunk

Splunk's operational intelligence platform helps unearth intelligent insights from machine...

Microsoft Identity Manager

Microsoft Identity Manager is an on-premises identity and access management solution.

Azure Active Directory Domain Services

Azure Active Directory Domain Services (Azure ADDS) provides scalable, high performance, m...

Amberpoint

AmberPoint (part of Oracle) offers industry leading solutions for management & governance ...

Fortinet FortiGate

Fortinet FortiGate is Next Generation Firewall (NGFW) that offers a network security platf...

Wireshark

Wireshark is a network protocol analyzer for Unix and Windows.

Dynatrace Ruxit

Dynatrace Ruixt is an all-in-one application performance monitoring platform.

SAP GRC

SAP solutions for governance, risk, and compliance (GRC) help companies minimize risk and ...

Rapid Recovery

Rapid Recovery facilitates the backup, protection and recovery of files, apps, systems and...

Blue Coat

Blue Coat is a proxy-based cybersecurity and network management solution designed for net...

Microsoft BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

Blue Coat ProxySG

Blue Coat ProxySG is a secure web gateway that delivers Web application and content visibi...

Front

Front is the collaborative communication platform that brings their shared emails into a s...

WinSCP

WinSCP is a free and open-source SSH File Transfer Protocol, File Transfer Protocol, WebDA...

Sophos

Sophos develops products for communication endpoint, encryption, network security, email s...

Akamai SSL

Akamai SSL is a security protocol designed for individuals and enterprise organizations. I...

Oracle SSO

Oracle Single Sign-On is a suite of products that simplifies enterprise single sign-on dep...

PuTTY

PuTTY is an SSH and telnet client, developed for the Windows platform.

Fortinet FortiWeb

Fortinet FortiWeb is a web application firewall (WAF) that protects public cloud hosted we...

Forcepoint Triton APX

Forcepoint is a web security gateway software that develops software to protect organizati...

Palo Alto Networks

Palo Alto Networks is a global integrated cybersecurity solution provider across clouds, n...

Cisco TrustSec

Cisco TrustSec security groups give users access that is consistently maintained as resour...

Cisco Secure Access Control

Cisco Access Control Server (ACS) is an authentication, authorization, and accounting (AAA...

Azure Information Protection

Azure Information Protection is a cloud-based solution that enables organizations to disco...

AWS Backup

AWS Backup is a fully managed backup service that makes it easy to centralize and automate...

RSA Identity Governance and Lifecycle

RSA Identity Governance and Lifecycle simplifies how access is governed and streamlines ac...

IBM RACF

IBM RACF (Resource Access Control Facility) is a security system software that provides ac...

Tripwire CCM

Tripwire CCM is a low/no-touch solution for industrial security with configuration assessm...

Emulex

Emulex is a suite of network connectivity monitoring and management solution designed for ...

Collibra

Collibra automates data management processes by providing business-focused applications wh...

Shavlik

Shavlik technologies enable customers to manage both physical and virtual machines, deploy...

Vade Secure

Vade Secure is a predictive email defense and security solution to protect corporations ag...

RSA Business Role Manager

RSA Business Role Manager helps organizations deploy effective role-based access control, ...

Symantec Data Loss Prevention

Symantec Data Loss Prevention (DLP) solution discovers, monitors, and protects sensitive d...

McAfee Network Access Control

McAfee Network Access Control controls access and protects against broad threats with appl...

Microsoft 365 Business

Microsoft 365 includes Office 365, Windows 10, Enterprise Mobility & Security and helps us...

Qualys

Qualys helps your business automate the full spectrum of auditing, compliance and protecti...

IBM ISS

IBM ISS (Internet Security Systems) is a security software which runs on IBM's Watson IoT ...

Cisco Next-Generation Firewalls (NGFWs)

Cisco Next-Generation Firewalls (NGFWs) allows or blocks traffic based on state, port, and...

Netsparker

Netsparker is an automatic and easy-to-use web application security scanner to automatical...

AWS Security Hub

AWS Security Hub gives a comprehensive view of security alerts and security posture across...

SourceFire

Sourcefire develops network security hardware and software. Sourcefire FirePOWER network s...

Amazon Cognito

Amazon Cognito is a service that makes it easy to save mobile user data, such as app prefe...

FortiSIEM

FortiSIEM is a platform that lets user rapidly find and fix security threats and manage co...

Aruba

Aruba Networks is a mobility-defined network access solution and network infrastructure co...

Symantec Endpoint Detection & Response

Symantec Endpoint Detection & Response exposes stealthy attacks with cloud-delivered analy...

LANDesk Security Suite

LANDesk Security Suite provides multi-layered security solution against ransomware, phishi...

Verodin

Verodin is a business platform that provides organizations with the evidence needed to mea...

FireEye Email Security

FireEye Email Security is a store-and-forward email analysis solution.

Skybox Security Suite

Skybox Security Suite offers security analytics for comprehensive cybersecurity management...

McAfee SECURE

McAfee SECURE is a security certification for websites.

Lumension

Lumension is an endpoint and security management solution designed for SecOps teams. It en...

Cisco Identity Services Engine

Cisco Identity Services Engine (ISE) enables a dynamic and automated approach to policy en...

McAfee Email Gateway

McAfee Email Gateway integrates comprehensive inbound threat protection with outbound data...

IBM Resilient

Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and a...

Tripwire IP360

Tripwire IP360 is an enterprise-class vulnerability management solution that enables cost-...

Juniper Networks SRX1500

Juniper Networks SRX1500 is a high-performance next-generation firewall and security servi...

Metasploit

Metasploit is a computer security project that provides information about security vulnera...

Junos Space Security Director

Junos Space Security Director provides security policy management through an intuitive, ce...

SAP Afaria

SAP Afaria is a mobile device management software product. It helps large organizations co...

Cisco Umbrella

Cisco Umbrella is a cloud security platform that provides the first line of defense agains...

RSA Archer

RSA Archer Platform allows to adapt a broad range of solutions to users requirements, buil...

Palo Alto PAN-OS

Palo Alto PAN‑OS is a software that runs all Palo Alto Networks next-generation firewalls....

McAfee Vulnerability Manager

McAfee Vulnerability Manager Protects businesses with the industry’s most flexible, proven...

Norton Antivirus

Norton AntiVirus is an anti-virus or anti-malware software product, developed and distribu...

Azure Sentinel

Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) a...

Bradford Networks

Bradford Networks, a Fortinet Company, provides complete visibility into all network endpo...

Resolver

Resolver provides custom GRC and incident management software solutions for large enterpri...

Cisco VPN

Cisco VPN is the designs, manufactures, and sells internet protocol based networking and o...

Cisco IronPort

Cisco IronPort WSA is a web proxy that inspects and then either forwards or drops web traf...

RSA DLP

RSA Data Loss Prevention (DLP): Discover and monitor the location and flow of sensitive da...

PRTG Network Monitor

PRTG is the monitors the network 24/7 to timely alert its to issues before they become eme...

Informatica

Informatica delivers enterprise data integration and management software powering analytic...

Symantec Endpoint Protection

Symantec Endpoint Protection is an antivirus and personal firewall software for centrally ...

Google Cloud Security Scanner

Google Cloud Security Scanner is a built-in service for the Security Command Center Premiu...

Alteryx

Alteryx enables the preparation, blending and analysis of data using repeatable workflows,...

McAfee Web Gateway

McAfee Web Gateway protects your network against threats arising from the web.

AWS IoT

AWS IoT offers services for all layers of security, including preventive security mechanis...

LogRhythm

LogRhythm is a log management, security information and event management solution for orga...

Fortinet FortiGate Secure Web Gateway

Fortinet FortiGate Secure Web Gateway (SWG) solution provides an end-to-end secure web exp...

IBM Security Access Manager

IBM Security Access Manager is a modular platform for web, mobile, and cloud access manage...

Cisco AnyConnect

AnyConnect simplifies secure endpoint access and provides the security necessary to help k...

Tripwire

Tripwire develops, markets and sells information technology for security and compliance au...

NetIQ

NetIQ Identity Manager is an end-to-end identity administration and user provisioning solu...

Atlassian Access

Atlassian Access enables visibility and security across all Atlassian accounts and product...

Cisco Firepower 4100

Cisco Firepower 4100 Series is a family of seven threat-focused NGFW security platforms th...

SecureCRT

SecureCRT is a commercial SSH and Telnet client.

Siteimprove

Siteimprove transforms the way businesses manage & deliver their digital presence with com...

Cisco Security Manager

Cisco Security Manager is an integrated end-to-end solution that helps administrators enfo...

Microsoft Forefront

Microsoft Forefront products are designed to help protect computer networks, network serve...

Trend Micro

Trend Micro develops server security, cloud security, and small business content security ...

AWS Identity and Access Management (IAM)

AWS Identity and Access Management (IAM) enables users to manage access to AWS services an...

Symantec Privileged Access Management

Symantec Privileged Access Management delivers comprehensive access governance and managem...

TippingPoint

TippingPoint integrates with the Deep Discovery Advanced Threat Protection solution to det...

RSA Security

RSA Security solutions help customers comprehensively and rapidly link security incidents ...

SolarWinds NPM

SolarWinds Network Performance Monitor (NPM) is a network monitoring software that enables...

Oracle Access Management

Oracle Access Management offers access management for applications, data, and web services...

Dell EMC RecoverPoint

Dell EMC RecoverPoint provides the continuous data protection needed to recover any applic...

McAfee Network Security Platform

McAfee Network Security Platform combines real-time intrusion detection and prevention for...

NICE Systems

NICE Systems is an Israel-based company specializing in telephone voice recording, data se...

NetFlow Traffic Analyzer

NetFlow Traffic Analyzer network traffic analyzer and bandwidth monitoring software

CA Strong Authentication

CA Strong Authentication is a versatile multi-factor authentication system that can help u...

Genesys Cloud

Genesys Cloud platform maintains strong encryption, logical isolation, stringent multi-ten...

Microsoft Active Directory

McAfee IPS

McAfee IPS inspects all network traffic to accurately and effectively block the advanced, ...

Symantec

Symantec provides cybersecurity software and services.

LogLogic

LogLogic is a technology company that specializes in Security Management, Compliance Repor...

McAfee ePO

McAfee ePolicy Orchestrator (McAfee ePO) software centralizes and streamlines management o...

Crowdstrike

Crowdstrike is a Computer and Network security company which provides revolutionized endp...

Veritas eDiscovery

Veritas eDiscovery is a digital forensics, investigations, and document review solution de...

Customer Technology Stack Analysis

Find out what companies are built with

Instantly reveal the technology stack of any website. Generate a free report by analyzing a list of your customers to find the top 5 common technologies currently being used across your customers.

Employee Profile

Find out who are the decision-makers at BT. Find their phone numbers and email addresses. Contact us to uncover BT’s employee details.

Install Slintel Chrome Extension

To find emails, direct dials, target and connect with more prospects on LinkedIn and anywhere on the web.

Companies Similar to BT

BT has many product lines and overlaps with many other company products. Here we top market competitors and alternatives to BT.

Armour Communications Ltd

  • Total Employees

    11-50

  • Location

    London

  • Website

    armourcomms.com

  • Type

    Private

  • Stock Symbol

    N/A

  • Linkedin

Ansador Fire & Security

  • Total Employees

    51-200

  • Location

    London

  • Website

    ansador.co.uk

  • Type

    Private

  • Stock Symbol

    N/A

  • Linkedin

Colt Technology Services

  • Total Employees

    5k-10k

  • Location

    London

  • Website

    colt.net

  • Type

    Private

  • Stock Symbol

    N/A

  • Linkedin

Cognosec

  • Total Employees

    51-200

  • Location

    London

  • Website

    cognosec.se

  • Type

    Public

  • Stock Symbol

    N/A

  • Linkedin

Wedgetail Communications

  • Total Employees

    10k+

  • Location

    Brisbane

  • Website

    wedgetail.com

  • Type

    Private

  • Stock Symbol

    N/A

  • Linkedin

Jobs at BT

Check out BT job postings to help you identify how fast BT is growing, and determine how their purchase behavior is going to change over the next few weeks.

Global Inside Sales Representative

Metropolitan areas we are looking to hire for this role: Dallas-Fort Worth, TX Hybrid / remote work role There are two things th...

19 Jan 2022

Scrum Master

Our mission is to break down the barriers of today to release the potential of tomorrow. Join us today and release yours. There ar...

London, England, United Kingdom

21 Jan 2022

Retention And Loyalty Agent (j11609:man)

Company: BT Job Title:Retention and Loyalty Agent, BT Location: Manchester Salary: Competitive REF: J11609:MAN Sector: Telecoms ...

Manchester, England, United Kingdom

21 Jan 2022

Especialista De Revenue Assurance - Espe...

VAGA PARA TRABALHO EM MODELO HIBRIDO: Localização do Escritório - Shopping Villa Lobos Only CV`s In English will be considered. ...

Sao Paulo, Sao Paulo, Brazil

19 Jan 2022

Information Technology Security Speciali...

Cyber-Physical Security Specialist - Dallas, New York or Washington D.C. metro There are two things that we want to share with ...

31 Jan 2022

Data Engineer

GCP Data Engineering

Birmingham, England, United Kingdom

29 Jan 2022

Hiring Categories of BT

Check out the recent job hiring categories of Hiring Categories of BT, identify in which category is growing and discover how their purchase behavior is going to change.

Company News and Alerts

Get latest news, alerts and updates about BT

  • Google Cloud details new data-centric partnerships with BT and Bloomberg

    Google LLC’s cloud unit today detailed new partnerships with two major enterprises: BT Group plc, the largest telecommunications provider in the U.K., and financial services giant Bloomberg LP.  The partnerships focus on two different sets of use cases.

    10 Mar 2022

  • Cygna Labs Signs a Definitive Agreement to Acquire Diamond IP from BT

    Cygna Labs, a highly specialized software manufacturer with a focus on providing enterprises worldwide with the latest innovations in cloud security and compliance technology,

    17 Feb 2022

  • Altice boosts BT stake triggering government warning

    Telecoms tycoon Patrick Drahi’s telecoms group Altice UK raised its stake in BT group to 18 per cent but distanced away from currently launching a full takeover bid.

    14 Dec 2021

  • BT appoints new chair to drive transformation

    BT announced the appointment of Adam Crozier as its new chairman, confirming an earlier newspaper report tipping the move.

    17 Aug 2021

  • BT secures 5G partnerships with University of Warwick and Belfast Harbour

    BT hopes two new partnerships will accelerate the development of industrial and public sector applications of 5G. The enhanced speeds, greater capacity, and ultra-low latency promised by 5G will transform consumer mobile broadband services,

    03 Nov 2020

FAQ

Find answers to the most often asked questions by users.

What is BT's official website?

The official website of BT is bt.com.

How many employees are working at BT?

Slintel keeps track of 10k+ employees who are working at BT.

What industry is BT in?

BT is in the industry of Telecommunications.

What is BT's tech stack?

The top technologies used by BT are :- MicroStrategy Genesys CIM Platform Google Cloud Run Cisco 3750V2 Azure SQL Datadog .

Where are BT's headquarters?

BT headquarters are at London, England, United Kingdom.

  • Slintel Resources
  • Related Companies
  • Related Categories
  • Related Technologies
Case Study s min Read

How Cloud Pathfinder got 2x more demos with Slintel

Blog 6 min Read

The Sales Flywheel: Why The Funnel Is So 2010

Ebook 17 min Read

Technographics: The Complete Guide To Understanding & Using Technographic Data

Webinar 31 min

[Masterclass] Customer Webinar: How Whatfix scaled rapidly with modern market intelligence

Armour Communications Ltd
Ansador Fire & Security
Colt Technology Services
Cognosec
Wedgetail Communications
Identity And Access Manag...
Load Balancer
Perimeter Security And Fi...
Virtual Private Network (...
Network Security
Endpoint Security
Virtual Private Network (...
Network Security
Perimeter Security And Fi...
Identity And Access Manag...
Data Protection
Data Security And DLP
Cloud Security
Perimeter Security And Fi...
Network Monitoring
Cloud Security
Risk Management
Network Monitoring
Network Monitoring
Virtual Private Network (...
Single Sign-On (SSO)
Security Information And ...
Identity And Access Manag...
Security Information And ...
Email Security
Identity And Access Manag...
Single Sign-On (SSO)
Web And Mobile Applicatio...
Infrastructure Security
Anti-Virus
Network Security
Cyber Security
Governance, Risk And Comp...
Electronic Discovery
Identity And Access Manag...
Email Security
Identity And Access Manag...
Unified Threat Management
Identity And Access Manag...
Identity And Access Manag...
Endpoint Security
Threat Detection And Prev...
Other Security
Cloud Access Security Bro...
Cloud Security
Network Security
Threat Detection And Prev...
Network Monitoring
Authentication
Identity And Access Manag...
Network Security
Threat Detection And Prev...
Infrastructure Security
Password Management
Virtual Private Network (...
Network Monitoring
Other Security
Security Information And ...
Identity And Access Manag...
Perimeter Security And Fi...
Other Security
Network Security
Security Information And ...
Data Security And DLP
Auditing And Compliance
Security Analytics
Electronic Discovery
Threat Detection And Prev...
Unified Threat Management
Network Security
Email Security
Cyber Security
Email Security
Cloud Security
Security Analytics
Endpoint Security
Network Security
Threat Detection And Prev...
Security Information And ...
Identity And Access Manag...
Identity And Access Manag...
Governance, Risk And Comp...
Perimeter Security And Fi...
Network Monitoring
Network Monitoring
Governance, Risk And Comp...
Data Protection
Backup
Network Security
Data Security And DLP
Threat Detection And Prev...
Email Security
Secure Shell (SSH)
Endpoint Security
Anti-Virus
SSL Certificate
Identity And Access Manag...
Secure Shell (SSH)
Perimeter Security And Fi...
Threat Detection And Prev...
Data Security And DLP
Network Security
Unified Threat Management
Authentication
Data Protection
Backup
Governance, Risk And Comp...
Identity And Access Manag...
Identity And Access Manag...
Threat Detection And Prev...
Network Monitoring
Governance, Risk And Comp...
Endpoint Security
Email Security
Anti-Spam
Identity And Access Manag...
Threat Detection And Prev...
Identity And Access Manag...
Identity And Access Manag...
Endpoint Security
Infrastructure Security
Web And Mobile Applicatio...
Web And Mobile Applicatio...
Managed Security Services
Network Security
Identity And Access Manag...
Security Information And ...
Network Security
Endpoint Protection
Cyber Security
Threat Detection And Prev...
Email Security
Security Analytics
Other Security
Endpoint Security
Identity And Access Manag...
Email Security
Threat Detection And Prev...
Threat Detection And Prev...
Perimeter Security And Fi...
Threat Detection And Prev...
Other Security
Web And Mobile Applicatio...
Infrastructure Security
Corporate Governance And ...
Perimeter Security And Fi...
Threat Detection And Prev...
Anti-Virus
Security Information And ...
Endpoint Protection
Governance, Risk And Comp...
Virtual Private Network (...
Web And Mobile Applicatio...
Data Security And DLP
Network Monitoring
Governance, Risk And Comp...
Endpoint Security
Endpoint Security
Data Protection
Network Security
IoT Security
Security Information And ...
Perimeter Security And Fi...
Identity And Access Manag...
Virtual Private Network (...
Cyber Security
Identity And Access Manag...
Web And Mobile Applicatio...
Threat Detection And Prev...
Secure Shell (SSH)
Data Protection
Identity And Access Manag...
Network Security
Endpoint Security
Identity And Access Manag...
Identity And Access Manag...
Threat Detection And Prev...
Network Security
Network Monitoring
Identity And Access Manag...
Data Protection
Threat Detection And Prev...
Data Security And DLP
Network Monitoring
Authentication
Network Security
Identity And Access Manag...
Threat Detection And Prev...
Cyber Security
Security Information And ...
Endpoint Protection
Endpoint Protection
Electronic Discovery
Containers And Microservi...
Data Center Management
Web And Application Serve...
Converged Infrastructure
Backup And Recovery
Server And Desktop OS
Infrastructure-as-a-Servi...
Email Client
Server And Desktop OS
Enterprise Data Storage
Data Management And Stora...
Hosted Email
Virtualization Platform
IT Infrastructure Service...
Hosted Email
Web And Application Serve...
Web And Application Serve...
Server And Desktop OS
Server And Desktop OS
IT Infrastructure Service...
Server And Desktop OS
Virtualization Platform
Containers And Microservi...
Other Infrastructure Tool...
Web And Application Serve...
Server And Desktop OS
Data Center Management
Backup And Recovery
Web And Application Serve...
Backup And Recovery
Backup And Recovery
Enterprise Data Storage
Server And Desktop OS
Platform-as-a-Service (Pa...
Backup And Recovery
Proxy Servers
Server And Desktop OS
Platform-as-a-Service (Pa...
Storage Infrastructure
Storage Infrastructure
Data Management And Stora...
Infrastructure-as-a-Servi...
Server And Desktop OS
Other Infrastructure Tool...
Platform-as-a-Service (Pa...
IT Infrastructure Service...
Platform-as-a-Service (Pa...
Data Management And Stora...
Enterprise Data Storage
Server And Desktop OS
Web And Application Serve...
Server And Desktop OS
Virtualization Platform
Data Management And Stora...
Web And Application Serve...
Backup And Recovery
Data Center Management
Backup And Recovery
Enterprise Data Storage
Enterprise Data Storage
Infrastructure-as-a-Servi...
Server And Desktop OS
Server And Desktop OS
Data Center Management
Enterprise Data Storage
Backup And Recovery
Server And Desktop OS
Server And Desktop OS
Virtualization Platform
Data Management And Stora...
Web And Application Serve...
Enterprise Data Storage
Archiving
Enterprise Data Storage
Data Management And Stora...
Enterprise Data Storage
Platform-as-a-Service (Pa...
Storage Infrastructure
Web And Application Serve...
Containers And Microservi...
Server And Desktop OS
Other Infrastructure Tool...
Backup And Recovery
Enterprise Data Storage
Containers And Microservi...
Web And Application Serve...
Data Management And Stora...
Server And Desktop OS
Web And Application Serve...
Enterprise Data Storage
Data Management And Stora...
Backup And Recovery
Web And Application Serve...
IT Infrastructure Service...
Containers And Microservi...
Web And Application Serve...
Data Management And Stora...
Server And Desktop OS
Enterprise Data Storage
Data Center Management
Web And Application Serve...
Storage Infrastructure
Software Defined Storage
Server And Desktop OS
Enterprise Data Storage
Other Infrastructure Tool...
Infrastructure-as-a-Servi...
Web And Application Serve...
Enterprise Data Storage
Web And Application Serve...
Server And Desktop OS
Enterprise Data Storage
Network-Attached Storage ...
Server And Desktop OS
Enterprise Data Storage
Data Management And Stora...
Data Management And Stora...
Backup And Recovery
Server And Desktop OS
Infrastructure-as-a-Servi...
Server And Desktop OS
Web And Application Serve...
Enterprise Data Storage
Other Infrastructure Tool...
Platform-as-a-Service (Pa...
Server And Desktop OS
Server And Desktop OS
Server And Desktop OS
Web And Application Serve...
Email Client
Enterprise Data Storage
Containers And Microservi...
Enterprise Data Storage
Web And Application Serve...
Virtualization Platform
Backup And Recovery
IT Infrastructure Service...
Server And Desktop OS
Web And Application Serve...
Enterprise Data Storage
Web And Application Serve...
Email Client
Hosted Email
Email Client
Backup And Recovery
Integrations Platform-as-...
Server And Desktop OS
Data Management And Stora...
Server And Desktop OS
Web And Application Serve...
Software Defined Storage
Integrations Platform-as-...
Server And Desktop OS
Infrastructure-as-a-Servi...
Server And Desktop OS
Server And Desktop OS
Data Management And Stora...
Enterprise Data Storage
Backup And Recovery
Platform-as-a-Service (Pa...
Server And Desktop OS
Virtualization Platform
Server And Desktop OS
Server And Desktop OS
Converged Infrastructure
Backup And Recovery
IT Infrastructure Service...
Server And Desktop OS
Integrations Platform-as-...
Enterprise Data Storage
Data Center Management
Predictive Analytics
Data Analysis
Master Data Management
Data Analytics
Data Integration
Dashboard
Data Mining
Data Science And Machine ...
Data Visualization
Big Data Infrastructure
Reporting
Data Analytics
Reporting
Analytics
Data Analysis
Other BI And Analytics
Data Visualization
Analytics
Dashboard
Heatmaps
Dashboard
Master Data Management
Big Data Analytics
Data Analysis
IoT Platform
Data Integration
Big Data Infrastructure
Stream Processing
Analytics And BI Platform
Data Analytics
Dashboard
Reporting
IoT Platform
Stream Processing
Data Warehousing
IoT Platform
Big Data
Analytics And BI Platform
Business Intelligence (BI...
Reporting
Mobile Analytics
Data Science And Machine ...
Analytics
Big Data
Web Analytics
Realtime Backend
NLP And Text Analytics
Data Science And Machine ...
Data Warehousing
Reporting
Data Warehousing
Big Data Infrastructure
Reporting
Analytics And BI Platform
Data Visualization
Data Mining
Dashboard
Reporting
Data Visualization
Big Data Analytics
Analytics And BI Platform
Data Science And Machine ...
Stream Processing
Data Integration
Predictive Analytics
Dashboard
Web Analytics
Web Analytics
Mobile Analytics
Web Analytics
Analytics And BI Platform
Data Warehousing
Big Data Infrastructure
Big Data Analytics
Stream Processing
Analytics And BI Platform
Web Analytics
Analytics
Business Intelligence (BI...
Data Science And Machine ...
Data Science And Machine ...
Data Science And Machine ...
Data Integration
Data Visualization
Web Analytics
Analytics
Data Visualization
Dashboard
Data Science And Machine ...
Data Science And Machine ...
IoT Platform
Data Science And Machine ...
Big Data Analytics
Data Visualization
Data Warehousing
IoT Platform
Business Intelligence (BI...
Data Visualization
Other BI And Analytics
Business Intelligence (BI...
Data Science And Machine ...
Data Visualization
Data Science And Machine ...
Analytics
Web Analytics
Data Visualization
Business Intelligence (BI...
Analytics
Master Data Management
Business Intelligence (BI...
Data Science And Machine ...
Session Recording And Pla...
Web Analytics
Data Warehousing
Big Data Analytics
Data Mining
Predictive Analytics
Business Intelligence (BI...
Reporting
Analytics And BI Platform
Data Hygiene
Business Intelligence (BI...
Data Visualization
Data Integration
Data Analytics
Business Intelligence (BI...
Master Data Management
Analytics And BI Platform
Analytics And BI Platform
Reporting
Data Science And Machine ...
Big Data Infrastructure
Big Data Analytics
Analytics
Master Data Management
Web Analytics
Other BI And Analytics
Data Science And Machine ...
Big Data Infrastructure
Data Science And Machine ...
Data Visualization
Data Science And Machine ...
Data Integration
Data Warehousing
Other BI And Analytics
Analytics And BI Platform
Data Warehousing
Stream Processing
Data Analytics
Data Quality
Data Visualization
Data Visualization
Web Analytics
Business Intelligence (BI...
NLP And Text Analytics
Data Integration
Azure Active Directory
Google Cloud Run
MicroStrategy
JavaScript
Sauce Labs
Cisco 3750V2
Netcracker
Slack
Azure SQL
Qubit
Genesys CIM Platform
NetSuite
SHL
NetSuite
Sign Server
Digital.ai Agility
TestRail
iOffice
ECLIPSE
Mobify
Pivotal Tracker
Oracle SOA

To exercise your “Do Not Sell My Personal Information” rights under the California Consumer Privacy Act (“CCPA”), please email [email protected].

We will respond in accordance with the CCPA. See our privacy policy for more information regarding Slintel’s compliance with the CCPA.

Identify potential buyers in your market

Follow us

Get 286M+ B2B contact data from Websites and LinkedIn profiles

Know Slintel arrow

  • Login
  • Pricing
  • Our data
  • Integrations
  • API

Use Slintel to arrow

  • Compare software
  • Analyse technologies
  • View company insights
  • Compare technologies

Explore arrow

  • Slintel blog
  • Resources
  • Case studies
  • Why Slintel?

Company arrow

  • Our culture
  • Partners
  • Contact us
  • Help center
  • Careers

Slintel for arrow

  • Sales
  • Marketers
  • Data management
Do Not Sell My Info Privacy Policy
© 2022 Slintel LLC. All rights reserved.

We use cookies to improve your browsing experience. By accepting this, you agree to our privacy policy