PDF version of this report
You must have Adobe Acrobat reader to view, save, or print PDF files. The
reader is available for free
download.
AT&T Cybersecurity Services
Copyright 2020, Faulkner Information Services. All
Rights Reserved.
Docid: 00021100
Publication Date: 2007
Report Type: PRODUCT
Preview
AT&T offers an extensive portfolio of cybersecurity services for
large businesses and enterprises. The acquisition of AlienVault has given
AT&T a boost with the Unified Security Management platform. This
report takes a look at the realm of cybersecurity offerings provided by
AT&T.
Report Contents
- Description
- Related Faulkner Reports
- Vendor
- Features
- Environment
- Major Competitors
- Conclusion
- Web Links
Vendor |
Name: AT&T |
Description
[return to top of
report]
With information security professionals in short supply – and demanding
top dollar – many enterprises are turning to outsourcing to satisfy their
security needs, entrusting the integrity of their information
infrastructure and business information to a managed security services
provider.
With the 2018 acquisition of AlienVault, AT&T added the unified
security management platform and threat intelligence capabilities to its
portfolio of cybersecurity products. AlienVault’s president and CEO Barmak
Meftah was named president of AT&T Cybersecurity Solutions. Regarding
the combination of AT&T and AlienVault, Meftah said, “Together we have
the opportunity to simplify a complex problem and automate how many
customers tackle their cybersecurity needs. We will combine our phenomenal
threat detection, incident response, and compliance security platform with
AT&T’s managed security capabilities, making near real-time threat
information actionable and achievable.”
In February 2019, AT&T announced that it would combine the
AlienVault, AT&T Cybersecurity Consulting, AT&T Managed Security
Services divisions into one unit called AT&T Cybersecurity.
AT&T breaks down its cybersecurity portfolio into a three-pronged
approach:
- Assess and plan – Consists of products and services
that determine the best possible security solution and the planning
tools needed to put such plan in place. - Detect and protect – Delivers offerings that filter
and analyze traffic and identify and block threats. - Respond and recover – Provides the resources needed
to act on threat and minimize harm.
Related Faulkner Reports |
Dell SecureWorks Managed Security Services Product Profile |
IBM Managed Security Services Product Profile |
Verizon Enterprise Security Services Product Profile |
Features
[return to top of
report]
Table 1 outlines the features of the products and services within
AT&T’s cybersecurity portfolio.
Objectives | Products and Features |
---|---|
Cyber Strategy and Risk |
Strategy and Roadmap Planning – AT&T conducts a needs assessment and draws up a framework after careful analysis of an organization’s goals and current parameters. Key activities include:
Compliance Consulting – AT&T has security
Vulnerability Scanning – Avoiding and Cybersecurity Rating – Since an organization’s Penetration Testing. Tests how security holds Risk Based Cyber Posture Assessment. Allows Cybersecurity IQ Testing. Allows for the
|
Detect and Protect | AlienVault USM Anywhere – AlienVault Unified Security Management is a SaaS security monitoring offering that centralizes threat detection, incident response, and compliance management across the cloud, hybrid environments, and on-premise locations. It offers automated log collection, continuous threat intelligence, and automates with third-party tools. AT&T Threat Manager – AT&T delivers
Incident Response and Forensics – In the event
|
Network Security |
Intrusion Detection and Prevention – Screens data packets throughout the network and triggers alerts, drops packets, or blocks traffic whenever a suspicious packet is detected. Network-Based Firewall – Monitors bandwidth Premises-Based Firewall – Consists of a fully DDoS Defense – Delivers cloud-based monitoring Secure Email Gateway – Deflects spam, malware, Cloud Web Security Service – Provides content Token Authentication – Secures access across a Enhanced Cybersecurity Service – Features Additional Offerings – AT&T has
|
Endpoint Security | VMWare Workspace ONE(R) – An enterprise management platform that allows IT administrators to control mobile devices, cloud-hosted virtual desktops, and applications. It is available as a cloud or on premises offering. IBM MaaS360 – Integrates mobile management with MobileIron – Helps organizations harness the Lookout Mobile Endpoint Security. Designed to |
Environment
[return to top of
report]
AT&T’s solutions for cybersecurity are intended to be deployable,
scalable, and adaptable to most environments.
Major Competitors
[return to top of
report]
- IBM
- Cisco
- Secureworks
- Symantec
- Verizon Enterprise
- Trustwave
- Sophos
Conclusion
[return to top of
report]
AT&T has demonstrated its commitment to security with the acquisition
of AlienVault, which gives it the Unified Security Management platform.
The USM platform combines threat detection, incident response, and
compliance capabilities. AT&T has combined AlienVault’s capabilities
and intelligence within its own portfolio to further safeguard
enterprises.
In the wake of recent and wide-reaching data breaches, including the
Equifax, Office of Personnel Management, Marriott, Yahoo, and others,
companies of all sizes are discovering that protecting their data isn’t
just a task that can be put off and completed at a later date. Many
breaches aren’t discovered for months or even years, long after data has
been compromised and stolen. In a February 2019 report, Risk Based
Security revealed that there were 6,515 disclosed data compromises in 2018
– over five billion records in total were compromised. The number of
breaches decreased slightly about one-third from 2017. However five
billion records is still a large number and RBS determined that it took an
average of 49.6 days to report a breach following its discovery.1
Ransomware attacks, cryptocurrency mining, phishing attacks, and other
threats can result in millions of dollars in losses. A March 2019
ransomware attack on Norwegian aluminum provider Norsk Hydro topped $40
million in one week . It’s unclear how much more money this one
breach will cost the company. Although organizations are warned by law
enforcement not to pay the ransoms on these styles of attacks, some
companies figure it’s cheaper to pay up than to try and recover locked
files. However, paying a ransom does not mean that the cybercriminals will
decrypt the files and return them. In the past, many companies found it
difficult to justify the funds needed for cybersecurity services when it
seemed unlikely that a cyber attack or breach would occur. Nowadays, the
likelihood of a cyber threat causing massive damage is great thanks to
unpatched software, employees falling for business email compromise scams,
and the use of weak passwords. This is where AT&T comes in. Its
cybersecurity services help companies find their weakest points and
develop plans to deflect threats; collect data from logs for evaluation;
and identify potential security issues in network traffic and mitigate
them. AT&T can take over all cybersecurity duties for a company that
prefers to offload them or doesn’t have the staff to handle them or can
simply work in tandem with a company’s cyber team. While cybersecurity
services are indeed expensive, there is no other alternative as protection
is critical. And as the incident at Norsk Hydro dictates, one breach or
attack can be so costly that a company could go out of business.
Web Links
[return to top of report]
AT&T: https://www.att.com/
Cisco: https://www.cisco.com/
IBM: https://www.ibm.com/
Secureworks: https://www.secureworks.com/
Sophos: https://www.sophos.com/
Symantec: https://www.symantec.com/
Trustwave: https://www.trustwave.com/
Verizon Enterprise: http://www.verizonenterprise.com/
References
1 Risk Based Security. “2017 Data Breach QuickView Report.”
February 13, 2019.
[return to top of this
report]