ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:AT&T Cybersecurity

  • Tightly Control and Manage Access to Applications and Services with Zero Trust

    This paper outlines the AT&T Chief Security Office's current point of view on how to manage that control, including best practices. Whether beginning your journey or continuing down the path of migration to a ZT environment, this paper can help in your quest.

  • How to Manage Access Control with Zero Trust

    Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.

  • Security at the Speed of 5G

    Download this report to learn the current posture and plans of the cybersecurity industry as they relate to the impact of 5G; and you'll be able to explore how your organization's plans account for the gaps and recommendations we've identified.

  • Enable and protect your remote workforce

    This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment. Download today to take a holistic approach to help protect your network when you have a remote workforce.

  • The state of SIEM

    Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.

  • The Relationship Between Security Maturity and Business Enablement

    AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.

  • 5 Building Blocks for Strengthening Your IT Security Program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

  • A guide to build vs. buy service models for threat detection and response

    Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

  • Help Reduce Cyber Risks and Simplify Your Journey to Compliance

    For organizations with a limited IT budget, gaining the visibility needed to understand security risks and address compliance requirements is a cumbersome task. In this solution brief, explore the features and capabilities of AT&T Cybersecurity – designed to simplify compliance and security – to see if it’s a good fit for your needs.

  • Detect Advanced Threats with Endpoint Detection and Response

    Corporate endpoints represent one of the top areas of security risk for organizations. That’s why many are turning to EDR solutions for an added layer of security. But EDR solutions can carry high cost and complexity for organizations. Learn about AT&T’s USM Anywhere and see how it takes a different approach to protecting endpoints.

  • The Essential Guide to Secure Web Gateways

    Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.

  • MDR Evaluator’s Guide

    Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.

  • Beginner’s Guide to AWS Security Monitoring

    In the Beginner’s Guide to AWS Security Monitoring, learn what the 3 biggest security concerns are and how you can get started with AWS security best practices.

  • SIEM for Beginners

    Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.

  • Open Source Network Security Tools for Beginners

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

  • 6 Steps to SIEM Success

    Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.

  • Get Real Time Threat Detection Starting on Day 1 with AlienVault USM

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • SIEM Analyst Research Bundle

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • PCI Compliance with Unified Security Management

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.

  • The Perfect Rx for HIPAA Compliance

    Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.

  • What You SIEM is What You Get

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Threat Intelligence Evaluator's Guide

    One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.

  • Security Operations Center (SOC) Essentials for the SME

    Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.

  • How to Limit the Risk of Attack on your XP Assets

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.