ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:AT&T Cybersecurity

  • AT&T Managed Threat Detection and Response

    Threat detection is one of the fastest-growing areas in cybersecurity, but talent is in short supply, leaving organizations to do more with less resources. And as cybercriminals become cleverer, the burden falls to the business to counter threats. Examine this data sheet to explore Managed Threat Detection and Response from AT&T.

  • AT&T Managed Threat Detection and Response Live Demo

    View this video for an overview of AT&T’s managed threat detection and response service as well as a live demo.

  • AT&T Content Delivery Network (ACDN) - KONA Web Security and Prolexic DDoS Services

    The AT&T CDN with Web Security suite is a bundle of cloud-based web security services designed to help secure your customer’s websites, apps and other assets at the CDN layer. In this product brief, explore its key features and discover how it can help defend against distributed denial of service (DDoS) and other advanced cyberthreats.

  • The New Wave of Cyber Attacks – Ransomware, Extortion, and DDoS Threats

    The next generation of cyberattacks are expected to have devastating consequences that go beyond the scope of today’s cybersecurity capabilities. This webinar provides a comprehensive overview of these new threats, how they operation and what your organization can do to prepare.

  • AT&T Content Delivery Network (ACDN) Cloud Security Solutions -- Prolexic Services

    In this brief, learn how Prolexic services from AT&T Content Delivery Network can help provide comprehensive protection against a broad range of DDoS attack types and help to defend against today’s high-bandwidth, sustained attacks.

  • AT&T Global Security Gateway

    Businesses have taken advantage of the benefits of SaaS applications, but they’ve had to mitigate the resulting increase in network traffic by connecting users directly to the internet. Although this solves the latency dilemma, it lessens visibility and weakens cybersecurity overall. Scan this data sheet to view a potential remedy from AT&T.

  • Enable and Protect Your Remote Workforce

    Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.

  • Top tips for building a successful MSSP practice in an age of remote working

    In the aftermath of the pandemic and the shift to remote work, MSSPs are suddenly in high demand. Dive into this webcast to hear security service experts explain their top tips for success during the age of remote working.

  • How to Build a Security Operations Center

    A robust SOC requires skilled team members and the right technology to truly enhance security—and as an MSP, you can’t afford to let things slip through the cracks. Jump into this guide to learn how to piece together a Security Operations Center that can ensure airtight security protocols without breaking the bank—and without making compromises.

  • The AT&T Cybersecurity Incident Response Toolkit

    In today’s cybersecurity climate, data breaches can seem like more of a “when” question than an “if.” Dive into this cybersecurity incident response toolkit to learn how to apply the military response principles of OODA—observe, orient, device, act—to your organization’s security strategy.

  • MSSP Success Checklist

    Download a copy of this checklist to find out what information you should be collecting from your customers as an MSSP.

  • Global Managed Security Services Providers, Q3 2020

    AT&T Cybersecurity is ranked among the top managed security service providers in The Forrester WAVE™: Global Managed Security Services Providers, Q3 2020. Download your complimentary report today to see what Forrester had to say.

  • Tightly Control and Manage Access to Applications and Services with Zero Trust

    This paper outlines the AT&T Chief Security Office's current point of view on how to manage that control, including best practices. Whether beginning your journey or continuing down the path of migration to a ZT environment, this paper can help in your quest.

  • How to Manage Access Control with Zero Trust

    Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.

  • Security at the Speed of 5G

    Download this report to learn the current posture and plans of the cybersecurity industry as they relate to the impact of 5G; and you'll be able to explore how your organization's plans account for the gaps and recommendations we've identified.

  • Enable and protect your remote workforce

    This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment. Download today to take a holistic approach to help protect your network when you have a remote workforce.

  • The state of SIEM

    Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.

  • The Relationship Between Security Maturity and Business Enablement

    AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.

  • 5 Building Blocks for Strengthening Your IT Security Program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

  • A guide to build vs. buy service models for threat detection and response

    Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

  • The Essential Guide to Secure Web Gateways

    Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.

  • MDR Evaluator’s Guide

    Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.

  • SIEM Analyst Research Bundle

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • PCI Compliance with Unified Security Management

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.