ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:AT&T Cybersecurity

  • Top tips for building a successful MSSP practice in an age of remote working

    In the aftermath of the pandemic and the shift to remote work, MSSPs are suddenly in high demand. Dive into this webcast to hear security service experts explain their top tips for success during the age of remote working.

  • How to Build a Security Operations Center

    A robust SOC requires skilled team members and the right technology to truly enhance security—and as an MSP, you can’t afford to let things slip through the cracks. Jump into this guide to learn how to piece together a Security Operations Center that can ensure airtight security protocols without breaking the bank—and without making compromises.

  • The AT&T Cybersecurity Incident Response Toolkit

    In today’s cybersecurity climate, data breaches can seem like more of a “when” question than an “if.” Dive into this cybersecurity incident response toolkit to learn how to apply the military response principles of OODA—observe, orient, device, act—to your organization’s security strategy.

  • MSSP Success Checklist

    Download a copy of this checklist to find out what information you should be collecting from your customers as an MSSP.

  • Global Managed Security Services Providers, Q3 2020

    AT&T Cybersecurity is ranked among the top managed security service providers in The Forrester WAVE™: Global Managed Security Services Providers, Q3 2020. Download your complimentary report today to see what Forrester had to say.

  • Tightly Control and Manage Access to Applications and Services with Zero Trust

    This paper outlines the AT&T Chief Security Office's current point of view on how to manage that control, including best practices. Whether beginning your journey or continuing down the path of migration to a ZT environment, this paper can help in your quest.

  • How to Manage Access Control with Zero Trust

    Listen in on this conversation with the AT&T Chief Security Office (CSO) on their current point of view on how to manage access control using ZT principals, including best practices.

  • Security at the Speed of 5G

    Download this report to learn the current posture and plans of the cybersecurity industry as they relate to the impact of 5G; and you'll be able to explore how your organization's plans account for the gaps and recommendations we've identified.

  • Enable and protect your remote workforce

    This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment. Download today to take a holistic approach to help protect your network when you have a remote workforce.

  • The state of SIEM

    Take a look at the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data.

  • The Relationship Between Security Maturity and Business Enablement

    AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.

  • 5 Building Blocks for Strengthening Your IT Security Program

    Given how rapidly cybersecurity threats emerge and change, it can be hard to keep up. Security leaders must be ready to build security programs that will take their operations to a whole new level of risk reduction— without hampering the flexibility and recovery offered by digital transformation in a post-pandemic business world.

  • A guide to build vs. buy service models for threat detection and response

    Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.

  • The Essential Guide to Secure Web Gateways

    Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.

  • MDR Evaluator’s Guide

    Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.

  • Get Real Time Threat Detection Starting on Day 1 with AlienVault USM

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • SIEM Analyst Research Bundle

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • PCI Compliance with Unified Security Management

    Because organizations are often racing to get ready for their next fast-approaching PCI audit, IT security teams struggle to meet requirements defined by PCI. Read this white paper to gain insight into PCI compliance and how your company can ensure readiness for PCI DSS 3.2.

  • 5 Steps to Implement & Maintain PCI DSS Compliance

    Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.

  • The Perfect Rx for HIPAA Compliance

    Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.

  • What You SIEM is What You Get

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Threat Intelligence Evaluator's Guide

    One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.

  • Security Operations Center (SOC) Essentials for the SME

    Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.

  • How to Limit the Risk of Attack on your XP Assets

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

  • Unified Security Management: Real-time Threat Detection

    This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.