One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1043174
Date de publication 2019-02-26 17:00:00 (vue: 2019-02-26 19:00:51)
Titre AT&T Cybersecurity Is Born
Texte Today marks another new milestone and I am proud to unveil our new name….AlienVault has now combined with AT&T Cybersecurity Consulting and AT&T Managed Security Services to form a new standalone division, AT&T Cybersecurity! Digitalization continues to drive rapid changes in business models and network architectures. On the other hand, it also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year. The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology. AT&T started down this path years ago by building a best-of-breed Cybersecurity Consulting practice and Managed Security Services business serving customers of all sizes, across industries, and around the world. Combined with its network visibility across the threat landscape, AT&T has been well-positioned to take a unique role in cybersecurity. With the acquisition of AlienVault, AT&T Cybersecurity will continue to deliver on our joint vision to address these “seams” and uniquely bring together people, process, and technology through a “software defined” unified security management platform. A platform that integrates, automates and orchestrates a wide spectrum of best-of-breed point security products. By abstracting much of the management of individual security products, we are automating deployment and ongoing operations, and operating them as a single unified solution - much in the same way AlienVault had done with the critical capabilities required for threat detection and response.  This platform will use the technical capabilities and reach of AT&T’s Edge-to-Edge intelligence in order to deliver solutions as on-demand digital services optimized to help protect customers through their own digital transformation journey. We will accomplish this through collaboration with AT&T’s industry-leading Chief Security Organization and through the integration and automation of AT&T Alien Labs threat intelligence into the platform.  The combination of Open Threat Exchange now curated by Alien Labs and AT&T’s incredible breadth and depth of threat intelligence will create one of the world’s leading threat intelligence platforms! AT&T Cybersecurity is uniquely positioned to provide security without the seams  through people, process and technology, which will provide UNRIVALED VISIBILITY for our customers! 2019 is off to a great start! Stay tuned for more exciting news from AT&T Cybersecurity that will enable our customers to anticipate and act on threats to help protect their business!   
Envoyé Oui
Condensat “software   the 2019 abstracting accomplish according acquisition across act address ago alien alienvault all also another anticipate apparent approach approaches architectures are around at&t at&t’s attacks automated automates automating automation been best between born breach breaches breadth breed bring building business capabilities cause changes chief collaboration collaborative combination combined complex consulting continue continues coordinated create critical curated customers cybercrime cybercriminals cybersecurity data defined” deliver demand deployment depth detection digital digitalization disparate dispersed division done down drive drives easier edge enable exchange exciting explosion fighting form from gaps great had hand harvest has help how incident incredible individual industries industry insights integrates integration intelligence its joint journey labs landscape last launch leading least making managed management marks milestone mismatch models more much name… network networks new news now off one ongoing open operate operating operations optimized orchestrates orchestrating order organization organizations organizations’ other own path people platform platforms point positioned postures practice present presented process products protect proud provide rapid reach relative reported required requires respondents response role root same scale seams  security services serving single sizes solution solutions sophistication spectrum stagnation standalone start started stay suffer survey take technical technologies technology them these threat threats through today together transformation tuned type unified unique uniquely unrivaled unveil use visibility vision way well which wide will without world world’s year years
Tags Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: