Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

AT&T Cybersecurity

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all size.

At AT&T Cybersecurity, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial

Our Website: http://www.alienvault.com


Latest Content From AT&T Cybersecurity

Whitepaper: 6 Steps SIEM Success

by AT&T CybersecurityJan 04, 2019

Whether you are looking at SIEM for threat management or compliance, we've put together the following evaluation guide to help you find the best SIEM solution for your organization.

Whether your goals are to:
• Detect Threats
• Achieve Compliance
• Fuel Incident Response

(or all of the above), these six steps to SIEM success will guide your team through key considerations to prepare for your SIEM deployment and choose a solution that will work for your environment.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Research Report: Beginner's Guide to AWS Security Monitoring

by AT&T CybersecurityJan 04, 2019

As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year's report.

This report will examine a number of these concerns in detail, and specifically address how to avoid making costly mistakes that can leave data exposed.

You'll learn:
• The 3 biggest concerns in cloud security
• What steps to take to fix these concerns
• Best practices for AWS security

Download the free guide now to bolster your approach to AWS security monitoring.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to SIEM

by AT&T CybersecurityJan 04, 2019

Need a crash course on SIEM? No problem.

Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn't) and how to get up and running with it quickly and painlessly.

You'll learn everything you need to know about:
•Critical information stored in your logs and how to leverage it for better security
•Requirements to effectively perform log collection, log management, and log correlation
•How to integrate multiple data sources
•What features to look for in a SIEM solution

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner’s Guide to Open Source Incident Response Tools & Resources

by AT&T CybersecurityJan 04, 2019

In this beginner's guide, you'll read about the best open source tools for incident response, resources for how and when to use them, and how to determine the source of an attack.

Topics cover the three A's of incident response: Ammunition, Attribution and Awareness
• Ammunition - Finding the right open source tools for incident response
• Attribution - Identifying ownership on the anonymous internet
• Awareness - Emphasizing the importance of security at your organization

Download your copy of the Beginner's Guide to Open Source Incident Response Tools & Resources today and learn how to triage, contain, and respond to attacks.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Research Report: 2018 Threat Intelligence Report

by AT&T CybersecurityJan 04, 2019

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs.

This threat intelligence report, produced by Cybersecurity Insiders, explores how organizations are leveraging threat intelligence data, the benefits and most critical features of threat intelligence platforms, and the biggest cyber threats organizations are using their threat intelligence to combat.

Download this report now to learn industry findings around threat intelligence.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


E-Book: How to Build a Security Operations Center (on a Budget)

by AT&T CybersecuritySep 25, 2018

In this eBook, you'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

The chapters you'll read focus on:
• The roles and responsibilities involved in a security operations team
• The key processes you'll need to build a security operations center
• The essential security monitoring tools needed for a fully functional security operations center
• How threat intelligence is used in a security operations center
• Real world examples of how organizations have used AlienVault USM to power their security operations center

For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported by multiple monitoring technologies and real-time threat updates doesn't seem all that DIY. Download this eBook today to learn how to build a SOC without requiring costly implementation services or large teams to manage it.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Ransomware Prevention & Detection

by AT&T CybersecuritySep 25, 2018

If you haven't had first-hand experience with ransomware in the past, chances are you've heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year.

In this whitepaper, we'll cover ransomware basics and provide best practices for ransomware prevention and detection.

You'll learn:
• What ransomware is, how it works, and who the attackers are
• 10 best practices you can employ now to detect and prevent ransomware
• How you can quickly detect ransomware and other threats with AlienVault USM

Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Open Source Network Security Tools for Beginners

by AT&T CybersecuritySep 25, 2018

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

In this whitepaper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

You'll learn about using open source tools for:

• Network discover
• Network IDS
• Vulnerability scanning
• Penetration testing

Download your copy today and learn how to get started with open source network security tools.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Threat Intelligence

by AT&T CybersecuritySep 25, 2018

A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus on scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answer.

In this beginner's guide, you'll learn about:

• Different threat intelligence sources
• Why threat intelligence is critical for threat detection
• The benefits of threat intelligence
• How to generate threat intelligence

Download this paper today to learn what threat intelligence is, what it is not, and why it is critical for organizations of all sizes to improve their threat detection, prioritization, and response capabilities.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Brute Force & DDoS Attacks

by AT&T CybersecuritySep 25, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force attacks
• DDoS and brute force attack response options
• The future of DDoS and brute force attacks

Download this whitepaper for guidance on what you should do to defend your network from these types of attacks.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.