Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

AT&T Cybersecurity

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all size.

At AT&T Cybersecurity, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial

Our Website: http://www.alienvault.com


Latest Content From AT&T Cybersecurity

Whitepaper: Unified Security Management vs. SIEM: A Technical Comparison

by AT&T CybersecurityJul 27, 2018

Get a full overview of the changing security landscape, and more importantly insight into the rapidly changing SIEM category, and the reasons that have led to those change. To offer a complete picture of the changes to SIEM technology, it is valuable for some to understand the context of the SIEM market and how (and why) AlienVault Unified Security Management differentiates itself from the traditional approach.

Download the full report to explore:
• The History of "SEM, SIM, or SIEM?"
• What's Wrong with SIEM?
• What Options Organizations Have Besides SIEM?
• AlienVault's Unified Security Management platform
• AT&T Alien Labs Threat Intelligence and Open Threat Exchange

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


E-Book: Beginners Guide to SIEM

by AT&T CybersecurityJul 27, 2018

Need a crash course on SIEM? No problem.

Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn't) and how to get up and running with it quickly and painlessly. You'll learn everything you need to know about:

• Critical information stored in your logs and how to leverage it for better security
• Requirements to effectively perform log collection, log management, and log correlation
• How to integrate multiple data sources
• What features to look for in a SIEM solution

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


E-Book: How to Build a Security Operations Center (on a Budget)

by AT&T CybersecuritySep 25, 2018

In this eBook, you'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.

The chapters you'll read focus on:
• The roles and responsibilities involved in a security operations team
• The key processes you'll need to build a security operations center
• The essential security monitoring tools needed for a fully functional security operations center
• How threat intelligence is used in a security operations center
• Real world examples of how organizations have used AlienVault USM to power their security operations center

For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported by multiple monitoring technologies and real-time threat updates doesn't seem all that DIY. Download this eBook today to learn how to build a SOC without requiring costly implementation services or large teams to manage it.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Ransomware Prevention & Detection

by AT&T CybersecuritySep 25, 2018

If you haven't had first-hand experience with ransomware in the past, chances are you've heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year.

In this whitepaper, we'll cover ransomware basics and provide best practices for ransomware prevention and detection.

You'll learn:
• What ransomware is, how it works, and who the attackers are
• 10 best practices you can employ now to detect and prevent ransomware
• How you can quickly detect ransomware and other threats with AlienVault USM

Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Threat Intelligence

by AT&T CybersecuritySep 25, 2018

A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus on scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answer.

In this beginner's guide, you'll learn about:

• Different threat intelligence sources
• Why threat intelligence is critical for threat detection
• The benefits of threat intelligence
• How to generate threat intelligence

Download this paper today to learn what threat intelligence is, what it is not, and why it is critical for organizations of all sizes to improve their threat detection, prioritization, and response capabilities.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to Brute Force & DDoS Attacks

by AT&T CybersecuritySep 25, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force attacks
• DDoS and brute force attack response options
• The future of DDoS and brute force attacks

Download this whitepaper for guidance on what you should do to defend your network from these types of attacks.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Open Source Network Security Tools for Beginners

by AT&T CybersecuritySep 25, 2018

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.

In this whitepaper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.

You'll learn about using open source tools for:

• Network discover
• Network IDS
• Vulnerability scanning
• Penetration testing

Download your copy today and learn how to get started with open source network security tools.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Research Report: 2018 Threat Intelligence Report

by AT&T CybersecurityJan 04, 2019

Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs.

This threat intelligence report, produced by Cybersecurity Insiders, explores how organizations are leveraging threat intelligence data, the benefits and most critical features of threat intelligence platforms, and the biggest cyber threats organizations are using their threat intelligence to combat.

Download this report now to learn industry findings around threat intelligence.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner’s Guide to Open Source Incident Response Tools & Resources

by AT&T CybersecurityJan 04, 2019

In this beginner's guide, you'll read about the best open source tools for incident response, resources for how and when to use them, and how to determine the source of an attack.

Topics cover the three A's of incident response: Ammunition, Attribution and Awareness
• Ammunition - Finding the right open source tools for incident response
• Attribution - Identifying ownership on the anonymous internet
• Awareness - Emphasizing the importance of security at your organization

Download your copy of the Beginner's Guide to Open Source Incident Response Tools & Resources today and learn how to triage, contain, and respond to attacks.

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.


Whitepaper: Beginner's Guide to SIEM

by AT&T CybersecurityJan 04, 2019

Need a crash course on SIEM? No problem.

Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn't) and how to get up and running with it quickly and painlessly.

You'll learn everything you need to know about:
•Critical information stored in your logs and how to leverage it for better security
•Requirements to effectively perform log collection, log management, and log correlation
•How to integrate multiple data sources
•What features to look for in a SIEM solution

AT&T and AlienVault have joined forces to create AT&T Cybersecurity, with a vision to provide phenomenal threat intelligence, collaborative defense, and effective security for organizations of all sizes.