AT&T Named by Gartner as Leader in Managed Security Services

By Laura Stotler December 20, 2012

AT&T has been singled out as a leader by Gartner in the company's Magic Quadrant for MSSPs, North America report. The telecom giant also ranked high in Gartner's MarketScope for Managed Security Service reports for both Europe and the Asia/Pacific region.

Cyber security and IT groups today must go beyond securing the immediate corporate network and increasingly have to secure an array of end devices and users throughout the world. Many businesses turn to a managed security service provider (MSSP) to help with this task, which can place a major burden on internal IT departments.

AT&T has been working in the area of cyber security capabilities for a long time, and AT&T Labs and its cyber security organization work closely to provide advanced security technology solutions. MSSPs must be able to deploy and manage security controls that can be quickly adjusted to identify and fend off constantly changing cyber threats.

The extensive portfolio of managed network security services from AT&T offers a comprehensive approach covering network security, security compliance and business continuity. Tactics include assessing vulnerabilities, keeping data and infrastructure secure, detecting attacks and responding to suspicious activities, enforcing corporate security policies and supporting compliance with federal and industry regulations.

Additional services include protecting e-mail from viruses, worms and spam, and managing Internet access through firewalls to help block Web malware from the corporate network. AT&T also monitors customers' networks and alerts IT staff to possible attacks and the company also provides detailed security-event reporting, information and analysis.

"Most security services react to attacks after they have occurred and attempt to minimize the impact," said Ed Amoroso, chief security officer, AT&T. "However, our preventative approach is designed to help keep customer networks and applications running. We use 'defense in depth' security architecture with security features built into every network layer and every supporting process. Each security service in our portfolio provides a different and enhanced layer of protection."




Edited by Jamie Epstein

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Verizon Needs Tough Love on Copper Policies

By: Doug Mohney    1/29/2015

New regulation on broadband and telecommunications providers is at top of mind here at ITEXPO. Jeff Pulver, founder and chief executive of pulver.com …

Read More

OTT Video Set to Top $6 Billion in 2019

By: Tara Seals    1/29/2015

When it comes to over-the-top (OTT) video, it has grown not only in developed regions but also in emerging markets, both as an alternative and complem…

Read More

Digium CEO: Businesses at Every Level Can Get Started with UCaaS

By: Allison Boccamazzo    1/29/2015

Digium CEO Danny Windham made one thing clear during his keynote presentation at ITEXPO 2015: Businesses of all kinds, at every developmental level, c…

Read More

When Gaming Isn't a Game: 3 Best Practices to Protect Your Hosting Service Against DDoS Attacks

By: Joe Eskew    1/28/2015

The unprecedented number of security breaches, hacks and DDoS attacks on gaming communities, software manufacturers and even Hollywood studios grew to…

Read More

No Hackers Took Down Facebook; Hour's Outage Mostly Internal

By: Steve Anderson    1/28/2015

Facebook released a statement not long after the outage had hit, revealing that the cause of the shutdown was not "...the result of a third-party atta…

Read More