AT&T Bolsters Network-Based FirewallAT&T Bolsters Network-Based Firewall
Enhancements include IM antivirus scanning, expanded URL filtering, IDS/IPS
August 4, 2009
DALLAS, Aug. 3 /PRNewswire-FirstCall/ -- AT&T Inc.* (NYSE: T) has announced the availability of enhanced security features and functionality for its Network-Based Firewall offering. AT&T's Network-Based Firewall service is a fully managed, cost-effective solution that allows customers to manage and control individual users' access to the Internet and help prevent unauthorized access into their corporate AT&T network, without the expense of premises equipment.
"AT&T's 'in the cloud' approach to managed security delivers some of today's most powerful weapons to combat cyber security attacks," said Bill O'Hern, Assistant Vice President, Technology Security, AT&T Business Solutions. "Enhancements to our Network-Based Firewall offering are bringing more complete Internet protection to enterprises by tapping into AT&T's scalable, reliable global IP network; our security experts who have in-depth, hands-on experience; and the innovation and research of the AT&T Labs team."
New Features and enhancements to AT&T's Network-Based Firewall include:
-- Anti-virus scanning of instant messaging applications, including ICQ, MSN, Yahoo! and AOL Instant Messenger. -- Expanded URL filtering, allowing or blocking access to more than 80 categories of Internet Web sites. -- User Authentication to set policy controls over user level access to the Internet. -- Inline scanning of HTTP and FTP content for common virus, spyware and malware threats and vulnerabilities. -- Active Intrusion Detection and Intrusion Prevention Services (IDS/IPS), providing customizable policies and proactive investigational analysis and mitigation support -- Additional security features and functionality, enabling customers to better manage their network security infrastructure.
Interest in managed security services continues to grow. More than 73 percent of participants in Nemertes Research's Security and Information Protectionbenchmark said they are already using, planning to use or actively evaluating managed or carrier-based security services. Organizations are turning to providers like AT&T as they grapple with a lack of specialized skills and staffing to handle these critical security functions internally(1).
AT&T's Network-Based Firewall is fully managed by a highly specialized staff of security technicians who continuously screen applications and administer firewalls, intrusion detection signatures, filters, patches and servers. The firewalls are actively managed and monitored 24x7 at AT&T's Security Network Operations Center (S/NOC), a protected, fully-redundant site equipped with emergency backup power.
AT&T was in the leader's quadrant of Gartner Inc.'s 2009 "Magic Quadrant for MSSPs, North America" report(2). The Magic Quadrant measures vendors on their ability to execute and their completeness of vision and was developed as a guide for enterprises evaluating Managed Security Service Providers (MSSPs).
AT&T delivers a suite of security and business continuity services to help assess vulnerabilities, protect infrastructure, detect attacks, and respond to suspicious activities and events. More information on AT&T's managed security offerings can be found at www.att.com/security.
(1) Network-Based Firewall: Extending the Firewall into the Cloud, http://www.business.att.com/content/whitepaper/Nemertes_DN0496_Network-Based_Firewall_Services_May_2009.pdf
(2) About the Magic Quadrant
The Magic Quadrant is copyrighted 2009 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the Leaders quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner Research "Magic Quadrant for MSSPs,North America" by Kelly M. Kavanagh, John Pescatore, 16 April, 2009
*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.
AT&T Inc. (NYSE: T) is a premier communications holding company. Its subsidiaries and affiliates - AT&T operating companies - are the providers of AT&T services in the United States and around the world. With a powerful array of network resources that includes the nation's fastest 3G network, AT&T is a leading provider of wireless, Wi-Fi, high speed Internet and voice services.
AT&T offers the best wireless coverage worldwide, offering the most wireless phones that work in the most countries. It also offers advanced TV services under the AT&T U-verse(SM) and AT&T |DIRECTV(SM) brands. The company's suite of IP-based business communications services is one of the most advanced in the world. In domestic markets, AT&T's Yellow Pages and YELLOWPAGES.COM organizations are known for their leadership in directory publishing and advertising sales. In 2009, AT&T again ranked No. 1 in the telecommunications industry on FORTUNE(R)magazine's list of the World's Most Admired Companies.
Additional information about AT&T Inc. and the products and services provided by AT&T subsidiaries and affiliates is available at http://www.att.com.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Quantifying the Gap Between Perceived Security and Comprehensive MITRE ATT&CK Coverage
5 Reasons To Move your PKI Deployment to the Cloud