The threat landscape continues to grow

  • According to the IP Commission Report of May, 2013, there is a $300B annual loss in the U.S. due to International IP theft.

  • Traditional lines of defense are no longer enough to keep your business safe.

Cyber security breaches are occurring with greater frequency and at larger scales. This forces companies to not only worry about threats to their own operations, but about protecting their customers’ information as well. Top security concerns before, during, and after breaches include sustaining company operations, protecting intellectual property, and fending off threats to customers. Preventing attacks, as well as the damage caused by the attacks themselves, can be incredibly costly; according to The Economist, July 2014, cyber security breaches cost the global economy an astounding $445 billion a year. So how does a company defend itself against the ever-expanding threat landscape?

Take a holistic approach to security

Companies need to take a holistic approach to security with a unified platform, preferably one that can help prevent, detect, and respond to these new threats. A holistic approach can offer companies the ability to choose the best prevention, detection, and response capabilities to fit the enterprise’s needs.


worker on phone


4-layer proactive threat management

Traditional lines of defense are no longer enough to keep your business safe. Just defending the perimeter can be costly, complex, and limiting. In reality, with mobility so prevalent and IoT becoming a larger part of business plans, there really is no such thing as a perimeter anymore. That’s why a layered approach to enterprise security is essential. The AT&T approach focuses on securing these four layers:

1. Device LayerMeasures with the device manufacturer and AT&T/third party built-in security controls, like certificates and Mobile Device Management, help protect the hardware (or the “thing” that is connected).

2. Connectivity LayerThe network helps protect connections in a highly secure manner through AT&T Virtual Private Network, Private APN, and Private SMS User Groups.

3. Data/Application LayerOur security solutions help protect the data and applications that are connected to the network through Firewall, Data Loss Prevention, Intrusion Detection, Machine Controls, and Enterprise Mobile Device Management.

4. Threat-Analysis LayerUsing Context Aware/Behavioral Analytics to understand how hardware is being used, where it is being used, and who is using it, we apply protection to the threat-analysis layer. We can do this at the connectivity, device, or data/application level by analyzing the traffic coming in and out of that device, connection, or application and identifying abnormalities such as an unauthorized user in a different location to prevent, detect, and respond against threats.

AT&T offers unparalleled visibility and comprehensive analytics to help detect and respond to threats in near real time. As of May 2015, 92.4 petabytes of data cross our network every day. This volume of data provides us insight into the current threat landscape and allows us to better detect patterns in attack traffic. In fact, we’ve increased the volume of data we examine and analyze each day by 60% to better protect against evolving threats. The strength of the AT&T network helps reduce attacks before they impact our customers, because of the comprehensive analytics, threat insights, and data collection used to identify and respond to threats.

Learn more about how AT&T Threat Vulnerability Management can help protect your enterprise and your customers.

Jason Porter Security Solutions Vice President AT&T About Jason