What AT&T Threat Manager can achieve for you
AT&T Threat Manager helps you protect your most important assets
AT&T Threat Manager
Contact us for pricing
AT&T Threat Manager powered by Threat Intellect® offers cybersecurity threat detection and response. We will prioritize alerts and response recommendation based on risk and customer inputs, allowing the customer to prioritize asset importance
AT&T Threat Manager for AWS
Contact us for pricing
AT&T Threat Manager is now integrated with AWS, so you can see security cases and alerts spanning your devices, systems and cloud-based services to help you quickly address and respond to new threats
Features and Highlights
Threat Manager solutions that fit your business
|Access to security experts||Access our security experts (i.e. GIAC certified intrusion analysts, CISSP, CEH, and other certifications) who work with large volumes of threats and monitor traffic 24/7.|
|Create customized reports||Create customized reports which can be quickly reviewed and understood by executive level staff, IT managers, and SecOps alike.|
|Work towards maintaining visibility of your information||Maintain full visibility of your important assets and information as you move them to the cloud.|
|Become more efficient with IT/security spend||Spend less time, money, and resources investigating and attending to false positives and anomalies.|
Frequently Asked Questions
- How is Threat Manager different?
As company’s demands scale, they require the agility of cloud but need end to end monitoring and visibility across their entire network. AT&T Threat Manager powered by Threat Intellect® identifies cybersecurity risks to your organization faster and more accurately than ever before. Our design enables you to have a holistic view across your infrastructure on premises and in the cloud, in a single, manageable view
Threat Manager is comprised of the following:
- Industry leading SIEM
- Log Management
- Applied Threat Intelligence
- AT&T expert SOC Analysts
- How does Threat Manager handle log management and data storage?
Logs are stored for 1 year with 90 days available in hot storage, the remaining data is accessible via cold storage
- What is required to setup Threat Manager service?
The customer’s company policy must allow for syslog data to be hosted on AT&T and AWS servers and off premises to install Threat Manager
- What regulatory requirements does Threat Manager support?
Threat Manager helps customers work towards regulatory compliance for PCI, HIPAA and ISO. Threat Manager provides reporting on an as-needed basis by customers. The dashboard includes predefined report templates to help simplify regulatory reporting
- How is Threat Manager priced?
Threat Manager uses EPS (Events Per Second) volume-based pricing. Please contact an AT&T representative to discuss your specific cloud services and log management needs
Explore more about AT&T Managed Cybersecurity Solutions
Speak to a sales rep
Request a follow-up
Your feedback will help us to improve AT&T Business so you continue to have a great experience when visiting us!
This survey is conducted by an independent company ForeSee for AT&T.