cybersecurity.att.com Open in urlscan Pro
2a02:26f0:1700:394::2db1  Public Scan

Submitted URL: http://alienvault.com/
Effective URL: https://cybersecurity.att.com/
Submission: On December 27 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search-results

<form action="/search-results" method="get" id="top-search-form" __bizdiag="113" __biza="WJ__"><input name="q" id="top-search-form-text" type="text" placeholder="Search" aria-label="Search"><button type="submit" aria-label="Search"><svg
      xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" fill="#ffffff" class="w-5 h-5">
      <path fill-rule="evenodd" d="M9 3.5a5.5 5.5 0 100 11 5.5 5.5 0 000-11zM2 9a7 7 0 1112.452 4.391l3.328 3.329a.75.75 0 11-1.06 1.06l-3.329-3.328A7 7 0 012 9z" clip-rule="evenodd"></path>
    </svg>
  </button></form>

GET /search-results

<form action="/search-results" method="get" id="mobile-search-form" __bizdiag="113" __biza="WJ__">
  <input name="q" id="mobile-search-form-text" type="text" placeholder="Search" aria-label="Search" class="d-block w-100">
  <button type="submit"><span class="ac ac-search" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16">
        <path d="M11.742 10.344a6.5 6.5 0 1 0-1.397 1.398h-.001c.03.04.062.078.098.115l3.85 3.85a1 1 0 0 0 1.415-1.414l-3.85-3.85a1.007 1.007 0 0 0-.115-.1zM12 6.5a5.5 5.5 0 1 1-11 0 5.5 5.5 0 0 1 11 0z"></path>
      </svg></span></button>
</form>

Text Content

View all AT&T Business Products ⟶
 * 
 * Contact
 * Support

Contact Us
 * 
   
 * Products
    * Cybersecurity Consulting Services
      
      CYBER STRATEGY
      
       * Strategy and Roadmap Planning
       * Enterprise Security Assessment Services
       * Risk-based Cyber Posture Assessment
      
      RISK AND COMPLIANCE
      
       * Security Compliance
      
      VULNERABILITY AND THREAT MANAGEMENT
      
       * Managed Vulnerability Program
       * Penetration Testing
       * Adversary Simulation Services
       * Incident Response Services
      
      CSO ADVISORY SERVICES
      
       * Cybersecurity IQ Training
   
    * Managed Security Services
      
      NETWORK SECURITY
      
       * Secure Web Gateway
       * Secure Remote Access
       * SASE Branch with Fortinet
       * SASE with Palo Alto Networks
       * Reactive Distributed Denial of Service Defense
       * View All
      
      THREAT DETECTION
      
       * Managed Threat Detection and Response
      
      ENDPOINT SECURITY
      
       * SentinelOne
       * Ivanti (MobileIron)
       * Lookout Mobile Endpoint Security
   
    * Network Security
      
      AT&T TRUSTED INTERNET ACCESS
      
       * Secure Web Gateway
       * Secure Remote Access
       * Bundled Security Services with Check Point
       * Network Based Firewalls
       * Premises Based Firewalls
       * Premises-Based Firewall Express with Check Point
       * Enhanced Cybersecurity Services
      
      AT&T INFRASTRUCTURE AND APPLICATION PROTECTION
      
       * Reactive Distributed Denial of Service Defense
       * ACDN Prolexic DDoS
   
    * Endpoint Security
      
      ENDPOINT SECURITY
      
       * SentinelOne
       * Ivanti (MobileIron)
       * VMware Workspace ONE®
       * IBM MaaS360
       * Lookout Mobile Endpoint Security
       * McAfee Endpoint Protection
       * Samsung Knox
   
    * Threat Detection and Response
      
      AT&T THREAT SOLUTIONS
      
       * Managed Threat Detection and Response
       * Threat Detection and Response for Government
       * USM Anywhere
       * USM Anywhere Advisors
       * XDR for MSSPs
       * USM Anywhere Integrations
      
      Powered by
      AT&T Alien Labs
   
    * Web Application and API Protection
       
    * Modernizing Network Security
       

   
 * Solutions
    * See All Solutions
   
   COMPLIANCE
   
    * Overview
    * GDPR
    * HIPAA
    * ISO 27001
    * PCI DSS
    * SOC 2
   
   INDUSTRY
   
    * Education
    * Energy Sector
    * Federal
    * Financial Services
    * Healthcare
    * Manufacturing
    * MSSPs
    * Retail
   
   ENVIRONMENT
   
    * 5G
    * AWS
    * Azure
    * Cloud
    * IOT/Mobility
    * Hybrid
    * Network
    * Remote Workforce
   
   SECURITY USE CASES
   
    * Intrusion Detection
    * Secure Access Service Edge
    * Secure Web Gateway
    * SIEM Platform Solutions
    * XDR
    * Zero Trust Architecture
   
   View All Solutions ⟶
   
 * Partners
    * Become a Partner
   
   CHANNEL PARTNERS
   
    * All Partner Programs
    * MSSP Program
    * Reseller Program
    * Professional Services
    * Partner Portal Login
   
   TECHNOLOGY PARTNERS
   
    * OTX Partners
    * Managed Security Partners
   
   Become a Partner ⟶
   
 * Resources
    * View All Resources
   
   PRODUCT RESOURCES
   
    * Customer Stories
    * Product Briefs
    * Solution Briefs
    * Use Cases
    * Free Trial
   
   SECURITY RESOURCES
   
    * Analyst Reports
    * Blogs
    * eBooks
    * Videos
    * Webcasts
    * White Papers
   
   CUSTOMER RESOURCES
   
    * Success Center
    * Certification
    * Customer Success
    * Documentation
    * Professional Services
    * Support Overview
    * Training
   
   BROWSE BY TOPIC
   
    * Incident Response
    * Intrusion Detection
    * Partner: MSSP & Reseller
    * Regulatory Compliance
    * Security Operations Center
    * SIEM & Log Management
    * Threat Detection
    * Threat Intelligence
   
   
   View All Resources ⟶
   
 * AT&T Alien Labs
 * Contact
 * Support

Get price


CONFIDENTLY CONNECT. INTELLIGENTLY PROTECT.

We provide broad cybersecurity experience and award-winning services for network
security, extended detection and response, and endpoints. From traditional
computing to edge computing, we’re focused on business innovation. We help make
complexity easy to understand and navigate.

Watch overview



REGISTER FOR OUR UPCOMING WEBINAR: 2023 AT&T CYBERSECURITY INSIGHTS REPORT: EDGE
ECOSYSTEM IN RETAIL ⟶

GET YOUR FREE COPY OF THE 2023 AT&T CYBERSECURITY INSIGHTS REPORT: FOCUS ON
TRANSPORTATION ⟶

AT&T CYBERSECURITY BLOG IN TOP 10 CORPORATE CYBERSECURITY BLOGS ⟶

AT&T CYBERSECURITY WINS 2023 CYBERSECURITY BREAKTHROUGH AWARD




THE LATEST FROM AT&T CYBERSECURITY SERVICES

2023 AT&T Cybersecurity Insights Report


EDGE ECOSYSTEM

Learn more ⟶

Learn more


PROTECT AGAINST RANSOMWARE WITH THE AT&T MANAGED VULNERABILITY PROGRAM

Get started ⟶

2023 FROST & SULLIVAN MARKET REPORT


AT&T CYBERSECURITY POSITIONED AS LEADER IN GLOBAL MANAGED DETECTION AND RESPONSE

Download report ⟶

2023 SC Media Awards


AT&T ALIEN LABS TAKES HOME 'BEST THREAT INTELLIGENCE' AWARD

Learn more ⟶

CYBERSECURITY PRODUCTS


AT&T CYBERSECURITY HELPS MAKE YOUR NETWORK MORE RESILIENT


CYBERSECURITY CONSULTING SERVICES


CYBERSECURITY CONSULTING SERVICES TRIANGLE ICON

Managed Vulnerability Program
Strategy and Roadmap Planning
Risk-based Cyber Posture Assessment
Penetration Testing Service

View all


ENDPOINT
SECURITY


ENDPOINT SECURITY TRIANGLE ICON

SentinelOne
Ivanti (MobileIron)
VMware WorkSpace One®
Lookout Mobile Endpoint Security

View all


NETWORK
SECURITY


NETWORK SECURITY TRIANGLE ICON

AT&T SASE with Palo Alto Networks
Bundled Security Services with Check Point
AT&T Secure Remote Access
AT&T Secure Web Gateway

View all


THREAT DETECTION
AND RESPONSE


THREAT DETECTION AND RESPONSE TRIANGLE ICON

Managed Threat Detection and Response
USM Anywhere
XDR for MSSPs
Threat Detection and Response for Gov't

View all

CYBERSECURITY SOLUTIONS


DIGITAL TRANSFORMATION IS CHANGING THE WAY ORGANIZATIONS ADDRESS CYBER RISK


FINANCE

Learn more ⟶


HEALTHCARE

Learn more ⟶


MANUFACTURING

Learn more ⟶


RETAIL

Learn more ⟶


CLOUD

Learn more ⟶


MOBILITY AND IOT

Learn more ⟶

 


NETWORKING

Learn more ⟶

RECOMMENDED RESOURCES

eBook


UNLOCK THE PROMISE OF XDR


Read
Webcast


MODERNIZE NETWORK SECURITY: SUPPORT MIGRATION TO CLOUD SERVICES


Watch
Infographic


2023 THE EDGE ECOSYSTEM


Explore
 
 

LATEST BLOGS

Security Essentials
Conversational AI vs. generative AI: What’s the difference?
Read more ⟶
Security Essentials
Data breaches: In-depth analysis, recovery strategies, and best practices
Read more ⟶
Security Essentials
Can any measures stop the rise of tech scams?
Read more ⟶
 
 

Visit our blog

Get price Free trial
From the Blog

ANAS BAIG

Dec 26, 2023


CONVERSATIONAL AI VS. GENERATIVE AI: WHAT’S THE DIFFERENCE?

Explore All Blog Posts ›
Twitter LinkedIn Youtube
Who We Are
 * Alien Labs
 * Careers
 * Contact Us

News
 * Newsroom
 * Events
 * Blogs

Partners
 * Partner Programs
 * Partner Portal

Products
 * AT&T Managed Threat Detection and Response
 * USM Anywhere
 * XDR for MSSPs
 * Open Threat Exchange (OTX)
 * OSSIM

Solutions
 * Cloud Security Monitoring
 * Threat Detection
 * Intrusion Detection
 * SIEM platform solutions
 * Vulnerability Assessment
 * See All Solutions

Resources
 * Resources
 * Blogs
 * Customer Reference Guide

Customer Success
 * Support & Services
 * Success Center
 * Documentation Center
 * Training
 * Certification

Contact us

© Copyright 2023

 * Privacy Policy
 * Website Terms of Use
 * GDPR
 * Cookie Policy
 * Your Privacy Choices



We use cookies to provide you with a great user experience. By using our
website, you agree to our Privacy Policy and Website Terms of Use.







Live Chat