Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

AT&T Offers Cloud Security Solution Powered by Blue Coat

Telecommunications giant AT&T announced on Tuesday that it is offering a new cloud-based security solution designed to protect customers against malware and malicious websites while offering security policy control across enterprise, web, social and mobile networks.

Telecommunications giant AT&T announced on Tuesday that it is offering a new cloud-based security solution designed to protect customers against malware and malicious websites while offering security policy control across enterprise, web, social and mobile networks.

Without having to deploy on-site equipment, customers can enforce consistent global security policies across wired, roaming, and mobile environments, AT&T said.

Called AT&T Cloud Web Security, the solution can accommodate businesses of any size and is powered by Blue Coat Systems’ Security Policy and Enforcement Center, which protects against web and network-based threats and helps prevent data loss.

“Reduced budgets, staff/skill shortages, and growing compliance and regulatory demands are forcing IT organizations to do more with less,” AT&T said. “Cloud-based security solutions from AT&T will allow customers to get more value from their IT staff to secure enterprise and employee assets.”

According to AT&T, the cloud-based solution provides the following benefits:

Reduced cost and complexity – As a user-based subscription, AT&T Cloud Web Security enables customers to pay only for what they need and scale their web threat protection on-demand, eliminating the need to buy, deploy and maintain on-site hardware or software.  

Real-time, dynamic malware protection – AT&T Cloud WSS uses a combination of real-time analysis, malware scanning and shared threat intelligence from 75 million users to block suspicious and malicious web content. By blocking communications to command and control servers, the service also enables IT to quickly identify and quarantine infected systems.

Customized web application controls – Customers can protect their network while enabling employees to use the applications that allow them to be more productive. Customers can set policies to manage application use based on a wide range of criteria, including user, group, applications, operations, postings, and media transfer controls.

Advertisement. Scroll to continue reading.

Powerful, intuitive policy management and reporting – Proxy and policy technologies allow administrators to quickly and easily enforce broad-based or detailed policies for network access and use – from small groups to hundreds of thousands of users – all in one simple configuration.

“Six months ago, we told our customers we’d deliver better end-to-end protection, making major improvements to our network-based defense, cloud security, secure mobile business, and threat management solutions,” said Andy Daudelin, VP, Security Services, AT&T Business Solutions. “Since then, we announced significant enhancements in each of these areas, but we’re not stopping here. The launch of this new on-demand cloud security solution is an important milestone in our commitment to deliver improved security, analytics, and threat visibility to our customers.”

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...