AT&T security technology analyzes billions of threats in minutes

July 22, 2016 // By Jean-Pierre Joosting
Enabling businesses to detect, analyze and address security threats faster and more efficiently than ever before, AT&T's (Dallas, TX) Threat Intellect is more than a suite of security services – it's the security foundation built from the people, processes, products and tools that form the company's security backbone.

Threat Intellect is said to provide unparalleled visibility into the data patterns and threat activity across the network, helping businesses customize their security to meet their needs. It uses multitudes of unique threat signature data streams, analytics and intelligence to help detect known and unknown threats. And, Threat Intellect is constantly learning to adapt to the latest global security issues.

"AT&T secures more connections than any communications company in North America," said Steve McGaw, chief marketing officer, AT&T Business Solutions in a statement. "No carrier experiences the depth and scale of security threats we see on a daily basis – more than 30 billion vulnerability scans and 400 million spam messages are detected on our IP network. The power of Threat Intellect gives us the ability to process 5 billion security events, a full day's worth of activity for all of our security customers combined – in only 10 minutes."

Threat Intellect automates the deployment of security protections,  improving the speed at which security protection can be deployed by over 95%, greatly improving threat detection and resolution.

This transformation in security is similar to the progress made in computer search tools. "In the past, you had to know exactly where a specific file was stored to access it. Now, you only need a key word to find that file," McGaw said. "AT&T Threat Intellect has a similar capability. It is the power behind every AT&T firewall, network security protection and every other security capability we have integrated in our network and services."

This means AT&T can search across the data crossing our network from mobile devices, applications, data centers, or through our security services – and then help identify and address potential threats for customers on our network.

http://about.att.com