AT&T Managed Security Services - Help detect, deter and mitigate the damage of cyber attacks and business interruptions

Page created by Sarah Castro
 
CONTINUE READING
AT&T Managed Security Services - Help detect, deter and mitigate the damage of cyber attacks and business interruptions
Product
      Brief

AT&T Managed Security Services
Help detect, deter and mitigate the damage of cyber attacks
and business interruptions

Preserving Network Integrity,                       security model that customers are building        Benefits
Availability and Confidentiality                    for their businesses. Network-based security
Today’s Internet security threats range from        services are designed to stop security issues     • Execution
curious prowlers to savvy intruders, simple         before they reach your organization’s offices.    • Potential Financial Effectiveness
mischief to espionage. Without a plan to help       These measures operate in tandem with the
                                                                                                      • Highly Reliable Wireline and
protect your entire network and its connection      AT&T Threat Management system that scans
                                                                                                        Wireless Networks
points, your defense is only as strong as its       traffic and helps AT&T security managers to
                                                    identify emerging problems, see their sources     • Global Resources
weakest link. AT&T Managed Security Services
adds a powerful protective layer, helping you       and take preventative action. To help protect
to maintain the security of your organizations      customer networks and services, AT&T uses
                                                                                                      Features
network as you access the Internet. This helps      “defense in depth” security architecture, with
you take full advantage of the Internet as a        security features built into every network        • AT&T DDoS Defense Service
means of enhancing your existing business           layer and every supporting process. The             provides security alerting and
relationships with your customers and suppliers.    theory of “defense in depth” is based on            mitigation of DDoS attacks
                                                    the concept that multiple diverse security          impacting your network
AT&T offers a wide range of security services,      measures are intrinsically more effective         • AT&T Mobile Security extends
availability and recovery services that provide     than a single homogenous defense. So, if            your security controls beyond
integrated business continuity and security         the security measures in the first network          the mobile device into the
solutions to support your complex networking        interface layer are breached, security              AT&T network
environments. We help organizations design,         measures placed inside the network edge at        • AT&T Firewall Services provides
deploy, manage and evolve networks, systems         the second and third layers help prevent an         enforcement of policy in the
and applications that are reliable and contain      attacker from being successful. This makes          cloud or at the premises with
security features designed to help protect          it more difficult for someone to penetrate a        optional features to perform
against cyber attacks and business interruptions.   network because there are layers of security        additional scanning
                                                    built into every system, process and piece of     • AT&T Web Security offers a
AT&T security solutions start within the AT&T
                                                    the network architecture. AT&T utilizes this        managed network solution for
Global Network, and extend to customers
                                                    “defense in depth” architecture with proactive      content filtering and web control
and their applications. Security features are
                                                    management to quickly and easily determine        • AT&T Intrusion Detection/
seen as an important component of all the
                                                    if known threats are being directed at our          Prevention Service helps detect
AT&T product portfolios. For example, in the
                                                    network or may effect application performance       and respond to malicious
development of services such as AT&T Voice                                                              activities by sending you alerts
                                                    and then mitigate these threats before they
over IP (VoIP), Virtual Private Networks (VPNs)                                                         specific to your network
                                                    can affect the network or the applications
and Remote Access, security features are
                                                    running across it. This way we can help reduce    • AT&T Security Consulting
taken into consideration during the process
                                                    the risks to our network and help protect your      Solutions utilizes our security
of designing the service architecture. The                                                              expertise to help safeguard your
                                                    AT&T network connections and the information
AT&T network is a major component in the                                                                IT infrastructure
                                                    crossing it.

                                                                                                     Share this with
                                                                                                        your peers
Product Brief - AT&T Managed Security Services _________________________________________________________________________________________________ 2

With AT&T Managed Security Services, you          Managed Security Diagram
get the benefit of enterprise-grade security
                                                                                      Partner          AT&T Service Node
services without the associated expense and                                                            Routing Complexes                    Global Customer
technology expertise required to support an         Headquarter/Branch                                                                      Support Centers
                                                                                                                                            Security Consulting
in-house staff. We design, build and manage                                                                                                 Ethical Hacking
                                                                                                                                            Penetration Testing
our services to be reliable – providing                        Edge-Based Intrusion
                                                                                                                                            Compliance Validation
                                                                                                                                            PCI Security Assessor
                                                               Prevention and Firewall
standardization, scalability and availability
                                                                                                                                     Analysis                        Web       App.
while you retain control. This means we                                                                                              Mitigation                      Servers   Servers   Storage
                                                                                                                        DDOS         Threat Management
provide the operations and day-to-day                                            Network-Based
                                                                                 Intrusion     Managed                  Scrubbing
                                                                                                                                     Internet Protect

security infrastructure and support and you                                      Detection     Authentication
                                                                                                                                                                                         Databases
provide the policies and overall decision
                                                                                Anti-Virus
                                                                                Anti-Spam               Network-Based
                                                                                                        N
                                                                                                                            AT&T Global IP Network
                                                                                Scanning                Firewall with URL
                                                                                                        F
making on how we apply those policies.                                                                  Screening

                                                                 Dial, DSL                                                          Non-AT&T Broadband/
AT&T provides both network-based and                  VPN        Cable                                                              Dial Carrier
                                                                                                         Premises-Based
premises-based security solutions. Our                                                                   Firewall
                                                                                                                                                                                         Storage
                                                                                                         Intrusion Detection                                        AT&T Internet
network-based approach enables us to                                                                     Custom Solutions
                                                                                                                                                                    Data Centers
efficiently manage network security issues,                                                                                                                         Premises-Based Firewall
                                                                                                                                                                    Intrusion Detection
redundancy, load balancing and recovery.                    Endpoint                                                           VPN and Endpoint
                                                                                                                                                                    Proxy
                                                                                                                                                                    Custom Solutions
                                                                                 Your Data Center
Our security expertise is based on protecting               Security                                                           Security                             Anaylsis and Threat Management

the AT&T global network infrastructure all
day, every day of the year. You benefit from
                                                  attacks do not impact the network or affect                                       network. These include network misuse,
that expertise, and are able to extend our
                                                  operations. AT&T has invested in developing                                       non-conformance to your network security
capabilities to your network when you use
                                                  and applying tools to achieve world-class                                         policies, network traffic anomalies that are
our security solutions. AT&T also offers
                                                  reliability, security features and business                                       indicators of possible threats, phishing attacks
premises-based solutions, giving you the
                                                  continuity for businesses. Each security                                          and other identifiable known threats.
flexibility to house security infrastructure
within your own premises.                         service in the AT&T portfolio provides a
                                                  different and enhanced layer of protection.                                       AT&T DDoS Defense Service
                                                                                                                                    AT&T DDoS Defense Service consists of
Proactive Network Security
                                                  AT&T Internet Protect®                                                            detection and mitigation service components
Most security services react to attacks after
                                                  AT&T Internet Protect is a security alerting                                      that examine your Netflow data. When
they have occurred and attempt to minimize
                                                  and notification service that offers                                              the detector identifies a DDoS attack, an
and contain damage. AT&T employs a
                                                  information regarding identified potential                                        alarm is sent to both an AT&T operations
preventative approach to help identify attacks
                                                  attacks, including viruses, worms and denial                                      center and to you with notification of the
and manage intrusions proactively by:
                                                  of service attacks that are in the early                                          detected attack. Concurrently, AT&T will
 • Assessing vulnerabilities                      formulation stages. This managed service                                          also contact you directly. AT&T systems are
                                                  culls information from the extensive AT&T                                         designed to reroute traffic directed at the
 • Proactively scanning for potential attacks     IP backbone which is one of the largest in                                        IP Addresses that have been identified as
                                                  the world. It performs examination of over                                        under attack to network scrubbing facilities
 • Helping to protect against
                                                  19 petabytes of daily network data to help                                        within the AT&T IP Backbone, where attack
   unauthorized access
                                                  identify malicious activity from the Internet                                     traffic is dropped and valid traffic is passed
 • Quickly responding to and reporting            which you can use to help predict and                                             to your access router. Traffic destined to
   suspicious activities                          prevent malicious traffic from infecting your                                     your IP Addresses that are not under attack,
                                                  network. Using the Web-based Information                                          continues to flow directly to your network.
Key to this preventative approach is the          Security Portal, pagers and e-mail, AT&T                                          Organizations who want to better protect
ability to not only collect data, but also to     notifies you of identified critical malicious                                     their network can obtain AT&T DDoS Defense
analyze, interpret and communicate it on          activity and recommends immediate action.                                         Service no matter who their service provider
a near real-time basis to help respond to         AT&T Internet Protect also delivers security                                      or carrier is. You don’t need to purchase
the incident. As the scope of cyber attacks       information such as top vulnerabilities, recent                                   network connectivity from AT&T to purchase
becomes more complex and creates more             patch releases and other security “need                                           AT&T DDoS Defense Service.
pervasive damage, prevention rather than          to-know” facts. In addition to features just
containment becomes more attractive to the                                                                                          We have conveniently packaged and
                                                  mentioned, AT&T customers benefit from an
bottom-line.                                                                                                                        simplified the purchasing, contracting and
                                                  additional service option within AT&T Internet
                                                                                                                                    billing of AT&T DDoS Defense Service, AT&T
                                                  Protect called Private Intranet Protect.
AT&T Managed Security Services                                                                                                      Network-Based Firewall Service, AT&T Secure
Portfolio                                         With the Private Intranet Protect option,                                         E-mail Gateway Service and AT&T Web
The core focus of AT&T is to keep networks        the traffic on your Virtual Private Network                                       Security Service under one contract and
and applications running – and to help            (VPN) is analyzed for known threats that                                          one invoice providing an efficient and
assure that viruses, worms and other              originate both internal and external to your                                      cost-effective way to meet your business
                                                                                                                                    security needs.

                                                                                                                                            Share this with
                                                                                                                                               your peers
Product Brief - AT&T Managed Security Services _________________________________________________________________________________________________ 3

AT&T Mobile Security                               We have conveniently packaged and                   the perimeter and within your network. The
Mobile security solutions typically scan           simplified the purchasing, contracting and          sensing components monitor data packet
for security risks at the device level only.       billing of AT&T Network-Based Firewall Service,     header and payload information to help
However, in order to maximize your                 AT&T Secure E-mail Gateway Service, AT&T            detect known malicious activity by comparing
wireless security and help defend against          Web Security Service and AT&T DDoS Defense          the traffic to a continually-updated database
unauthorized applications, e-mails, and            Service under one contract and one invoice          of over 1,000 existing attack signatures.
disruptions in business activities, AT&T Mobile    providing an efficient and cost-effective way       When a pattern of misuse is detected, the
Security service provides the capability to        to meet your business security needs.               system is designed to respond quickly and
extend your security controls beyond the                                                               automatically according to your predefined
device and into the AT&T network. Device           AT&T Premises-Based Firewall Service                policies. AT&T Intrusion Prevention can help
security includes the use of application           AT&T Premises-Based Firewall Service utilizes       detect, contain and neutralize known threats
controls and anti-virus/anti-malware scans.        industry-leading firewall platforms from Cisco,     that can attack any IP enabled endpoint on
Network security provides access to an             Checkpoint, Fortinet, Palo Alto Networks, and       your network.
organization’s Virtual Private Network or VPN,     Juniper. They protect your network perimeter
the Internet, or cloud-based services as well      from the hazards resulting from connecting          Additionally, a Host-Based intrusion detection/
as additional traffic filtering and scanning       the Internet with your private network.             prevention option is available within the AT&T
and is mobile carrier agnostic. It’s a security    AT&T Premises-Based solutions scale from            Intrusion Detection/Prevention Service. This
service that lets you extend, help protect,        small, home office environments to large            option consists of security software installed
and synchronize your security policies even        globally distributed organization networks.         on customer servers or hosts which monitors
if you’re not using AT&T wireless services.        The standard powerful firewall capability is        the networking subsystem or operating systems
                                                   complimented with the ability to add optional       to determine if new Transmission Control
AT&T Firewall Security                             features including high availability, support for   Protocol (TCP) or User Datagram Protocol (UDP)
AT&T Firewall services help protect                complex security policy, VPN, DMZ/extranet          services are started, or if existing services
organizations infrastructures with various         support and the Next Generation capabilities        have stopped.
network security functions. These fully-           of Intrusion Prevention Service, Anti-Virus
managed solutions are configured to match          filtering, Anti-Spam protection, Zero Day           AT&T Web Security Service
your specific requirements with flexibility to     Malware Detection, and URL content filtering.       AT&T Web Security service helps create a
select the right level of protection. Network-                                                         protected and productive Internet environment
Based firewall, Premises-Based firewall            AT&T Web Application Firewall Service               for your organization. The service is designed
and Web Application firewall services are          AT&T Web Application Firewall service               to keep malware off your network and allow
available. Day-to-day management and               is a fully managed security service that            you to control the use of the Web by employing
maintenance, expert support and proactive          combines Web Application Firewall                   Web Filtering, Web Malware Scanning and
24x7 security monitoring are provided.             technology with expert management and               Roaming User Support to protect users who
                                                   24x7 security monitoring to help protect web        are not on the corporate network.
AT&T Network-Based Firewall Service                applications and their underlying systems.          We have conveniently packaged and
By placing firewall functionality into the AT&T    Web Application Firewall helps customers            simplified the purchasing, contracting and
network infrastructure, AT&T Network-Based         meet Payment Card Industry 6.6 regulatory           billing of AT&T Network-Based Firewall Service,
Firewall service inspects inbound and              requirements. Web Application Firewalls are         AT&T Secure E-mail Gateway Service, AT&T
outbound traffic and is designed to take           deployed in front of the application servers as     Web Security Service and AT&T DDoS Defense
action according to your predefined security       a transparent Layer 2 bridge at the customer        Service under one contract and one invoice
policies. You can also select your company’s       premises or in a Hosted environment. It             providing an efficient and cost-effective way
required bandwidth allocation for Internet         provides protection without interrupting            to meet your business security needs.
access globally through the firewall. The          legitimate traffic to web applications.
service is available world-wide with firewall                                                          Additionally, AT&T Cloud Web Security Service
configurations ranging from simple outbound        AT&T Intrusion Detection/Prevention Services        is designed to provide comprehensive Web
only security policy to extensive bi-directional   Using around-the-clock network surveillance,        security including near real-time protection
policy with optional features, such as             AT&T Intrusion Detection/Prevention                 against viruses and malware, protection
Web filtering, malware scanning, intrusion         Service is designed to monitor unauthorized         against compromised/hacked web sites and
detection and prevention, Application Control,     attempts to access your business networks           granular control of Web applications. In
Data Loss Prevention as well as support            and provides you with the tools to help you         addition to near real-time content security,
to protect multiple, independent network           implement your internal network defense.            AT&T Cloud WSS includes Negative Day Defense,
segments. Reports summarizing events and           Similar to a security camera on a physical          which can help secure your organization
utilization as well as policy self-management      property, this service monitors network             from attacks that have not yet occurred. Best
capabilities are available through the AT&T        traffic by employing intrusion detection            of all, AT&T Cloud Web Security requires no
BusinessDirect® portal.                            sensing components at various points at             on-premises equipment which eliminates the

                                                                                                             Share this with
                                                                                                                your peers
Product Brief - AT&T Managed Security Services _________________________________________________________________________________________________ 4

need to install, house and maintain physical      The service also includes a number of reports
hardware. IT staff, who would have been           such as user activity, connection history and       AT&T Security Services Advantage
tasked to manage on-premises solutions, can       event logs as well as provides enforcement of
                                                                                                      Proven Execution
now be better utilized to secure enterprise       anti-virus updates and software patches.
                                                                                                       • Deployment of updates based
and employee assets.
                                                                                                         upon security and industry events
                                                  AT&T Encryption Services
AT&T Secure E-Mail Gateway Service                AT&T Encryption Services is a service that           • Proof of Service through Service
AT&T Secure E-Mail Gateway is a security          simplifies e-mail and data encryption by               Level Agreements
as a service solution that offers protection      automating the management and use of
against inbound e-mail-borne threats such         digital credentials. You can quickly and             • Visible performance
as malicious web links and attachments,           efficiently digitally sign and encrypt messages        through reporting
and targeted phishing in addition to              or files using existing desktop, mobile and
                                                                                                       • Supported by the “TRUSTED”
blocking traditional spam and viruses. Just       web interfaces. Multiple methods of message
                                                                                                         AT&T infrastructure Financial
as important as preventing inbound attacks,       delivery and receipt help ensure that encrypted
                                                                                                         Effectiveness
Secure E-mail Gateway also provides the           data reaches the intended audience.
powerful features you need to support your                                                             • Minimized capital and
                                                  Whether it is employees exchanging
email DLP policies through policy based                                                                  asset expenditures
outbound filtering and encryption. To help        confidential information with associates or
meet your e-mail storage management,              the delivery of confidential statements to           • Operational efficiencies through
record retention and legal and regulatory         customers, AT&T Encryption Services provides           AT&T skilled professionals
compliance needs the SEG Archiving service        a comprehensive suite of encryption solutions
                                                  to help protect data in motion and at rest.          • Innovation from AT&T Labs Highly
supports archiving of unlimited amounts of                                                               Reliable Network
data with flexible retention periods from 30
days up to 10 years.                              AT&T Token Authentication Service                    • Network availability guarantees
                                                  Organizations need to know who is gaining              of up to 99.999%
We have conveniently packaged and                 access to network applications to help
simplified the purchasing, contracting and        avoid unauthorized access and disclosure of          • MPLS-based services available
billing of AT&T Network-Based Firewall Service,   sensitive information. This risk of exposing           to more than 180 countries
AT&T Secure E-mail Gateway Service, AT&T          proprietary and sensitive information is               representing 99 percent of the
Web Security Service and AT&T DDoS Defense        magnified as the number of remote users                world’s economy.
Service under one contract and one invoice        accessing the network increases. AT&T
providing an efficient and cost-effective way     Token Authentication service is a network            • 38 State-of-the-art Internet
to meet your business security needs.             access protection method that uses an                  Data Centers
                                                  enhanced security feature, called two-factor         • AT&T Global Network carries
AT&T Endpoint Security                            authentication, which requires a user to               56.2 petabytes of data on the
AT&T Endpoint Security service is a fully         provide two unique factors to gain access              average business day
managed solution to help protect both end         to a private network: something they know
users and company’s internal systems from         (a password or PIN) and something they              Global Resources
external hazards posed by doing business          possess (an authenticator). This method              • Approximately 2000 security experts
on the Internet. The service is designed to       makes it more difficult for a hacker to gain           and support professionals
enforce compliance with customer-defined          access to authentication credentials than
policies for firewall, anti-virus and software    a password since the authenticator’s token           • 6 Network Operations Centers
compliance at remote end points. The service      code changes randomly every sixty seconds            • 8 Global Customer Support Centers
also provides centralized management              and must be combined with a secret PIN
tools for control of remote end points and a      selected by the user accessing the network.
path for customer to gain control over the
                                                                                                    prioritized events based on their risk to
applications operating on these end points.       AT&T Security Analysis and                        your company and the ability to mitigate
                                                  Consulting Solutions                              them. Critical event notifications person-to-
The service consists of central policy servers
and AT&T Global Network software clients.         AT&T Security Event and Threat                    person and less critical event notifications
The software clients receive security policy      Analysis Service                                  get delivered via e-mail and through a
information from the servers located at           AT&T Security Event and Threat Analysis           customized security portal.
AT&T Internet Data Center. The software           service is a virtual Security Operation Center
clients interact with the policy server to        that utilizes expertise AT&T has developed in     AT&T Security Device Management
receive policy updates and to perform policy      security analysis and operations to correlate     AT&T Security Device Management is an
enforcement. Your security policies will be       information from multiple devices and             integral part of the AT&T Security Analysis
populated into a central policy server by your    device types, on premises and embedded            and Consulting Solutions providing
administrator, and then distributed to your       in the AT&T network. Based on information         monitoring and management of security
users from the AT&T managed policy server.        gathered, AT&T provides notification of           hardware and software you own located

                                                                                                          Share this with
                                                                                                             your peers
Product Brief - AT&T Managed Security Services _________________________________________________________________________________________________ 5

on your premises or the implementation of         silos,’ increasing cost and complexity of          another set of rules in order to communicate
complex and customer security solutions.          security management, and making it almost          outside the domain. This separation is
AT&T Security Device Management service           impossible to uniformly monitor security           achieved by using the principles of domain
lets you take advantage of the AT&T Security      threats across IT environments. AT&T Threat        separation for systems and networks within
Network Operations Centers (S/NOC)                Management and Analysis Service will help          a company. Domain separation allows
expertise to monitor and manage your security     address these challenges with a highly             communications between two domains to
hardware, manage your security infrastructure,    secure network infrastructure an optimal           occur in a controlled manner, through only
 or migrate to a custom security architecture     blend of security consulting, on-premises and      a few communication points and under
designed to meet your specific requirements.      next-generation cloud security capabilities,       scrutiny based on type of traffic, source,
                                                  including AT&T Network-Based Firewall              destination and volume of traffic. These few
AT&T Security Consulting                          Service, AT&T Intrusion Detection/Prevention       communication points are usually called
AT&T provides a unique and world-class            Services, AT&T Secure-E-Mail Gateway Service       security gateways, or choke points and
portfolio of compliance and related security      and AT&T Distributed Denial of Service             the rules applied at each are called choke
services. Our experience, expertise and           (DDoS) Defense Service protection, and             filtering. Domain separation helps ensure
commitment to open standards have                 security monitoring, analytics and emergency       that communications between domains are
established us as a strategic and trusted         response services.                                 allowed only as authorized, going through
advisor. AT&T Security Consulting provides                                                           designated gateways, which are designed to
solutions that allow you to operate your          Trust Your Security to AT&T                        help detect suspicious activity and block it if
security operations more efficiently. We work     AT&T has a long legacy of developing security      necessary. If one domain is compromised in
as a trusted team to provide knowledge            services which answer the need to address          a security incident, domain separation helps
based services. Our consultants have industry     a defense in depth architecture, from the          protect the other domains from compromise
and security expertise that can be utilized to    information level to the network level.            and helps contain the incident.
complete short and long term engagements.         You can count on AT&T as being a trusted
Experts are focused in six areas: Security                                                           AT&T employs the principle of domain
                                                  provider with true global reach that has a
Strategy, PCI Solutions, Governance Risk and                                                         separation within its corporate intranet
                                                  comprehensive range of security, availability
Compliance Solutions, Secure Infrastructure                                                          as well as on its various service networks
                                                  and recovery services that can provide your
Solutions, Threat and Vulnerability                                                                  and between the operational networks
                                                  business with integrated business continuity
Management and Application Security.                                                                 and network management infrastructures.
                                                  solutions and help support your complex
                                                                                                     Network management domains are separated
                                                  networking requirements.
AT&T Security Consulting services provide                                                            from the operational networks themselves.
a proactive, comprehensive approach to                                                               The AT&T Points of Presence (Central Offices)
                                                  Security by Design
security and compliance across all your                                                              are built with multiple security zones.
                                                  AT&T is committed to enhancing the
organizations operations. Our security                                                               Each zone has different requirements for
                                                  security services and features by continuing
consultants have accreditation in the                                                                security needs and is segmented to help
                                                  to develop security innovations and
latest security certifications and expertise                                                         prevent the traffic from leaking between
                                                  management techniques to create additional
across all aspects of security and provide                                                           zones. Various complementary mechanisms
                                                  security services for enterprises. In the
solid methodologies for validating and                                                               are deployed to maintain segmentation.
                                                  following paragraphs, we describe what
streamlining regulatory compliance.                                                                  “Hardening” Infrastructure Elements Network
                                                  techniques AT&T has been using to add
                                                                                                     infrastructure security includes both host-
                                                  security features both within its networks and
AT&T Secure Network Gateway                                                                          based and network-based security elements.
                                                  within the services it provides.
AT&T Secure Network Gateway provides an                                                              The foundation of infrastructure security is
integrated, turnkey security solution on a                                                           a server. “Hardening” of the server means
                                                  Processes
single pricing schedule with multiple service                                                        locking down (restricting use of) open
                                                  All AT&T Services follow AT&T Service
and term discounts on one convenient contract                                                        server communication ports. All servers are
                                                  Realization Process that includes a focus on
and bill. The services available under AT&T                                                          “hardened” based on vendor, industry and
                                                  security considerations in every step of service
Secure Network Gateway service are AT&T                                                              internal recommendations and industry best
                                                  development and network deployment. For
Network-Based Firewall Service, AT&T Secure                                                          practices. Host-based agents (i.e., software
                                                  each new service or feature that is being
E-mail Gateway Service, AT&T Web Security                                                            used to monitor activity on a server or PC)
                                                  developed, the AT&T Security Team works
Service and AT&T DDoS Defense Service.                                                               monitor the servers looking for unauthorized
                                                  closely with product management, systems
                                                                                                     changes in software and configurations. In
                                                  architects, engineers, developers and testers
AT&T Threat Management and                                                                           addition to hardening the network elements,
                                                  to add security features into the service.
Analysis Service                                                                                     AT&T deploys a number of measures to help
Cyber threats have become a boardroom                                                                protect against denial of service attacks
                                                  Domain Separation
agenda with the potential to bring down an                                                           within the AT&T network, and at the service
                                                  A network that is comprised of one or more
organization’s network, create compliance                                                            (application) level. AT&T has deployed state-
                                                  systems and one or more networks, all with
issues, damage bottom lines, and impact                                                              of-the-art security mechanisms to help
                                                  a common function, constitutes a domain.
brand reputation. Additionally, disparate                                                            protect its Global IP Network and IP Services
                                                  Each domain must have a set of rules for
security technologies create ‘security                                                               against Denial of Service (DoS) and other
                                                  communication within the domain and

                                                                                                           Share this with
                                                                                                              your peers
Product Brief - AT&T Managed Security Services _________________________________________________________________________________________________ 6

network-based attacks while monitoring                              Based Remote Access are designed to take                   is consistent with the general architecture
IP traffic for new identified attacks such as                       advantage of the MPLS technology. The                      used in protecting organization assets
new worms and viruses. All of these systems                         combined force of MPLS in conjunction with                 from the Internet, and includes multiple
are in place and are monitored 24x7 by                              the AT&T multilayered security approach                    security domains, each with its own security
experienced security personnel.                                     helps ensure that your organization can                    requirements. To further enhance the
                                                                    utilize a network that is flexible and scalable            security of these communications, AT&T has
Services on the AT&T Global Network                                 for future applications.                                   defined boundaries regarding what device
The AT&T Global Network has evolved to a                                                                                       can communicate with what device, thus
single, global, Multi-Protocol Label Switching                      Separate Services Over IP                                  providing additional control.
(MPLS) enabled backbone over an intelligent                         Infrastructure
                                                                                                                               An additional challenge with VoIP is that
optical core network. MPLS, a leading edge                          Voice over IP (VoIP) poses particular security
                                                                                                                               a separate Session Initiation Protocol (SIP)
technology that is driving convergence in the                       challenges to carriers due to the protocol
                                                                                                                               establishes the communication channel while
network, is the key technological component                         design itself. With VoIP both the signaling as
                                                                                                                               the call data (voice) is initiated. Specifically,
underpinning this network evolution which                           well as the actual voice messages are carried
                                                                                                                               SIP servers are responsible for creating,
provides flexibility and quality of service                         in-band across the network, thus making
                                                                                                                               modifying and terminating sessions with one
beyond those found on a private network.                            signaling vulnerable to the same security
                                                                                                                               or more participants, however most of them
MPLS adds reliability and performance                               risks as other Internet traffic. Recognizing
                                                                                                                               do not include firewall functionality as part
capabilities, enabling applications to scale                        these challenges, AT&T has designed a
                                                                                                                               of their basic configuration. In order to help
as business needs change. AT&T is regarded                          separate “Services over IP“ architecture to
                                                                                                                               security of our services over IP infrastructure,
as one of the MPLS industry leaders based                           carry application traffic such as VoIP. AT&T
                                                                                                                               AT&T has designed so called border elements,
on its early and continuing work with this                          Services over IP infrastructure integrates
                                                                                                                               or intermediary gateways. The border
technology, and continues to pioneer its use                        with the AT&T public MPLS IP network and
                                                                                                                               element acts as an intermediary between
by offering a suite of virtual private networks                     has been designed with multiple layers of
                                                                                                                               domains providing an additional layer of
(VPNs) that enable MPLS. AT&T services such                         defense, consistent with the AT&T “Defense
                                                                                                                               security for AT&T SIP based service.
as Network-Based Firewall and Network-                              in Depth” principles. The design principle

                                                                                                                                     Share this with
                                                                                                                                        your peers

For more information, call 877.542.8666, or visit us at www.att.com/network-security.

04/28/14 AB-1133-09
© 2014 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.
You can also read