Home IT AT&T Cybersecurity (formerly AlienVault)

AT&T Cybersecurity (formerly AlienVault)

Unified security management solution
our rating 4.5 out of 5 Stars

AT&T Cybersecurity (formerly AlienVault)Product Overview

  1. About AT&T Cybersecurity
  2. Pros of AT&T Cybersecurity
  3. Cons of AT&T Cybersecurity
  4. Breakdown of core features

AT&T Cybersecurity product overview

AT&T Cybersecurity, formerly AlienVault, delivers the ability to safeguard digital assets. Enterprises can confidently detect cyber threats to mitigate business impacts and drive efficiency into cybersecurity operations.

AT&T Cybersecurity provides threat intelligence, collaborative defense, security without the seams, and solutions that fit any business. Its unique approach integrates best-of-breed technologies with network visibility. It brings actionable threat intelligence from AT&T Alien Labs researchers, Security Operations Center analysts, and machine learning to enable customers around the globe to anticipate and act on threats to protect their business.

Organizations can spot and investigate intrusions, identify and prioritize vulnerabilities, and monitor cloud and on-premises environments all from one tool. AT&T Cybersecurity provides five essential security capabilities in a single console to manage compliance and threats. It also empowers companies to protect endpoints against cyber threats. Businesses can proactively hunt down threats before they act. Moreover, the solution allows organizations to terminate malicious processes, quarantine infected devices, and roll back events to keep endpoints clean.

Pros of AT&T Cybersecurity

Back to top ↑

  • AT&T Cybersecurity strategy and roadmap consulting services let financial organizations align cyber risk management with business objectives and prioritize strategic initiatives as the network and business evolve.
  • With the solution’s Authentication and Verification service, financial organizations are safe against mobile fraud.

Cons of AT&T Cybersecurity

Back to top ↑

  • Some users commented that the product is too complex.

Breakdown of core features

Back to top ↑


AT&T Cybersecurity provides SIEM and log management to find and respond to threats. In addition to all the functionality of a comprehensive SIEM, it unifies the security capabilities for complete threat detection, incident response, and compliance management. All relevant security data in the platform is available with intuitive search and filter capabilities. Therefore, incident investigations are quicker and more efficient.

Asset discovery

This solution has functionalities to automate asset discovery, detect threats, and accelerate incident response. It introduces a built-in asset discovery that finds and provides visibility into the assets in the AWS, Azure, and on-premises environments. Users can discover all the IP-enabled devices on their network. They can also determine installed software and services, configurations, and any vulnerabilities or active threats in their systems.

Network vulnerability scanning

AT&T Cybersecurity expedites vulnerability scanning and threat detection. It also provides a unified platform that includes intrusion detection, behavioral monitoring, and network vulnerability scanning tools. The solution simplifies scheduling regular asset and vulnerability scans to ensure continuous assessment without manual process management.

Endpoint detection and response (EDR)

The platform’s EDR capabilities centralize security monitoring for endpoints and networks across cloud and on-premises environments. It eliminates the cost and complexity of adding another point solution to the security stack. Also, AT&T Cybersecurity combines multiple security features, offering essential security capabilities in a single pane of glass.

(Last updated on 12/03/2021 by Liz Laurente-Ticong)

Quick Facts

  • Industry Specialties
    All Industries
  • Pricing
  • Works Best For
    Any Sized Businesses





  • Asset discovery
  • Vulnerability assessment
  • Intrusion detection
  • SIEM/Event correlation
  • Threat intelligence
  • Threat detection
  • Compliance
  • Security operations and monitoring
  • Security intelligence and analytics
  • Cloud security
  • Industry segments
  • Cybersecurity consulting


  • Akamai Enterprise Threat Protector
  • Palo Alto Networks Panorama
  • MobileIron Threat Defense
  • SentinelOne
  • Digital Defense Frontline
  • FortiManager
  • FortiGate
  • Microsoft Defender Advanced Threat Protection
  • Salesforce
  • Zscaler
  • Box
  • Jira
  • Azure

Pricing Model

  • Quote-based


  • English