AT&T understands the complexities of the academic environment and the monumental challenges faced by academic CIOs. To meet these demands, we provide a wide range of cost-effective security solutions designed to protect educational institutions from the attacks they are most vulnerable to, including unauthorized access, email and web-borne malware, IM malware, viruses, just to name a few. Let AT&T’s certified security experts perform the 24x7 management of your organization’s network.
You have many users accessing your network in many different ways, some of the most common include email, instant messaging (IM), and web access through surfing, downloads, etc. AT&T Email and Web Security services are designed to help you ensure that emails, IM’s and web downloads are scanned and filtered for viruses and malware, control what sites your users may access, manage music and video streaming from the web, and ensure the privacy of your most sensitive emails and email attachments from unauthorized access.
You have every day external threats borne from the web, including DDoS attacks, malware, viruses and network intrusions (IDS). Most security solutions call for placing firewalls and intrusion detection devices at each premise point that has access to the internet. This can be a costly and cumbersome process to manage. AT&T has a simple and cost effective solution which places the firewall and IDS capabilities in the cloud (not at each end point), and mitigates those threats from the internet before they ever reach your premise. Not only is this more cost effective, but it can easily grow as your volumes grow, and the upgrades required over time are all managed and supported by AT&T.
Compliance and regulatory issues are on the top of everyone’s mind these days, and the requirements are constantly changing. AT&T Consulting Services can help you by providing a security assessment of your network, processes and policies. We can also perform vulnerability assessments to help you identify potential security gaps, develop a new security strategy, and determine architectural solutions to keep your information and network secure.