<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83</id>
	<title>AT&amp;T Cуbеrѕесurіtу - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;action=history"/>
	<updated>2026-04-05T19:05:28Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=58585&amp;oldid=prev</id>
		<title>Shawndouglas: Cat</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=58585&amp;oldid=prev"/>
		<updated>2024-02-28T22:45:36Z</updated>

		<summary type="html">&lt;p&gt;Cat&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:45, 28 February 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l59&quot;&gt;Line 59:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 59:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;!---Place all category tags here--&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Managed security services]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-52749:rev-58585 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=52749&amp;oldid=prev</id>
		<title>Shawndouglas at 22:03, 4 August 2023</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=52749&amp;oldid=prev"/>
		<updated>2023-08-04T22:03:29Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:03, 4 August 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l37&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as being able &amp;quot;to help businesses safeguard digital assets and innovate with confidence.&amp;quot;&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt; As of &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;May 2021&lt;/del&gt;, the MSSP is listed among the top 10 MSSPs around the world by multiple entities.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-2022/25/ |title=Top 250 MSSPs for 2023: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2022 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2023 |publisher=Software Testing Help |date=01 August 2023 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as being able &amp;quot;to help businesses safeguard digital assets and innovate with confidence.&amp;quot;&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt; As of &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;August 2023&lt;/ins&gt;, the MSSP is listed among the top 10 MSSPs around the world by multiple entities.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-2022/25/ |title=Top 250 MSSPs for 2023: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2022 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2023 |publisher=Software Testing Help |date=01 August 2023 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=04 August 2023}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-52748:rev-52749 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=52748&amp;oldid=prev</id>
		<title>Shawndouglas: Updated for 2023.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=52748&amp;oldid=prev"/>
		<updated>2023-08-04T21:55:05Z</updated>

		<summary type="html">&lt;p&gt;Updated for 2023.&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:55, 4 August 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l17&quot;&gt;Line 17:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 17:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| locations        = 5&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| locations        = 5&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| area_served      = Worldwide&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| area_served      = Worldwide&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| key_people       = &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;William Kennard &lt;/del&gt;(&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;EC)&amp;lt;br /&amp;gt;John Stankey (CEO&lt;/del&gt;)&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| key_people       = &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Barmak Meftah &lt;/ins&gt;(&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;President&lt;/ins&gt;)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| industry         = Managed security services&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| industry         = Managed security services&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| products         =  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| products         =  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| services         = Cybersecurity consulting, network security, endpoint security,&amp;lt;br /&amp;gt;threat detection and response&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| services         = Cybersecurity consulting, network security, endpoint security,&amp;lt;br /&amp;gt;threat detection and response&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| revenue          = $&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;4&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;0 &lt;/del&gt;billion (&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2020&lt;/del&gt;, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Q4&lt;/del&gt;)&amp;lt;ref name=&amp;quot;ATTEarn21&amp;quot;&amp;gt;{{cite web |url=https://&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;investors&lt;/del&gt;.att.com/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;~&lt;/del&gt;/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;media&lt;/del&gt;/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Files/A/ATT-IR/financial-reports/quarterly&lt;/del&gt;-earnings&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;/2020/q4-2020/4Q2020_Investor_Briefing&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;pdf |format=PDF &lt;/del&gt;|title=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Q4 2020 &lt;/del&gt;AT&amp;amp;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;T Earnings - Investor Briefing &lt;/del&gt;|publisher=AT&amp;amp;T |date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 January 2021 &lt;/del&gt;|accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| revenue          = $&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;29&lt;/ins&gt;.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;9 &lt;/ins&gt;billion (&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Q2&lt;/ins&gt;)&amp;lt;ref name=&amp;quot;ATTEarn21&amp;quot;&amp;gt;{{cite web |url=https://&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;about&lt;/ins&gt;.att.com/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;story&lt;/ins&gt;/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;q2&lt;/ins&gt;-earnings.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;html &lt;/ins&gt;|title=AT&amp;amp;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;T’s Sustainable Growth Strategy Pays off with Strong 2Q Results &lt;/ins&gt;|publisher=AT&amp;amp;T |date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;26 July 2023 &lt;/ins&gt;|accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| operating_income =  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| operating_income =  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| net_income       =  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| net_income       =  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l37&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;delivering &lt;/del&gt;&amp;quot;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the ability &lt;/del&gt;to help safeguard digital assets&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, act &lt;/del&gt;with confidence &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations&lt;/del&gt;&amp;quot; &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;for customers.&lt;/del&gt;&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt; As of May 2021, the MSSP is listed among the top 10 MSSPs around the world by multiple entities.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2020&lt;/del&gt;/25/ |title=Top 250 MSSPs for &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2020&lt;/del&gt;: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2020 &lt;/del&gt;|accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2021 &lt;/del&gt;|publisher=Software Testing Help |date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;30 April 2021 &lt;/del&gt;|accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;being able &lt;/ins&gt;&amp;quot;to help &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;businesses &lt;/ins&gt;safeguard digital assets &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;and innovate &lt;/ins&gt;with confidence&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&lt;/ins&gt;&amp;quot;&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; As of May 2021, the MSSP is listed among the top 10 MSSPs around the world by multiple entities.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2022&lt;/ins&gt;/25/ |title=Top 250 MSSPs for &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2022 &lt;/ins&gt;|accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023 &lt;/ins&gt;|publisher=Software Testing Help |date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;01 August 2023 &lt;/ins&gt;|accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 |accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AT&amp;amp;T Cybersecurity divides its managed security services (MSS) into four categories: cybersecurity consulting, network security, endpoint security, and threat detection and response.&amp;lt;ref name=&amp;quot;ATTCyberProds&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/products |title=AT&amp;amp;T Cybersecurity Products and Services |publisher=AT&amp;amp;T |accessdate=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;27 May 2021&lt;/del&gt;}}&amp;lt;/ref&amp;gt; From those categories, the following services have been identified&amp;lt;ref name=&amp;quot;ATTCyberProds&amp;quot; /&amp;gt;:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AT&amp;amp;T Cybersecurity divides its managed security services (MSS) into four categories: cybersecurity consulting, network security, endpoint security, and threat detection and response.&amp;lt;ref name=&amp;quot;ATTCyberProds&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/products |title=AT&amp;amp;T Cybersecurity Products and Services |publisher=AT&amp;amp;T |accessdate=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;04 August 2023&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; From those categories, the following services have been identified&amp;lt;ref name=&amp;quot;ATTCyberProds&amp;quot; /&amp;gt;:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Cybersecurity consulting''': strategy and roadmap planning, enterprise security assessment, risk-based cyber posture assessment, security compliance review, vulnerability scanning, penetration testing, adversary simulation services, and cybersecurity IQ training&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Cybersecurity consulting''': strategy and roadmap planning, enterprise security assessment, risk-based cyber posture assessment, security compliance review, vulnerability scanning, penetration testing, adversary simulation services, and cybersecurity IQ training&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42871:rev-52748 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42871&amp;oldid=prev</id>
		<title>Shawndouglas: Additional info</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42871&amp;oldid=prev"/>
		<updated>2021-05-28T14:29:35Z</updated>

		<summary type="html">&lt;p&gt;Additional info&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 14:29, 28 May 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l50&quot;&gt;Line 50:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 50:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Documentation and other media===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Documentation and other media===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[https://www.business.att.com/content/dam/attbusiness/briefs/cloud-security-assessment-product-brief.pdf AT&amp;amp;T Cybersecurity Consulting - Cloud Security Threat and Vulnerability Management product brief]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [https://www.business.att.com/content/dam/attbusiness/guides/att-information-and-network-security-customer-reference-guide.pdf AT&amp;amp;T Information &amp;amp; Network Security Customer Reference Guide]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===External links===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===External links===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[https://cybersecurity.att.com/blogs/labs-research Alien Labs Blog]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [https://cybersecurity.att.com/products Product portal]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42870:rev-42871 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42870&amp;oldid=prev</id>
		<title>Shawndouglas: Saving and adding more.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42870&amp;oldid=prev"/>
		<updated>2021-05-28T00:02:34Z</updated>

		<summary type="html">&lt;p&gt;Saving and adding more.&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:02, 28 May 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l40&quot;&gt;Line 40:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;AT&amp;amp;T Cybersecurity divides its managed security services (MSS) into four categories: cybersecurity consulting, network security, endpoint security, and threat detection and response.&amp;lt;ref name=&quot;ATTCyberProds&quot;&gt;{{cite web |url=https://cybersecurity.att.com/products |title=AT&amp;amp;T Cybersecurity Products and Services |publisher=AT&amp;amp;T |accessdate=27 May 2021}}&amp;lt;/ref&gt; From those categories, the following services have been identified&amp;lt;ref name=&quot;ATTCyberProds&quot; /&gt;:&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Cybersecurity consulting''': strategy and roadmap planning, enterprise security assessment, risk-based cyber posture assessment, security compliance review, vulnerability scanning, penetration testing, adversary simulation services, and cybersecurity IQ training&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Network security''': AT&amp;amp;T Secure Web Gateway, AT&amp;amp;T Secure Remote Access, AT&amp;amp;T SASE Branch with Fortinet, cloud-based firewall, on-premises firewall, enhanced cybersecurity network detection services, distributed denial of service defense, and application layer security&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Endpoint security''': SentinelOne, VMware Workspace ONE, IBM MaaS360, MobileIron, Lookout Mobile Endpoint Security, and McAfee Endpoint Protection&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* '''Threat detection and response''': 24x7 security monitoring, upgraded security monitoring for government, USM Anywhere, USM Anywhere advisory services, USM for MSSP's, forensic analysis and incident response, Open Threat Exchange, and OSSIM&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Additional information==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Additional information==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42869:rev-42870 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42869&amp;oldid=prev</id>
		<title>Shawndouglas: Saving and adding more.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42869&amp;oldid=prev"/>
		<updated>2021-05-27T23:51:37Z</updated>

		<summary type="html">&lt;p&gt;Saving and adding more.&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:51, 27 May 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l37&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as delivering &amp;quot;the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations&amp;quot; for customers.&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as delivering &amp;quot;the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations&amp;quot; for customers.&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|accessdate=27 May 2021}}&amp;lt;/ref&amp;gt; As of May 2021, the MSSP is listed among the top 10 MSSPs around the world by multiple entities.&amp;lt;ref name=&amp;quot;MSSPCyber20&amp;quot;&amp;gt;{{cite web |url=https://www.msspalert.com/top250/list-2020/25/ |title=Top 250 MSSPs for 2020: Companies 10 to 01 |work=Top 250 MSSPs: Cybersecurity Company List and Research for 2020 |publisher=MSSP Alert |date=September 2020 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;STHTop15_21&amp;quot;&amp;gt;{{cite web |url=https://www.softwaretestinghelp.com/managed-security-service-providers/ |title=Top 15 Best Managed Security Service Providers (MSSPs) In 2021 |publisher=Software Testing Help |date=30 April 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;CDMMSSPs21&amp;quot;&amp;gt;{{cite web |url=https://www.cyberdefensemagazine.com/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Defense Media Group |date=18 February 2021 &lt;/ins&gt;|accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Managed security services==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-42868:rev-42869 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42868&amp;oldid=prev</id>
		<title>Shawndouglas: Created stub. Saving and adding more.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=AT%26T_C%D1%83b%D0%B5r%D1%95%D0%B5%D1%81ur%D1%96t%D1%83&amp;diff=42868&amp;oldid=prev"/>
		<updated>2021-05-27T23:49:52Z</updated>

		<summary type="html">&lt;p&gt;Created stub. Saving and adding more.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox company&lt;br /&gt;
| name             = AT&amp;amp;T Cуbеrѕесurіtу&lt;br /&gt;
| logo             = [[File:AT&amp;amp;T Cybersecurity.png|200px]]&lt;br /&gt;
| caption          = &lt;br /&gt;
| type             = &lt;br /&gt;
| traded_as        = &lt;br /&gt;
| genre            = &amp;lt;!-- Only used with media and publishing companies --&amp;gt;&lt;br /&gt;
| fate             = &lt;br /&gt;
| predecessor      = &lt;br /&gt;
| successor        = &lt;br /&gt;
| foundation       = &amp;lt;!-- {{Start date|YYYY|MM|DD}} --&amp;gt;&lt;br /&gt;
| founder          = Alexander Graham Bell&amp;lt;br /&amp;gt;Gardiner Greene Hubbard&amp;lt;br /&amp;gt;Thomas Sanders&lt;br /&gt;
| defunct          = &amp;lt;!-- {{End date|YYYY|MM|DD}} --&amp;gt;&lt;br /&gt;
| location_city    = 208 South Akard Street, Dallas, Texas&lt;br /&gt;
| location_country = United States&lt;br /&gt;
| location         = &lt;br /&gt;
| locations        = 5&lt;br /&gt;
| area_served      = Worldwide&lt;br /&gt;
| key_people       = William Kennard (EC)&amp;lt;br /&amp;gt;John Stankey (CEO)&lt;br /&gt;
| industry         = Managed security services&lt;br /&gt;
| products         = &lt;br /&gt;
| services         = Cybersecurity consulting, network security, endpoint security,&amp;lt;br /&amp;gt;threat detection and response&lt;br /&gt;
| revenue          = $4.0 billion (2020, Q4)&amp;lt;ref name=&amp;quot;ATTEarn21&amp;quot;&amp;gt;{{cite web |url=https://investors.att.com/~/media/Files/A/ATT-IR/financial-reports/quarterly-earnings/2020/q4-2020/4Q2020_Investor_Briefing.pdf |format=PDF |title=Q4 2020 AT&amp;amp;T Earnings - Investor Briefing |publisher=AT&amp;amp;T |date=27 January 2021 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
| operating_income = &lt;br /&gt;
| net_income       = &lt;br /&gt;
| aum              = &amp;lt;!-- Only used with financial services companies --&amp;gt;&lt;br /&gt;
| assets           = &lt;br /&gt;
| equity           = &lt;br /&gt;
| owner            = &lt;br /&gt;
| num_employees    = &lt;br /&gt;
| parent           = AT&amp;amp;T&lt;br /&gt;
| divisions        = &lt;br /&gt;
| subsid           = &lt;br /&gt;
| homepage         = {{URL|https://cybersecurity.att.com/}}&lt;br /&gt;
| footnotes        = &lt;br /&gt;
| intl             = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''AT&amp;amp;T Cуbеrѕесurіtу''' is a multinational managed security services provider (MSSP) operating as a division of AT&amp;amp;T. The division describes its operations as delivering &amp;quot;the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations&amp;quot; for customers.&amp;lt;ref name=&amp;quot;ATTCyberHome&amp;quot;&amp;gt;{{cite web |url=https://cybersecurity.att.com/ |title=AT&amp;amp;T Cybersecurity |publisher=AT&amp;amp;T |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt; The AT&amp;amp;T Cybersecurity division was founded out of the merging of AlienVault, AT&amp;amp;T Cybersecurity Consulting, and AT&amp;amp;T Managed Security Services sometime in 2019.&amp;lt;ref name=&amp;quot;MetfahAT&amp;amp;TCyber19&amp;quot;&amp;gt;{{cite web |url=https://www.business.att.com/learn/top-voices/att-cybersecurity-is-born.html |title=AT&amp;amp;T Cybersecurity is born |author=Metfah, B. |work=Top Voices |publisher=AT&amp;amp;T |date=2019 |accessdate=27 May 2021}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Managed security services==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Additional information==&lt;br /&gt;
&lt;br /&gt;
===Documentation and other media===&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
===External links===&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist|colwidth=30em}}&lt;/div&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>