AT&T has rolled out two new managed security services security event and threat analysis, and security device management for businesses of all sizes.

AT&T said that the new services will allow customers to engage the company’s security professionals to provide customised security support. Services range from security event analysis and threat management analysis to targeted security device management including firewalls, intrusion detection sensors and VPN servers.

According to AT&T, the new Security Event and Threat Analysis service provides users the ability to evaluate, correlate, and report on information from multiple devices and device types, both on the customer premises and embedded in the AT&T network.

The Security Event and Threat Analysis service prioritises security events based on threat and risk management methodologies using AT&T and customer-defined standards, and provides notification when security events are detected and identified as critical by the AT&T Security Network Operations Center, the company said.

In addition, the service also features event mitigation and security analyst counselling during critical security incidents, and Global Security Operation Centers and 24X7 T1-T4 Analyst Coverage with portal access through AT&T’s BusinessDirectA Portal.

AT&T said that the Security Device Management provides customisable monitoring and management of a business’s security hardware and software, with a range of services including managing the customer’s current security capabilities up to assessing, designing and implementing a custom security infrastructure.

These new services complement AT&T’s existing Security Consulting services, which include, log management, security policy management, vulnerability analysis, application security, trusted advisor services and payment card industry solutions.

Edward Amoroso, senior vice president and chief security officer for AT&T, said: With Security Event and Threat Analysis and Security Device Management, customers maintain responsibility for the policy and ownership of security hardware, while tapping into our experience, resources and ‘in the cloud’ approach to cyber security.