sb-nz logo
Story image

Verizon unveils three new security solutions in expanded suite

09 Mar 2020

Verizon has recently announced an expansion of its suite of security solutions, introducing three new solutions as well as an ‘enhancement’ of its Rapid Response Retainer service.

Verizon Business executive director and chief product officer of security services Alex Schlager says the growth of the company’s security suite comes at a time where the threat of cyber attack is looming over most aspects of our digital lives.

“Cybercrime is a daily threat to every organisation and government across the globe,” says Schlager. 

“Our 2019 Data Breach Investigations Report highlighted that financially motivated cyberattacks are increasing across the board, and that C-level executives are increasingly targeted by social breaches, linked to stolen credentials.”

Verizon Managed Detection and Response (MDR) 

This new service leverages analytics and behaviour modelling to help organisations quickly identify potential cyber threats, according to Verizon.

The cloud-based solution makes use of Verizon’s core remote threat monitoring, detection and response capabilities as well as built-in multi-layer analytics and behaviour modelling from Securonix. 

Verizon MDR is available globally from April 2020.

Verizon Identity (VID) 

VID leverages blockchain, among the first Verizon security solutions to do so (the other being Machine State Integrity). 

Verizon ID introduces the ‘digital identity’ feature, which enables users to store identity credentials on their mobile devices, which can be accessed, ‘potentially’ eliminating the need for passwords. 

29% of breaches investigated involved the use of stolen credentials, according to Verizon’s  Data Breach Investigations Report released in 2019. 

The solution encrypts and distributes identity data across multiple online servers on the blockchain, so there is no centralised database or single point of entry for breach attempts.

The solution also incorporates multi-factor authentication and biometrics.

Verizon says the solution is available to customers globally.

Verizon’s Machine State Integrity 

Operational data is sourced from decentralised machine environments in this solution, which Verizon says will subsequently offer insights on potential compliance and security issues.  

Machine security is a complex challenge - a single weak entry point that is exploited by a cyberattack could lead to complete infrastructure breakdown.

The solution will be available in the US from Q2 2020.

Rapid Response Retainer

The expansion of this solution means the VTRAC team can be alerted and liaise with customers within six hours from an incident report, dependent on specific customer retainers.

The expansion also includes Verizon Network Detection and Response, Dark Web Hunting, Tanium’s endpoint protection and Verizon’s backbone NetFlow. 

A new mobile app is also available where customers can access threat status reports and contact response teams. 

Schlager says the growing threats that organisations face in 2020 and beyond require an expansion on the current state of their cybersecurity measures.

“Now, more than ever, organisations need to be thinking differently about security, and leveraging cutting edge technology to help mitigate against cybercrime,” says Schlager.

“These Verizon solutions offer a significant step forward in cybersecurity protection.”

Story image
5 ways to use data science to predict security issues - Forcepoint
Data science enables people to respond to problems in a better way, and to also understand those problems in a way that would not have been possible 50 years ago.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More