sb-nz logo
Story image

Verizon unveils three new security solutions in expanded suite

09 Mar 2020

Verizon has recently announced an expansion of its suite of security solutions, introducing three new solutions as well as an ‘enhancement’ of its Rapid Response Retainer service.

Verizon Business executive director and chief product officer of security services Alex Schlager says the growth of the company’s security suite comes at a time where the threat of cyber attack is looming over most aspects of our digital lives.

“Cybercrime is a daily threat to every organisation and government across the globe,” says Schlager. 

“Our 2019 Data Breach Investigations Report highlighted that financially motivated cyberattacks are increasing across the board, and that C-level executives are increasingly targeted by social breaches, linked to stolen credentials.”

Verizon Managed Detection and Response (MDR) 

This new service leverages analytics and behaviour modelling to help organisations quickly identify potential cyber threats, according to Verizon.

The cloud-based solution makes use of Verizon’s core remote threat monitoring, detection and response capabilities as well as built-in multi-layer analytics and behaviour modelling from Securonix. 

Verizon MDR is available globally from April 2020.

Verizon Identity (VID) 

VID leverages blockchain, among the first Verizon security solutions to do so (the other being Machine State Integrity). 

Verizon ID introduces the ‘digital identity’ feature, which enables users to store identity credentials on their mobile devices, which can be accessed, ‘potentially’ eliminating the need for passwords. 

29% of breaches investigated involved the use of stolen credentials, according to Verizon’s  Data Breach Investigations Report released in 2019. 

The solution encrypts and distributes identity data across multiple online servers on the blockchain, so there is no centralised database or single point of entry for breach attempts.

The solution also incorporates multi-factor authentication and biometrics.

Verizon says the solution is available to customers globally.

Verizon’s Machine State Integrity 

Operational data is sourced from decentralised machine environments in this solution, which Verizon says will subsequently offer insights on potential compliance and security issues.  

Machine security is a complex challenge - a single weak entry point that is exploited by a cyberattack could lead to complete infrastructure breakdown.

The solution will be available in the US from Q2 2020.

Rapid Response Retainer

The expansion of this solution means the VTRAC team can be alerted and liaise with customers within six hours from an incident report, dependent on specific customer retainers.

The expansion also includes Verizon Network Detection and Response, Dark Web Hunting, Tanium’s endpoint protection and Verizon’s backbone NetFlow. 

A new mobile app is also available where customers can access threat status reports and contact response teams. 

Schlager says the growing threats that organisations face in 2020 and beyond require an expansion on the current state of their cybersecurity measures.

“Now, more than ever, organisations need to be thinking differently about security, and leveraging cutting edge technology to help mitigate against cybercrime,” says Schlager.

“These Verizon solutions offer a significant step forward in cybersecurity protection.”

Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Gigamon & FireEye tackle security in hybrid cloud environments
The partnership is an extension to a ‘long-standing’ relationship that aims to ‘simplify, secure, and optimise hybrid cloud environments’.More
Story image
Zscaler and CrowdStrike release integrations for end-to-end security
This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications.More