Verizon Enterprise Security Services

PDF version of this report
You must have Adobe Acrobat reader to view, save, or print PDF files. The reader
is available for free

Security Services

by Karen Spring

Docid: 00021105

Publication Date: 1904

Report Type: PRODUCT


Thanks to more than 25 years of threat expertise and intelligence, Verizon Enterprise offers a
comprehensive suite of security services for the enterprise business. Verizon
protects against breaches, malware, advanced persistent threats, and other
security issues through its Cybersecurity Solutions, which are extended into
nine key areas: Verizon Risk Report; Incident Response and Investigation; Mobile
and IoT Security; Verizon Threat Intelligence Platform Service; Network Security
Monitoring and Management; Identity and Access Management Services; Secure
Gateway Services: Advanced Threat Analytics and Detection; and Security Advisory

Report Contents:

Verizon Communications

1095 Avenue of the Americas
New York, NY 10013
Phone: (212) 395-1000
Verizon Enterprise:
Stock Symbol: VZ


[return to top of report]

Verizon Enterprise (formerly Verizon Business) offers a
comprehensive suite of data security services to help companies secure
their networks, data, applications, and infrastructure from cyber threats that
can be crippling. Verizon uses data and analytics to determine which
threats are most likely to impact networks and infrastructure. With over a
quarter century of security experience, Verizon has vast threat intelligence and
response capabilities to assess attack trends and help businesses make informed
decisions regarding their security posture. 

Related Faulkner Reports

AT&T Cybersecurity Services

Product Profile

Dell SecureWorks Managed Security Services
Product Profile

IBM Managed Security Services

Product Profile

With Verizon, clients have options for 24×7 monitoring and management;
the ability to operate from redundant,
disaster-resilient security operations centers (SOCs); and access to security
experts and industry best practices.

The portfolio of Enterprise Security Services are divided into nine key

  • Verizon Risk Report – Helps organizations determine where their
    vulnerabilities lie so that they can immediately make more informed security
  • Security Advisory Services – Designed to help organizations
    boost cyber resiliency through careful assessment of infrastructure and
  • Mobile and IoT Security – Enables organizations to better
    understand the cybersecurity risks involved with mobile and Internet of
    Things devices so that threats can be mitigated. 
  • Verizon Threat Intelligence Platform Service – Gathers intelligence
    from trusted sources to identify the ones that pose the greatest threat to
    customer organizations. 
  • Network Security Monitoring and Management – Provides protection around the
    network to alleviate threats from gaining entrance. 
  • Identity and Access Management Services – Builds a strong defense
    against security threats while managing resource access, workflow, and user
    account provisioning. 
  • Secure Gateway Services – Defends networks against malware,
    exploits, attacks, and other threats while providing secure Internet
  • Incident Response and Investigation – Consists of offerings that protect against
    breaches, whether intentional or accidental. 
  • Advanced Threat Analytics and Detection – Detects potential
    malicious anomalies in Internet traffic to take appropriate


[return to top of report]

Within each of its key areas, Verizon offers more in-depth
security services to fill particular needs for organizations. Table 1
depicts each of its main security services and what defines each

Table 1. Verizon Enterprise Security Services
Function Description
Verizon Risk Report Verizon Risk Report – A custom risk
assessment tool that measures security posture through the use of
algorithms, dark Web findings, and proprietary data. The tool is then
used to determine where security gaps exist and how to strengthen them.
Combines Verizon intelligence with capabilities from BitSight, Recorded
Future, Cylance, and more. 
Incident Response and Investigation Computer Emergency Response Team Services – A team of CERT
experts will work closely with an organization’s own security
personnel to identify the cause of an incident and respond to

Rapid Response Retainer – An incident response service
delivering experts to help companies mitigate and investigate breaches
and threats with intelligence and analysis. 

Mobile and IoT Security Enterprise Mobility Management and

  • Mobile Device Management – Integrates firmware over-the-air
    management, device diagnostics, and endpoint management for both
    wired and wireless devices. 
  • Voice Cypher – An encryption app offering protection for
    voice and messaging communications. 
  • Wireless Private Network – Segregates traffic during
    connection of mobile devices to keep internal network information
    separate from public traffic. 
  • Business Continuity Solutions – Delivers a contingency plan
    in the event of an outage. 

IoT Security Credentialing – A platform comprised of tools and
services to deliver security to IoT apps and devices through three
layers of protection.

Verizon Threat Intelligence Platform Threat Intelligence Platform – Turns
threat patterns into tailored analytics focused on the customer’s
business. Uses multiple intelligence sources, including data mining and
knowledge of the dark Web, to prepare for threats and attacks. 
Network Security Monitoring and Management Device Health and Availability Monitoring 

  • Health Monitoring – Protects infrastructure through early
    failure detection.
  • Device Management – Delivers timely updates to devices.
  • Policy Management – Remote review and execution of network
    and device policy changes for on-premise and virtual
  • SaaS Policy Management – Enables policy planning for cloud
  • Policy Management Consultative – Provides assistance for
    building policies. 
  • Analytics – Provides cloud-based log management, security
    monitoring, and security analytics. Incident data is reviewed
    through a security portal. 
Identity and Access Management Services Managed Certificate Services – Provides
a cloud-based, centralized source for trusted digital certificates to
enable automated device authentication, identity management, and data
Secure Gateway Services Secure Cloud Gateway – Consists of a
node-based architecture to deploy security to devices and locations both
on- and off-network. Nodes can be virtual or hardware and all report to
the cloud. 

Software Defined Perimeter – This app authenticates identities
and devices and only allows approved users to access network

DDoS Shield – A cloud-based defense platform that ensures
that cyber attacks are detected before they can overwhelm the
network and take the system offline. When under attack, inbound
traffic is routed to scrubbing centers and returns "clean,"
legitimate traffic back to the network. 

DNS Safeguard – A cloud-based platform the allows
users to securely access online
applications while malware and phishing attempts are halted. 

Virtual Network Services – Security – Uses network
segmentation and micro-segmentation to limit infrastructure exposure and
keep areas affected by threats isolated. 

Managed Trusted Internet Protocol Services – Provides a secure
and reliable connection to the public Internet and other external

Cloud Access Security Broker – Performs as a gateway between
cloud service consumers and providers to apply and enforce strict
security policies whenever cloud resources are used. 

Advanced Threat Analytics and Detection Managed Security Services – Analytics
Provides cloud-based log management, security monitoring, and security
analytics. Incident data is reviewed through a security portal.

Managed Security Information and Event Management – Compiles
threat intelligence from various sources, analyzes possible impacts, and
establishes threat use cases to provide findings for follow-up.

Advanced Security Operations Center – Verizon analysts monitor
customer environments 24/7 to quickly detect threats and deliver alerts
for remediation. 

Network Threat Monitoring – The customer provides IP addresses
and Verizon reviews a NetFlow data sample to analyze traffic and compare
it against watch lists to identify threat activity. 

Network Threat Advanced Analytics – Culls NetFlow data from
cloud-based devices and the Verizon IP backbone to create a baseline of
potential security threats and matches spikes against watch lists. Any
suspicious activity is flagged and customers are notified. 

Autonomous Threat Hunting – Assesses indicators of compromise
with tactics and techniques used by threat actors to provide a list of
leads so that potential attacks can be identified before they cause

Security Advisory Services Cyber Risk Programs – Provides an objective view of how
well an organization is prepared for and can alleviate a security

  • Risk Rating
  • Risk Assessment

Penetration Testing – Consists of vulnerability scanning
tools to probe a client’s environment for issues and weaknesses.

Governance, Risk and Compliance – Enables organizations to
be compliant with laws and industry regulations. Assessments

  • Operational Technology and Control Systems Health Check
  • Business Security Assessment
  • Security Operations Center Assessment
  • IoT Security Assessment
  • Data: Discover, ID & Classify
  • Security Architecture Review

Payment Card Industry Data Security Standard Assessment
Offers a PCI Data Security Standard Assessment so that organizations
can determine their compliance levels. 

Incident Response Planning – Creates a plan and improvement
recommendations following an assessment to identify vulnerable areas and
gaps in network security. 

  • Espionage Health Check
  • Executive Breach Simulation
  • Industry-Specific Health Check
  • Attack Detection Assessment

Testing and Certifications – Utilizes ICSA Labs’
capabilities to test mobile and Internet of Things (IoT) applications for
compliance and security.

  • IoT Device Security Certification
  • Consortium Operations
  • Custom Testing
  • Health IT Testing and Certification


[return to top of report]

Verizon’s Enterprise Security Services are delivered from the cloud,
on premises, and via a SaaS option.


[return to top of report]

  • AT&T 
  • Cisco
  • Secureworks
  • IBM
  • Sophos
  • Symantec
  • Trustwave


[return to top of report]

IT departments are inundated with security alerts on a daily basis. It
becomes almost impossible to concentrate on anything else, but how does one
assess which alert can be put aside when another could signal a potential breach
in the making? This is where Verizon Enterprise comes in. A company with as much
experience in security as Verizon can bring in experts to analyze,
assess, and determine which issues are highly critical and what steps need to be
put into place to prevent a cyber attack that could spell doom for the
customer. The value in this is that enterprises can choose how much or how
little they need in terms of services. A company may have its own security team
work alongside Verizon’s analysts to make more informed decisions or may choose
to have Verizon help create, design, and roll out a brand new cybersecurity
strategy altogether. 

Several recent moves have enabled Verizon to bolster its security portfolio.
In March 2019, Verizon acquired ProtectWise, a company offering cloud-based
network detection and response. Alex Schlager, Verizon’s executive director,
product management and development, said that the integration of ProtectWise
capabilities with Verizon’s global network services "further enhances our
ability to detect and respond to security threats." In 2018, Verizon
purchased Niddel, a private company dedicated to machine learning-based
automated threat hunting. Also, Verizon has added BlackBerry Cylance’s
artificial intelligence antivirus security solutions to its security services
portfolio. This gives Verizon customers the ability to use CylancePROTECT and
CylanceOPTICS endpoint security products to protect against ransomware, fileless
attacks, and other sophisticated threats. 

It cannot be said enough that with the number of threats growing
exponentially every year and malware and viruses becoming more sophisticated
with every passing day that companies must be better prepared. Most data
breaches end up going undetected for months – even years – before the threat is
found and neutralized, but typically too late for the countless individuals who
end up having their data compromised. Executives complain that security services
do not come cheap and they don’t, but the lesser of the two evils is to pay for
services to protect data then have one’s own IT department handle it alone and
wait for a network intrusion to occur. Verizon’s 2018 Data Breach
Investigations Report identified more than 53,000 incidents and 2,216 confirmed
data breaches for 2017. That year saw a massive uptick in ransomware attacks –
most notably, WannaCry and NotPetya, which hit companies hard around the world.
Although these attacks were prominent in the spring of 2017, companies were
still reporting outbreaks nearly one year later. Ransomware and
denial-of-service attacks can shut down corporate networks for days or longer.
The cost of network attack can be far more expensive – and wider reaching – than
the security services that prevent it. 

Verizon Enterprises provides a breadth of
security services that cater to the needs of every type of organization, from
those that are just beginning to create a security plan and need advice on how
to go about implementing products to protect networks to other businesses that
have a well-maintained security architecture in place but require an expert to
take a fresh look at its mitigation plans. 

Gartner named Verizon Enterprises a leader in its 2018 Magic Quadrant for
Managed Security Services for the sixth consecutive year. 

[return to top of report]

About the Author

[return to top of report]

Karen M. Spring is a staff editor for Faulkner Information
Services, tracking high-tech industries, including network security, data
breaches and cybercriminal activity, CRM, network management, Internet security,
and software tools. She writes regularly on high-tech topics for publications in
the k-12 and higher education industry. Previously, Ms. Spring was a marketing
specialist for two computer distributors, working closely with such clients as
3Com, IBM, Okidata, Unisys, and Acer.

[return to top
of this report]