Verizon Business expands security portfolio with new solutions to help combat cybercrime
Verizon Business is expanding its security portfolio with new security solutions to help businesses better protect themselves against cybercrime: Verizon Managed Detection and Response; Verizon Identity and Verizon Machine State Integrity. In addition, Verizon has enhanced its Rapid Response Retainer service, which offers companies cyber intelligence and incident response capabilities directly from the Verizon Threat Research Advisory Center (VTRAC).
Verizon Managed Detection and Response (MDR) is a new managed security service which leverages analytics and behavior modeling to help organizations quickly identify potential cyberthreats. The fully-managed, scalable, cloud-based solution overlays Verizon’s core remote threat monitoring, detection and response capabilities with built-in multi-layer analytics and behavior modeling from Securonix. Verizon MDR is available globally from April 2020.
Verizon Identity (VID) and Verizon Machine State Integrity both leverage blockchain, the first Verizon security solutions to do so. Blockchain’s decentralized nature elevates enterprise security with no single point of weakness in the solution for cybercriminals to exploit.
Verizon ID enables users to store identity credentials in a secure “digital identity safe” on their mobile devices, which can be easily – and securely - accessed and validated, potentially eliminating the need for passwords. Verizon’s 2019 Data Breach Investigations Report showed that 29 percent of breaches investigated involved the use of stolen credentials. The solution encrypts and distributes identity data across multiple online servers on the blockchain, so there is no centralized database or single point of entry for breach attempts, and also incorporates multi-factor authentication and biometrics for advanced identity protection. It is fully compliant with all major industry regulations and standards including NIST SP 800-63-3, GDPR and FIDO2. The solution is available to customers globally.
Verizon’s Machine State Integrity solution sources operational data from decentralized machine environments to offer clear, actionable insights on potential compliance and security issues. Machine security is a complex challenge - a single weak entry point that is exploited by a cyberattack could lead to complete infrastructure breakdown, and if that infrastructure is a power grid, a manufacturing plant or a smart city environment, the result could be catastrophic. The solution will be available in the US from Q2 2020.
Finally, Verizon’s Rapid Response Retainer puts the full capabilities and experience of the VTRAC team at the disposal of customers in as little as six hours from an incident report (dependent on specific customer retainers), and can now be fully customized to fit customer needs. The service fundamentals - threat intelligence summaries, 24/7 hotline, onsite support and investigative liaison – can now be supplemented with options such as Verizon Network Detection and Response, Dark Web Hunting, Tanium’s endpoint protection and Verizon’s backbone NetFlow. A new mobile app is also available, providing quick access to both threat status reports and dedicated response teams.
Alex Schlager, executive director and chief product officer of security services at Verizon Business, commented: “Cybercrime is a daily threat to every organization and government across the globe. Our 2019 Data Breach Investigations Report highlighted that financially motivated cyberattacks are increasing across the board, and that C-level executives are increasingly and proactively targeted by social breaches, linked to (for example) stolen credentials. Now, more than ever, organizations need to be thinking differently about security, and leveraging cutting edge technology to help mitigate against cybercrime. These Verizon solutions offer a significant step forward in cybersecurity protection.”
source verizon
Industry: Cyber Security
Latest Jobs
-
- Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote)
- London
- N/A
-
Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote) We are seeking an experienced technical Security Consultant to help clients deploy and enhance their cyber defences across Microsoft and vulnerability management technologies. You will work with enterprise customers to deliver tailored solutions across threat detection, endpoint protection and exposure management, ensuring security platforms are efficient, integrated and aligned with operational goals. Whilst you won't do the design yourself- you will work alongside technical Presales to document, agree and then deliver the solution. You will have experience leading delivery the implementation and improvement projects, providing hands-on support with configuration, integration and optimisation. You will assess existing environments, recommend enhancements and guide clients on best practice to strengthen visibility and control. Strong experience with SIEM, XDR and vulnerability tooling (Microsoft & Tenable ecosystems ideal) Understanding of Azure security, identity and access controls Background in consulting or project-based cyber delivery Clear communication skills with the ability to engage senior stakeholders Extra points if you have the SC-100. You must be eligible to achieve UK Security Clearance to be considered for this role.
-
- Account Director | Cyber Security Consulting | UK - South East
- London
- N/A
-
Account Director | Cyber Security Consulting - Financial Services | UK - South East. New Role due to Growth We are looking for an experienced Account Director to develop and expand existing relationships across the financial services sector, working with investment firms, asset managers, private equity groups and strategic partners to deliver intelligent cyber consulting and a bespoke Cyber product offerings. You will act as a trusted advisor, helping organisations strengthen digital resilience, manage third-party and regulatory risk and adopt a proactive approach to cyber assurance. Key Responsibilities Manage a defined portfolio of financial clients, understanding business priorities and aligning tailored cyber solutions. Drive new client engagement while nurturing existing partnerships through a consultative, long-term approach. Present the benefits of advanced cyber services including threat intelligence, vulnerability management, incident readiness, and continuous risk monitoring. Collaborate with technical and delivery teams to ensure smooth engagement from proposal through to implementation and ongoing support. Prepare proposals, negotiate commercial terms, and clearly articulate value and business outcomes. Build trusted relationships at senior and board level. Ideal Profile Strong background in cybersecurity, consulting, or risk management within financial services. Skilled communicator with proven success managing and growing key accounts. Able to translate complex technical insight into commercial and strategic value for clients. Confident engaging with senior stakeholders and decision makers. Please note: Sponsorship is not available.
-
- SOC Analyst- Level 2- Hybrid Greater London
- London
- N/A
-
SOC Analyst- Level 2- Hybrid Greater London New opportunity created through continued growth. We’re looking for a SOC Analyst (Level 2) to strengthen a growing managed security team. You’ll work hands-on with Microsoft Sentinel and Defender XDR, investigating alerts, responding to incidents, and helping improve how clients stay protected. This role is ideal for someone who enjoys unravelling security events, thinking critically under pressure, and making a real difference day to day. What you’ll do · Investigate and respond to security activity across SIEM and endpoint tools · Analyse network and log data to uncover real threats · Support automation initiatives to streamline response processes · Help maintain visibility, data flow, and performance across SOC platforms What you’ll need · Practical experience using Microsoft Sentinel and Defender XDR · Confident working with KQL or similar query languages · Understanding of attacker tactics and response techniques · SC-200 certifications would be nice. · Experience supporting multiple customer environments Please note: Sponsorship is not available.
-
- Senior SOC Engineer - UK - New role due to growth
- London
- N/A
-
Senior SOC Engineer – New role due to growth We are hiring a Senior SOC Engineer to take the lead across security operations for a growing managed service. You will lead detection, response and onboarding activity across multiple clients, helping shape how the SOC evolves. Expect variety; from fine-tuning alerts and threat hunting to supporting customers and mentoring junior analysts. What you’ll bring · Strong experience across SIEM, EDR, and threat detection tools · Confident working with customers in a managed service environment · Skilled in scripting or query languages such as KQL or PowerShell · Knowledge of frameworks like NIST, ISO27001, MITRE ATT&CK · Calm communicator with a problem-solving mindset · Experience with Azure Lighthouse or delegated access models · Prior involvement in automation or SOC improvement projects Location: South East England- Hybrid role Please note: Sponsorship cannot be offered now or in the future.