Verizon Business expands security portfolio with new solutions to help combat cybercrime
Verizon Business is expanding its security portfolio with new security solutions to help businesses better protect themselves against cybercrime: Verizon Managed Detection and Response; Verizon Identity and Verizon Machine State Integrity. In addition, Verizon has enhanced its Rapid Response Retainer service, which offers companies cyber intelligence and incident response capabilities directly from the Verizon Threat Research Advisory Center (VTRAC).
Verizon Managed Detection and Response (MDR) is a new managed security service which leverages analytics and behavior modeling to help organizations quickly identify potential cyberthreats. The fully-managed, scalable, cloud-based solution overlays Verizon’s core remote threat monitoring, detection and response capabilities with built-in multi-layer analytics and behavior modeling from Securonix. Verizon MDR is available globally from April 2020.
Verizon Identity (VID) and Verizon Machine State Integrity both leverage blockchain, the first Verizon security solutions to do so. Blockchain’s decentralized nature elevates enterprise security with no single point of weakness in the solution for cybercriminals to exploit.
Verizon ID enables users to store identity credentials in a secure “digital identity safe” on their mobile devices, which can be easily – and securely - accessed and validated, potentially eliminating the need for passwords. Verizon’s 2019 Data Breach Investigations Report showed that 29 percent of breaches investigated involved the use of stolen credentials. The solution encrypts and distributes identity data across multiple online servers on the blockchain, so there is no centralized database or single point of entry for breach attempts, and also incorporates multi-factor authentication and biometrics for advanced identity protection. It is fully compliant with all major industry regulations and standards including NIST SP 800-63-3, GDPR and FIDO2. The solution is available to customers globally.
Verizon’s Machine State Integrity solution sources operational data from decentralized machine environments to offer clear, actionable insights on potential compliance and security issues. Machine security is a complex challenge - a single weak entry point that is exploited by a cyberattack could lead to complete infrastructure breakdown, and if that infrastructure is a power grid, a manufacturing plant or a smart city environment, the result could be catastrophic. The solution will be available in the US from Q2 2020.
Finally, Verizon’s Rapid Response Retainer puts the full capabilities and experience of the VTRAC team at the disposal of customers in as little as six hours from an incident report (dependent on specific customer retainers), and can now be fully customized to fit customer needs. The service fundamentals - threat intelligence summaries, 24/7 hotline, onsite support and investigative liaison – can now be supplemented with options such as Verizon Network Detection and Response, Dark Web Hunting, Tanium’s endpoint protection and Verizon’s backbone NetFlow. A new mobile app is also available, providing quick access to both threat status reports and dedicated response teams.
Alex Schlager, executive director and chief product officer of security services at Verizon Business, commented: “Cybercrime is a daily threat to every organization and government across the globe. Our 2019 Data Breach Investigations Report highlighted that financially motivated cyberattacks are increasing across the board, and that C-level executives are increasingly and proactively targeted by social breaches, linked to (for example) stolen credentials. Now, more than ever, organizations need to be thinking differently about security, and leveraging cutting edge technology to help mitigate against cybercrime. These Verizon solutions offer a significant step forward in cybersecurity protection.”
Industry: Cyber Security
- Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL
- United Kingdom
Contract (outside) Cyber Incident manager – current SC clearance ESSENTIAL Outside IR35 Client facing (Remote UK) with occasional site visit. Must have current Cyber incident response / management experience. Both proactive planning, escalation, coordination and coordinating response. Stakeholder engagement both technical and non technical teams. Prior experience with Technical incident / digital forensics / crisis management. Immediate role.
- Tenable Vulnerability Analyst - CONTRACT outside IR35. SC cleared.
- United Kingdom
6 month rolling contract Outside IR35- immediate start. Threat and Vulnerability Analyst. Tenable.sc experience needed. The ability to deploy agent, configure environments, run active and passive scans, produce reports and prioritise remediation activities based on output Current and ACTIVE SC clearance is required
- ForgeRock Consultant
- £600 per day
ForgeRock Consultant required for 6 Month Contract (with potential to extend) Outside IR35, Must be willing to work Europe hours (GMT+1) This is a remote position, Looking for a lead ForgeRock Technical Consultant with strong experience of ForgeRock to lead the next phase of deployment. Good understanding of ForgeRock Directory Services. · Responsible for the design and implementation of ForgeRock stack · Install and configure ForgeRock stack to meet customer authentication and authorization requirements, · Design and implement OAuth2 protocol using ForgeRock OpenAM, · Design and develop OpenAM custom authentication modules, · Configure ForgeRock stack to protect RESTful API, · Troubleshoot and support ForgeRock IAM stack. · Designed and developed Restful APIs, This is a great project with an expanding ForgeRock Partner, where you will get to work on some high level deployment projects We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins mid project
- Network Security Engineer
- €550 a day
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract