T&D World Magazine

Verizon Business to Offer New Managed Security Service

From the network to the end- user, Verizon Business will offer enterprise customers a way to protect their software and Web applications that underlie critical business processes.

The new Application Log Monitoring and Management Service will augment Verizon Business' Managed Security Services (MSS) portfolio, which helps deliver end-to-end protection of an organization's entire IT "stack" -- the computing structure that includes the network, data, application and user layers).

The new service enables customers to efficiently log, track and analyze user and system activity of software and Web applications, operating systems, and Web and database servers while avoiding the cost and complexity of building, maintaining and monitoring an in-house log management infrastructure.

The Application Log Monitoring and Management Service will be available in the U.S. and many countries around the world, beginning next month.

The new offering enables users to better mitigate risk, control IT costs, reduce complexity, and automate security compliance initiatives. As a result, customers can react more quickly to security threats, gain speedy access to critical information, and facilitate security compliance audits.

With one of the world's most expansive IP networks, Verizon Business has a unique view into the global security threat landscape. Customers can rely on Verizon Business' expert security capabilities and advanced analysis to provide visibility into -- and the ability to mitigate -- new and emerging threats that may affect a business.

According to industry analyst firm Forrester Research, Internet attacks are shifting from the network to software and Web applications. The firm noted: "Cyber attacks have moved up from the network layer to the application layer. Applications, especially Web applications, have become prime targets for attackers because they create, present, modify, and store sensitive data, from credit card numbers to intellectual property." (Forrester, "Five Trends That Will Shape The IT Security Profession In 2008," By Jonathan Penn with Tom Pohlmann, Paul Stamp and Allison Herald, Dec. 28, 2007.)

By outsourcing their log management infrastructure to Verizon Business, customers can better protect their global operations against security threats. The managed service includes automated collection, correlation, analysis of current and historical data, comprehensive reporting, secure archiving, and retrieval of application log data such as audit records and user activity logs.

Using advanced correlation and classification of logged security data, Verizon Business' team of security experts can filter out real threats and, when necessary, react quickly to neutralize potential threats and attacks against customers.

A key feature of the service is that it allows organizations to maintain the proper IT controls and reporting requirements needed to help them address industry standards and security regulations such as the Federal Information Security Management Act (FISMA), Health Insurance Portability and Accountability Act (HIPAA), COBIT 4.0, Payment Card Industry Data Security Standard (PCI DSS) and ISO 17799. Best practice IT frameworks dictate that organizations collect, periodically review and securely archive their security log data for a defined period of time.

Additionally, the ability to archive log data provides customers with secure, scalable storage and fast access to log data on the customer premises, which helps to facilitate quicker security audits.

Verizon Business' comprehensive Managed Security Services portfolio provides security monitoring and management of premises-, cloud- and Software as a Service (SAAS)-based solutions to protect the extended enterprise. Verizon Business MSS uniquely complements an organization's in-house capabilities with round-the-clock analysis and expertise.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish