Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:33 AM

Verizon Enters Cloud Security Market

Small and medium businesses have been moving their IT infrastructure into the cloud, but one challenge has been determining how to secure such applications. To address such concerns, Verizon Business has developed a new suite of cloud-based security services.

Small and medium businesses have been moving their IT infrastructure into the cloud, but one challenge has been determining how to secure such applications. To address such concerns, Verizon Business has developed a new suite of cloud-based security services.Verizon Business has delivered a variety of managed network services to small and medium businesses, such as mobility, contact centers, hosting, VoIP, and security, and has been gradually migrating them to the cloud. The company plans to deliver its new security services in three phases. In June, the company will offer a secure gateway service that features anti-virus, anti-spam, anti-malware and URL filtering services. In the fall, the vendor plans to add network firewalls and intrusion detection and prevention services. In early 2011, Verizon will make its Denial of Service detection and mitigation services available in the cloud. The company did not announce pricing for its services.

Verizon has been a prime supplier of managed services to small and medium businesses for many years. The company first started with network services and has branched into related areas. The vendor offers a number of services, however, the services sometimes can be delivered in a cookie cutter fashion that does not always match a customers business needs. In addition, the vendors services can be expensive.

Recently, the company has been facing more competition. Cable companies have been moving aggressively into the managed services market and have developed a wide  and ever expanding -- array of services. In addition, movement to the cloud has blurred the delimiters between Verizon and some of its traditional IT partners. Consequently, the company finds itself immersed in a highly volatile marketplace. Verizon has done a good job delivering services that appeal to small and medium businesses and moving into cloud fits with their desires. The company seems to have the resources and reputation to emerge as a key player in this market segment, however, customers will easily be able to find alternatives if the vendor fails to delivers robust, cost competitive security services.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...