Welcome!

Cloud Security Authors: Yeshim Deniz, Liz McMillan, Elizabeth White, Ravi Rajamiyer, Pat Romanski

Related Topics: Cloud Security

News Feed Item

Verizon Business Launches New Security Program to Help Enterprises Protect Key Software Applications

New Risk-Based Approach Helps Establish Criticality of Each Application

BASKING RIDGE, N.J., July 9 /PRNewswire/ -- Hacker attacks on business applications, such as databases and software, are a rapidly growing threat to enterprises. To help them meet this challenge, Verizon Business on Thursday (July 9) introduced a comprehensive, new Application Security Program that takes a risk-based approach to protecting the critical data contained within each application.

Immediately available in the U.S. and in a number of countries around the world, the program helps large-business customers better understand and identify the potential security threats to their applications, and take steps to protect them. Customers also have the option to pursue a Verizon Cybertrust Application Certification, which verifies that their information-security controls, policies and procedures meet a stringent set of standards.

"Businesses are often stuck in a Catch-22 situation when it comes to applications," said Kerry Bailey, Verizon Business senior vice president of global services. "While enterprises must adopt new applications to conduct their day-to-day operations and remain competitive, the focus tends to be on functionality and efficiency, not security. If you deploy an application without proactively evaluating the security ramifications, there could be a steep price to pay."

As shown by Verizon Business' "2009 Data Breach Investigations Report," hackers often sneak into and compromise a company's sensitive data and business systems via insecure applications. Of the 285 million compromised records from the 90 confirmed breaches in 2008 that were examined by the report, 79 percent were compromised via Web applications.

In addition to the sheer volume and success of attacks, they are becoming increasingly sophisticated. Compounding this growing trend is that the traditional software-development cycle often does not address security, which makes enterprises even more vulnerable to security breaches. Moreover, fixing vulnerable applications can be challenging, costly and time-consuming.

Adds Bailey: "Verizon offers one-stop shopping to address an enterprise's complete application-security needs. Using each customer's unique risk profile, we can help the business identify high-priority applications -- and the vulnerable, critical data contained within them -- before intruders have the opportunity to exploit the applications and harm the business."

Three-Tiered Approach

The Verizon Application Security Program comprises three tiers: Baseline, Assess and Certify. Customers enter the program at the first tier, and can continue through the second and third tiers, based on customers' unique business requirements. To mitigate security risk, new applications can be vetted before they are deployed.

"Verizon's Application Security Program addresses an important area that is often overlooked by enterprises -- securing the applications that are critical to business operations," said Amy DeCarlo, principal analyst -- managed IT services at Current Analysis. "This program allows for a more thorough look at enterprise applications to ensure they are not only available but secure. With more attacks targeted at the application layer, this kind of attention to application security is essential."

In the first tier of the program, Verizon security experts conduct an initial application-risk assessment, which consists of baseline scanning and reviewing the software development lifecycle of the applications. Verizon determines the types of data consumed by specific applications, which is critical to establishing each application's risk level, and also determines which applications present the highest risk for the business.

The second tier focuses on high-risk applications. Verizon conducts a full-scale review to assess the criticality and severity of impact to the business if these assets were to be exploited. Typical assessment activities include application vulnerability assessments, penetration testing and security source code reviews.

The third tier offers customers the option of pursing the prestigious Verizon Cybertrust Application Certification, which verifies that an organization's information-security controls, policies and procedures have been examined, measured and validated against a stringent set of Verizon security standards. The certification is rigorous, and renewal requires annual recertification. Certified customers can display and share the Verizon Cybertrust seal with customers, partners and prospects to demonstrate that information security is a top priority for them.

Customers can choose to remediate on their own any vulnerabilities identified by the Application Security Program, or to outsource the remediation to Verizon Business. Verizon Business offers a wide range of remediation services to prevent, detect and respond to vulnerabilities, including secure application development training, identity and access management, and disaster recovery.

Verizon Cybertrust Security

The Verizon Application Security Program joins Verizon Business' robust portfolio of security solutions, aimed at helping enterprises and government agencies manage security risk and protect critical company assets. The portfolio includes governance risk and compliance solutions, data loss and prevention solutions, identity management solutions, and managed security services. The company's more than 1,100 security professionals around the globe deliver these offerings through a range of managed services, professional services and technologies, based on what best suits the customer. More information is available by visiting http://www.verizonbusiness.com/us/products/security.

About Verizon Business

Verizon Business, a unit of Verizon Communications (NYSE: VZ), is a global leader in communications and IT solutions. We combine professional expertise with the world's most connected IP network to deliver award-winning communications, IT, information security and network solutions. We securely connect today's extended enterprises of widespread and mobile customers, partners, suppliers and employees -- enabling them to increase productivity and efficiency and help preserve the environment. Many of the world's largest businesses and governments -- including 96 percent of the Fortune 1000 and thousands of government agencies and educational institutions -- rely on our professional and managed services and network technologies to accelerate their business. Find out more at www.verizonbusiness.com.

VERIZON'S ONLINE NEWS CENTER: Verizon news releases, executive speeches and biographies, media contacts, high-quality video and images, and other information are available at Verizon's News Center on the World Wide Web at www.verizon.com/news. To receive news releases by e-mail, visit the News Center and register for customized automatic delivery of Verizon news releases.

SOURCE Verizon Business

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture was Octoblu, a cross-protocol Internet of Things (IoT) mesh network platform, acquired by Citrix. Prior to co-founding Octoblu, Chris was founder of Nodester, an open-source Node.JS PaaS which was acquired by AppFog and ...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...