Tuesday, August 4, 2009

Verizon Business Rolls Out Next-Gen Managed Security Services Platform

Verizon Business launched commercial services over its next-generation managed security services (MSS) platform.

The company said its newly enhanced and proprietary State and Event Analysis Machine (SEAM) is designed to go beyond first generation threat and vulnerability tools to safeguard corporate networks by proactively identifying vulnerabilities and prioritizing threats across the extended enterprise -resulting in better visibility, enhanced security and reduced risk. SEAM gathers information from Verizon Business' expansive global IP network as well as customer network- and premises-based security devices. The system uses this data to correlate risk from three key sources: threat information received from security devices in real time, vulnerability and technical asset information gathered from periodic scans, and asset criticality information received from the customer.

In addition, an enhanced online portal provides customers with critical information about their entire security infrastructure, including details that enable security executives to see their company's network security status at any given time.

Verizon Business is offering three new MSS tiers:

  • Basic Monitoring: Allows customers to outsource only the monitoring of security devices to Verizon Business while leveraging in-house staffing and retaining management control.

  • Premium Monitoring: Provides continuous monitoring of security devices with analytical support from Verizon Business. Security logs and alerts generated by security devices are analyzed, correlated and classified by the Verizon proprietary SEAM Engine and interpreted by security analysts located in one of the company's global security operations centers.

  • Premium Monitoring and Management: Provides the monitoring capabilities that are part of the Premium Monitoring service, and also proactive management of all devices. This includes installing security patches, managing security policies and restoring devices.


Post a Comment

See also