Managed Security Services – Premises (for Resale)
Verizon provides a full portfolio of Managed Security Services and can work with you to refine security policies and processes to proactively identify vulnerabilities and prioritize threats across your enterprise resulting in better visibility, enhanced security, and reduced risk.
"Verizon provides the expertise you need for security when you need it the most."
Product Manager - Melissa Neptune
- Service Details
- Take Action
Organizations today are confronted with different forms of malware, both internal and external, which have great potential to cause disruption and damage to information and communication infrastructures, and business applications. Organizations who want to avoid negative business impact and reduce risk exposure need to address challenges on various levels - while managing cost, complexity, and risk. These security challenges are related to infrastructure, information, risk, and compliance.
- Manage network infrastructure and resources
- Maintain authorized use and integrity of ever-increasing amounts of critical data and applications
Manage Risk and Compliance:
- Manage a multitude of compliance initiatives and business risk
Firewall provides monitoring activities, including the processing of firewall logs in near real time to identify potential security threats. It measures availability and health of the firewall and escalates security and health incidents to initiate remediation. Management activities include troubleshooting and maintenance of the software configuration and rule set.
Network Intrusion Detection (NIDS) / Prevention (NIPS) System
NIDS/NIPS monitors the alerts generated from the NIDS/NIPS sensors located on the LAN segment the corporate firewall. Suspicious or malicious traffic can generate alerts and be allowed to pass through or be dropped according to the security policy. The monitoring service analyzes the NIDS/NIPS security alerts and performs filtering classification, and correlation to prioritize and escalate security incidents.
Host Intrusion Detection (HIDS)/Prevention (HIPS) Systems
HIDS/HIPS can be installed on servers and clients to operate at the host level to identify and deny potentially malicious activity. Policies can be unique or grouped together, and your customers' specific thresholds are defined. Two types of escalation services are available: full escalation and threshold escalation.
Unified Threat Management (UTM) or Security Appliance
UTM monitors and manages multiple security functions such as Firewall, VPN, IPS, Content Filtering, anti-virus and anti-spam through one device. The service operates in the same manner as the individual security devices.
Email Security Gateway
Email Security Gateway includes anti-virus filter and email encryption functionality. An anti-spam plug-in is available as an option.