Verizon Business expands managed security services

SAN FRANCISCO'Verizon Business is announcing a data loss prevention offering as an addition to its managed security services portfolio. It will handle data monitoring and policy enforcement to help ensure that sensitive data does not leak from the enterprise.

The service, announced Wednesday at the RSA Security conference, aims to help address the conflicting priorities of network administrators.

'It is no longer acceptable to keep your data within your four walls,' said C.J. Spallitta, director of products for the security solutions team. Data has to be shared with outside users in a growing variety of channels. At the same time, there is increased regulatory pressure to control and account for sensitive data.

Beginning this summer Verizon Business will monitor data loss prevention appliances from Imperva. Other DLP appliances will be added as the market matures and leaders appear, Spallitta said.

The new managed service is part of a package of offerings being bundled into a DLP and protection portfolio. It also includes existing professional services for data classification and data discovery. A Verizon Business team working on-site helps to locate and classify all sensitive data on a system, a necessary first step in data protection.

The DLP managed service completes the data protection process by monitoring activity with sensitive data and controlling its use according to organization policy.

The DLP service is the second expansion of the company's managed security services announced in recent weeks. Last month it added an Application Log Monitoring and Management Service. The new services are two steps on its way up the information technology stack for Verizon Businesses managed security services. For about 10 years it has been offering services focused on the network layer, but 'all the new attacks are at the application layer,' Spallitta said, and demand for services at that level have grown.

The log monitoring and management service includes automated collection, correlation, analysis of current and historical data, reporting, archiving and retrieval of application log data, such as audit records and user activity logs.

About the Author

William Jackson is a Maryland-based freelance writer.

inside gcn

  • bitcoin in data center

    Cryptojacking: The canary in the coalmine?

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group