More of our content is being permanently logged via blockchain technology starting [10.23.2020].
When it comes to data theft, cybercriminals can break in and steal data in a matter of minutes. Verizon’s 2016 Data Breach Investigations Report found that in 93 percent of the cases analysed, attackers were able to compromise systems in minutes or less. On the other hand, most organizations didn’t discover that a breach had even occurred until weeks later.
Fortunately, organizations now have a new tool in their arsenal to proactively hunt and confront cyber threats head-on, rather than waiting for cybercriminals to come knocking on their door, thanks to a new, best-of-breed threat intelligence platform from Verizon. The Verizon Threat Research Advisory Center draws cyber situational awareness from Verizon's global public IP backbone to power enhanced applied intelligence solutions that improve cyberattack detection and recovery times. This allows Verizon’s customers to recognize and react to today’s more sophisticated cyber threats faster and more effectively – and ultimately, stop cyberattacks in their tracks.
“The evolution of cybercrime has changed the battle plan,” comments Bryan Sartin, executive director, Global Security Services, Verizon Enterprise Solutions. “Historically, organizations have often been caught on the back foot when it comes to cyber intelligence. Now, with the right mixture of data analytics, research horsepower and the increased sharing of information, we have a much clearer picture of the tools, techniques and procedures used by cybercriminals, enabling us to proactively seek out threats rather than just responding to them.”
Bryan Sartin, Executive Director, Global Security Services.
A best of breed threat intelligence platform
Verizon’s Threat Research Advisory Center is a significant milestone in the company’s continued investments into cyber security intelligence and next generation cyber defense. With one of the largest global IP networks, Verizon has an expansive view into the world’s data traffic. In the Center, this visibility is combined with up-to-the-minute information from thousands of customer security devices under management, intelligence from Verizon’s breach response investigations team, and other proprietary and third party threat intelligence sources, to correlate and contextualize cyber threats in real-time. This actionable intelligence is driven through Verizon’s security solutions to deliver a more resilient security posture.
New enhanced cyber-intelligence solutions are also now available through Verizon’s Threat Intelligence & Response Service (formerly Rapid Response Retainer). This global service combines network threat hunting, cyber brand protection and computer incident response, all supported by strong Service Level Agreements and Verizon’s years of digital forensics expertise.
Sartin adds, “The new Threat Research Advisory Center is a key enabler for Verizon’s ongoing security vision, uniting all of our cyber-intelligence capabilities under one roof. Our investment in these capabilities is ongoing – spanning technology, ecosystems, manpower and partnerships. We intend to be the key disrupter of cybercrime, continuing to collate and share cyber intelligence and cyberattack data to make the industry stronger, and help our customers become more cyber-resilient.”
About Verizon’s security portfolio
Verizon understands that there is no one-size-fits-all solution to cyber threats. Enterprises need the expertise of a security solutions provider that understands how to design and deliver security solutions that minimize risk and maximize the return on security spend. Verizon’s Professional Services team brings our collective expertise to bear on comprehensive assessment and evaluation services, identifying risk from network at the core to devices at the edge of enterprise operations and all access points in between.
Verizon offers extensive capabilities through a combination of our flexible approach and comprehensive integrated solutions portfolio. This also includes the company’s five global network operations centers in the United States, Europe, and Asia as well as its nine state-of-the-art security operations centers (SOCs) on four continents that currently manage security devices in over 35 countries.