Skip to main content

Managed Security with a Strategic Twist


Managed services provider Verizon Business has added an interesting twist to its security toolbox. Traditionally, managed security services are tactical: they monitor a network for potential attacks, using virus signatures and other definitions.

Earlier this month, Verizon upgraded its customers' security capabilities with what it calls its "Risk-Correlation Service," designed to add strategic insight to security.

The RCS works with vulnerability scans -- either those it does for customers or those from vendors such as McAfee, Qualys, and others -- to determine where potential vulnerabilities exist. The service also documents your system to create a map of devices and the business processes that run on them. "It marries threat information with vulnerability information," says Jonathan Nguyen-Duy, Director of Product Management for Verizon.

Calculating Risks
The result is a Web-based scorecard that shows Verizon customers not only where potential problems exist, but rank the level of relative importance of those devices. "We can tell you the likelihood of an event on a particular device, but also the business process associated with that device," says Nguyen-Duy. "Using the information from the vulnerability scan, we can tell you about the impact on availability. Is the device running real-time transactions, or is it a database server that might have less sensitive information?"

Strategically, companies can use the information presented in the online scorecard to get a sense of where to improve their online protection. Not all information is created equal, and not every database server requires the same level of protection.

The scorecard is designed to help companies prioritize their security budgets and their business continuity programs. "With limited resources, it's important to understand the relative risk of each vulnerability," he says.

Protection from Attacks
The online scorecard also works when attacks are underway. In those instances, it helps customers work with Verizon to identify where remediation is most important. "Sometimes you have to work in real-time to figure out where attacks are happening," Nguyen-Duy says. "Your ability to respond is improved when you have better information on the threat and what business process might be affected."

Being proactive about security is like flossing your teeth; you know you should do it more often, but it doesn't always happen. Applying a methodology that combines both strategic and tactical security needs is very wise. Clearly, when it comes to security, it's easier to be reactive when you've already been proactive.

Besides, the complexity of providing comprehensive network security protection, and keeping it fully up to date, is something best left to the experts. That's why managed security is one of the most utilized managed service offerings.

Popular posts from this blog

Why the Future of AI is Agentic but Precarious

We have now entered the AI Agentic era, according to the latest series of reports by Google's artificial intelligence (AI) researchers. The shift from passive generative AI models to autonomous AI agents that can plan, reason, and act on our behalf is the most profound digital transformation in decades. As  Applied-AI Initiatives replace deterministic code, a significant challenge has emerged. Building an AI agent is easy; however, trusting it is complex. The current AI market momentum reveals a stark last-mile gap. While a developer can spin up an AI prototype in minutes, roughly 80 percent of the effort required to reach production is consumed by the work of safety, validation, and infrastructure. The reason is simple: AI agents are non-deterministic. They can pass 100 unit tests but fail catastrophically in the field because of a flaw in their judgment, not a bug in the code. Core Architecture and the Problem-Solving Loop An Applied-AI agent is defined by the synergy of four co...