Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Verizon Business Launches New Security Program to Help Enterprises Protect Key Software Applications

Hacker attacks on business applications, such as databases and software, are a rapidly growing threat to enterprises. To help them meet this challenge, Verizon Business today introduced a comprehensive new Application Security Program that takes a risk-based approach to protecting the critical data contained within each application.
  • 10 July, 2009 13:23

<p>New Risk-Based Approach Helps Establish Criticality of Each Application</p>
<p>SYDNEY, Australia – 10 July 2009 – Hacker attacks on business applications, such as databases and software, are a rapidly growing threat to enterprises. To help them meet this challenge, Verizon Business today introduced a comprehensive new Application Security Program that takes a risk-based approach to protecting the critical data contained within each application.</p>
<p>Immediately available in the U.S. and in a number of countries around the world, the program helps large-business customers better understand and identify the potential security threats to their applications, and take steps to protect them. Customers also have the option to pursue a Verizon Cybertrust Application Certification, which verifies that their information-security controls, policies and procedures meet a stringent set of standards.</p>
<p>“Businesses are often stuck in a Catch-22 situation when it comes to applications,” said Kerry Bailey, Verizon Business senior vice president of global services. “While enterprises must adopt new applications to conduct their day-to-day operations and remain competitive, the focus tends to be on functionality and efficiency, not security. If you deploy an application without proactively evaluating the security ramifications, there could be a steep price to pay.”</p>
<p>As shown by Verizon Business’ “2009 Data Breach Investigations Report,” hackers often sneak into and compromise a company’s sensitive data and business systems via insecure applications. Of the 285 million compromised records from the 90 confirmed breaches in 2008 that were examined by the report, 79 per cent were compromised via Web applications.</p>
<p>In addition to the sheer volume and success of attacks, they are becoming increasingly sophisticated. Compounding this growing trend is that the traditional software-development cycle often does not address security, which makes enterprises even more vulnerable to security breaches. Moreover, fixing vulnerable applications can be challenging, costly and time-consuming.</p>
<p>Adds Bailey: “Verizon offers one-stop shopping to address an enterprise’s complete application-security needs. Using each customer’s unique risk profile, we can help the business identify high-priority applications -- and the vulnerable, critical data contained within them -- before intruders have the opportunity to exploit the applications and harm the business.”</p>
<p>Three-Tiered Approach</p>
<p>The Verizon Application Security Program comprises three tiers: Baseline, Assess and Certify. Customers enter the program at the first tier, and can continue through the second and third tiers, based on customers’ unique business requirements. To mitigate security risk, new applications can be vetted before they are deployed.</p>
<p>“Verizon’s Application Security Program addresses an important area that is often overlooked by enterprises – securing the applications that are critical to business operations,” said Amy DeCarlo, principal analyst - managed IT services at Current Analysis. “This program allows for a more thorough look at enterprise applications to ensure they are not only available but secure. With more attacks targeted at the application layer, this kind of attention to application security is essential."</p>
<p>In the first tier of the program, Verizon security experts conduct an initial application-risk assessment, which consists of baseline scanning and reviewing the software development lifecycle of the applications. Verizon determines the types of data consumed by specific applications, which is critical to establishing each application’s risk level, and also determines which applications present the highest risk for the business.</p>
<p>The second tier focuses on high-risk applications. Verizon conducts a full-scale review to assess the criticality and severity of impact to the business if these assets were to be exploited. Typical assessment activities include application vulnerability assessments, penetration testing and security source code reviews.</p>
<p>The third tier offers customers the option of pursing the prestigious Verizon Cybertrust Application Certification, which verifies that an organisation’s information-security controls, policies and procedures have been examined, measured and validated against a stringent set of Verizon security standards. The certification is rigorous, and renewal requires annual recertification. Certified customers can display and share the Verizon Cybertrust seal with customers, partners and prospects to demonstrate that information security is a top priority for them.</p>
<p>Customers can choose to remediate on their own any vulnerabilities identified by the Application Security Program, or to outsource the remediation to Verizon Business. Verizon Business offers a wide range of remediation services to prevent, detect and respond to vulnerabilities, including secure application development training, identity and access management, and disaster recovery.</p>
<p>Verizon Cybertrust Security</p>
<p>The Verizon Application Security Program joins Verizon Business’ robust portfolio of security solutions, aimed at helping enterprises and government agencies manage security risk and protect critical company assets. The portfolio includes governance risk and compliance solutions, data loss and prevention solutions, identity management solutions, and managed security services. The company's more than 1,100 security professionals around the globe deliver these offerings through a range of managed services, professional services and technologies, based on what best suits the customer. More information is available by visiting</p>
<p>About Verizon Business</p>
<p>Verizon Business, a unit of Verizon Communications (NYSE: VZ), is a global leader in communications and IT solutions. We combine professional expertise with the world’s most connected IP network to deliver award-winning communications, IT, information security and network solutions. We securely connect today’s extended enterprises of widespread and mobile customers, partners, suppliers and employees — enabling them to increase productivity and efficiency and help preserve the environment. Many of the world’s largest businesses and governments — including 96 per cent of the Fortune 1000 and thousands of government agencies and educational institutions — rely on our professional and managed services and network technologies to accelerate their business. Find out more at</p>
<p>VERIZON'S ONLINE NEWS CENTRE: Verizon news releases, executive speeches and biographies, media contacts, high-quality video and images, and other information are available at Verizon's News Center on the World Wide Web at To receive news releases by e-mail, visit the News Center and register for customised automatic delivery of Verizon news releases.</p>
<p>Press Contact:</p>
<p>Gabriel Wong</p>
<p>Max Australia</p>
<p>+61 2 9954 3492</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Media Release

More media release