• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Wednesday, May 6, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Verizon Business Launches Application Security Program

Verizon Business Launches Application Security Program

July 8, 2009
in Uncategorized
A A

Verizon Business introduced an Application Security Program that takes a risk-based approach to protecting the critical data contained within each application. The program helps understand and identify the potential security threats to their applications, and take steps to protect them. Customers also have the option to pursue a Verizon Cybertrust Application Certification, which verifies that their information-security controls, policies and procedures meet a stringent set of standards.

As shown by Verizon Business’ “2009 Data Breach Investigations Report,” hackers often sneak into and compromise a company’s sensitive data and business systems via insecure applications. Of the 285 million compromised records from the 90 confirmed breaches in 2008 that were examined by the report, 79 percent were compromised via Web applications.

The Verizon Application Security Program comprises three tiers: Baseline, Assess and Certify.

In the first tier of the program, Verizon security experts conduct an initial application-risk assessment, which consists of baseline scanning and reviewing the software development lifecycle of the applications. Verizon determines the types of data consumed by specific applications, which is critical to establishing each application’s risk level, and also determines which applications present the highest risk for the business.

The second tier focuses on high-risk applications. Verizon conducts a full-scale review to assess the criticality and severity of impact to the business if these assets were to be exploited. Typical assessment activities include application vulnerability assessments, penetration testing and security source code reviews.

The third tier offers customers the option of pursing the Verizon Cybertrust Application Certification, which verifies that an organization’s information-security controls, policies and procedures have been examined, measured and validated against a stringent set of Verizon security standards.

Verizon said its certification is rigorous, and renewal requires annual recertification. Certified customers can display and share the Verizon Cybertrust seal with customers, partners and prospects to demonstrate that information security is a top priority for them.

The service is available immediately available in the U.S. and in a number of other countries to large-business customers.
http://www.verizonbusiness.com
http://www.verizonbusiness.com/us/products/security

Tags: AllService Providers
ShareTweetShare
Previous Post

EMC Announced Definitive Deal to Acquire Data Domain

Next Post

Narus Raises $8.7 Million in New Funding

Staff

Staff

Related Posts

Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
BT to combine Enterprise and Global units to create BT Business

BT to combine Enterprise and Global units to create BT Business

December 19, 2022
euNetworks appoints Stephanie Lynch-Habib to President

euNetworks appoints Stephanie Lynch-Habib to President

December 19, 2022
Next Post

DOCOMO Develops HSPA Femtocell

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version