CWMA Wireline - Security Services
, Verizon has invested in an ITIL based Program Management Office (PMO) dedicated to support all ITT72 Eligible Entities, as well as, providing enhanced support for our critical Public Safety Customers. View key information about the Commonwealth of Massachusetts ITT72 Contract No. 555593 along with specific reference materials and documents. Verizon Application Vulnerability Scanning is an accurate, complete and cost-effective web application vulnerability management solution. The service delivers the visibility, flexibility, and control that organizations need to manage website security and prevent web attacks. It is delivered using a Software-as-a-Service (SaaS) model that has been designed from the beginning to scale massively to support the largest enterprises and offer compelling business efficiencies to control overall cost of ownership of web applications. Application Vulnerability Scanning is a web-based application service hosted by Verizon to provide customers with the ability to assess their internal and external web sites for vulnerabilities and to provide remediation information to proactively and efficiently fix those vulnerabilities. Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Online Compliance Program and Co-Managed Vulnerability Management Service Have Reached End-of-Sale. As of March 15, 2013, these services will be grandfathered and no new orders will be accepted. In our ongoing commitment to simplify our products, policies, and processes, important changes are being made to our Online Compliance Program (OCP) and Co-Managed Vulnerability Management Service (Co-Managed VM). As of March 15, 2013, OCP and Co-Managed VM will be grandfathered and no new orders will be accepted for these services. This end-of-sale announcement has no immediate impact on existing OCP and Co-Managed VM customers and ongoing support for these customers will be communicated in the coming weeks. Effective immediately, Vulnerability Scanning Services (QualysGuard) should be the product of choice for all new OCP and VM sales opportunities. A robust vulnerability management solution through Verizon's resale of QualysGuard Scanning Services, this service automates the process of vulnerability management and policy compliance across the enterprise, providing:,Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Verizon's DOS Defense (ProQuest) service is a cloud-based Distributed Denial of Service (DDoS) protection service that provides customers the ability to detect and divert potentially malicious DoS and DDoS traffic away from their network, thus allowing them to ensure the availability of their Internet resources for legitimate users. DOS Defense (ProQuest) is composed of two service types:,With DOS Defense customers can benefit from:,Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Verizon Managed Email Content service, utilizing Skeptic™ technology, powered by MessageLabs, acts as a customer's first and strongest line of defense against viruses, spam, and unwanted e-mail content. By scanning e-mail at the network level, Managed Email Content can eliminate security threats before they reach their intended destination. And because Managed Email Content requires no additional hardware or software, it ensures 100-percent virus protection without the need for upgrades or patches. Managed Email Content offers customers four solutions:,Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. The Verizon Fraud Management (VFM) service is designed to review high volumes of medical claims transactions to identify specific healthcare provider and patient behavior patterns that have a negative impact on program expenditures and costs. The patterns can include undesirable behaviors such as payment fraud, propensities for higher utilization frequencies, and large monetary transactions aggregated over time. Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Firewallservices provide monitoring activities including the processing of firewall logs in real time to identify potential security threats. It measures availability and health of the firewall and escalates security and health incidents to initiate remediation. Management activities include troubleshooting and maintenance of the software configuration and rule set. Application Level Firewall - Can only be sold together with Application Vulnerability Scanning Application Level Firewalls help protects web applications from attacks that aim to exploit vulnerabilities in business critical applications. Threats against the web infrastructure are monitored and escalated in real time for immediate action. The service provides software updates and implements policies that improve threat protection. Proxy Server Proxy Servers processes client's web requests per a defined security policy. The device is located between the customer's internal network and the internet gateway, and the service forwards the requests to the Internet or denies them. The proxy server provides policy enforcement, user tracking, and caching capabilities. The following modules can be added as plug-ins: anti-virus, anti-spam, and content screening. Router (Non Standard Offering - Requires Product Council Approval) Router service forwards IP packets and provides connectivity internally and externally with other enterprise networks or the Internet. Service is Limited to Monitoring only. Monitoring and Management requires Product Council approval. Network Switch (Non Standard Offering - Requires Product Council Approval) The service monitors the switch logs for security events and escalates health and security incidents. Service is Limited to Monitoring only. Monitoring and Management requires Product Council approval. VPNManages SSL or IP Sec devices which are used to establish, manage, monitor, and terminate VPN tunnels according to a customer defined policy. Network Intrusion Detection (NIDS)/Prevention (NIPS) System NIPS/NIDS monitors the alerts generated from NIDS/ NIPS sensors located on the LAN segment behind the corporate firewall. Suspicious or malicious traffic can generate alerts and be allowed to pass through or be dropped according to the security policy. The monitoring service analyses the NIDS/NIPS security alerts and performs filtering, classification and correlation to prioritize and escalate security incidents. The signatures of the NIPS/NIDS sensors are kept up to date to maintain a strong security posture. NIDS external sensors are located in front of an Internet facing firewall. The availability of health of the sensor is monitored, alerts are stored, but it does not generate or escalate incidents. Host Intrusion Detection (HIDS)/Prevention (HIPS) SystemsManaged HIDS/HIPS can be installed on servers and clients to operate at the host level to identify and deny potentially malicious activity. Policies can be unique or grouped together and customer specific thresholds are defined. Two types of escalation services are available: full escalation and threshold escalation:,Unified Threat Management (UTM) or Security Appliance UTM monitors and manages multiple security functions such as Firewall, VPN, IPS, Content Filtering and AV/AS through one device. The service operates in the same manner as the individual security devices. Email Security Gateway (replaces Gateway Anti-Virus)Email Security Gateway includes anti-virus filter and e-mail encryption functionality. An anti-spam plug-in is available as an option. Content ScreeningContent Screening is deployed at the Internet Gateway of the network via an appliance or software. It includes scanning and processing of web, e-mail and IM traffic to detect inappropriate content and information leakage defined by the security policy. Log Monitoring and Management (Replaces Application Log Monitoring and Management)Log Monitoring and Management provides automated and centralized collection, current and historical analysis, comprehensive reporting, secure archiving, and retrieval of logs sourced from operating systems, web servers, database servers, and specific windows applications such as AD, DNS, DHCP. Load BalancersEncryption and decryption of SSL sessions for secure web applications can be terminated on the load balancer instead of the web server. Load balancers provide an additional layer of security since Internet clients will not directly connect to the end applications, and may have security-specific functionalities like web application and regular firewalling. Endpoint SecurityEndpoint Security solutions provide several combined protection mechanisms directly to the desktop/laptop using centrally managed endpoint agents. The protection mechanisms can provide services such as anti-virus, anti-spam, personal firewall, encryption or mechanisms which control whether or not peripheral devices can be connected to the endpoint (e.g. printers or USB-sticks). An Endpoint Policy Manager collects security logs from the various endpoint agents and manages centrally common enforced policies. Advanced Threat ProtectionAdvanced Threat Protection leverages Verizon threat intelligence and FireEye's Web Security, Email Security, Malware Protection Cloud and Central Management System to:,Advanced Threat Protection services based on FireEye devices will help to protect customers against advanced persistent cyber threats. Verizon will monitor specifically for traces of activity of malware that are linked to advanced persistent threats and will provide in-depth knowledge of threat intelligence. The devices will reside inside the perimeter to detect and block indicators of compromise. Customers will benefit from Verizon's highly experienced and knowledgeable team of security experts and will receive security incidents with actionable intelligence. File Integrity and Policy Compliance MonitoringFile Integrity and Policy Compliance Monitoring tools are used by organizations to provide configuration control that combines file integrity monitoring with comprehensive compliance policy management to protect, detect, and correct IT systems throughout the enterprise. Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Managed Web Content acts as a customer's first and strongest line of defense against viruses, spyware, and unwanted web content. By scanning Internet traffic at the network level, Managed Web Content can eliminate security threats before they reach their intended destination. Because Managed Web Content requires no additional hardware or software, it ensures web protection at a low total cost of ownership, without the need for maintenance, upgrades, or patches. Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. Contact your Account Manager for more Details,When security threats arise, fast response is critical, not only to containing risk and stopping unwanted activity, but also to protecting sensitive data and preserving evidence. Often, the competency and speed with which an event is handled can make as many headlines as the event itself. The best defended businesses are those that prepare for the unexpected and are supported by professionals who can react quickly, in the face of the worst. With the Verizon Rapid Response Retainer service, you have access to the right expertise - when you need it the most. Rapid Response Retainer customers benefit from:,Trust us to hit the ground running if a security threat affects your organization, because the proficiency with which you respond to threats can affect the level of your customers' confidence and trust. Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. The Verizon Security Management Program (SMP) is a programmatic information security assessment program that validates an organization's security posture against a set of ISO 27002-based security controls. SMP helps organizations reduce IT risks, facilitate compliance efforts, and improve overall security posture by leveraging existing investments in people, processes, and technologies. Customers can demonstrate their commitment to information security by earning and displaying Verizon certifications. SMP will:,SMP is a:,Refer to for additional details along with rates and charges. Please contact your account manager or for more information. Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon Business representative for service availability. These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. We use both third party and first party cookies for this purpose. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. These cookies may be set through our site by Verizon and third parties. They are used to present Verizon advertising on third party sites that you may visit. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising from Verizon. BackClear Filters,All Consent Allowed
Learn more