YOU ARE AT:EnterpriseVerizon Business intros zero-trust security suite for mid-sized firms

Verizon Business intros zero-trust security suite for mid-sized firms


Verizon Business has introduced a ‘zero-trust’ network access (ZTNA) service for enterprise customers to secure their devices, network, and cloud applications. It claims the service, called Trusted Connection, is a “first-of-its-kind” for “network-native security”, and secures network access for authorised users whether they are on/off-site, and whether their applications are on the edge or in the cloud. It is geared (“ideal”) for mid-sized businesses, it said.

In sum, Verizon Business has united security service edge (SSE) capabilities, including ZTNA, plus cloud secure web gateway (SWG), cloud access security broker (CASB) and firewall-as-a-service (FWaaS) applications, with per-user/group policy definitions, encrypted network pathways, and performance insights such as automated alerts and anomaly detection. All the functionality is available in a single console to control access to sensitive data.

Instead of establishing a secure perimeter around an enterprise’s networking and systems, it secures the pathways and access mechanisms in between. Verizon Business said it establishes a single-provider for both network services and embedded security to connect to curated software as-a-service (SaaS) providers; the firm is offering it as a managed service. It works across multiple office/worksite locations, data centres, and multi/hybrid cloud setups. 

A statement said: “[The service] secures connections and endpoints from any device to any digital resource, spanning web/cloud, software as-a-service, private apps and more. [It] is particularly suitable for larger mid-size businesses that need enhanced security but don’t have the resources or dedicated expertise to install and run it themselves, or for enterprises looking to simplify the management of their security.”

The firm’s own research (Verizon Data Breach Investigations Report) in 2024 says 77 percent of basic web application attacks and 31 percent of all breaches in the past decade involved the use of stolen credentials. Enforcing zero-trust access and multi-factor authentication, and checking devices’ security credentials (“postures”) is the way to protect against such attacks, said the company. 

Kyle Malady, chief executive at Verizon Business, said: “The right cybersecurity architecture is one of the most important responsibilities technology decision-makers face. End-to-end security is critical. If a perimeter is breached, bad actors can wreak havoc. Trusted Connection creates a protected environment within the outer walls of security, protecting each specific entry point and pathway that could lead a bad actor to a valuable digital asset.”

ABOUT AUTHOR

James Blackman
James Blackman
James Blackman has been writing about the technology and telecoms sectors for over a decade. He has edited and contributed to a number of European news outlets and trade titles. He has also worked at telecoms company Huawei, leading media activity for its devices business in Western Europe. He is based in London.