News Center - Verizon Enterprise Solutions

 
From:

(enter date example: 13-Apr-2009)
To:

Category
Category
Country
Country
Language
Language
Reset
Filter

4 Rules for Maintaining Mission-Critical Enterprise Apps

Sonya Cork, Guest Contributor 
Jul 24, 2014 ~ 

As the business of government increasingly moves online, more and more focus will be placed on creating highly resilient networks and applications that enable employees to deliver the services that citizens expect.

Powerful networks and advanced IT solutions, such as cloud computing, drive today's dynamic global marketplace. They also play an equally critical role for governments in delivering vital services to citizens and other stakeholders... Read more >

Share       
 
 

Chinese and American Drivers: Not Quite the Same

Marie McGehee, Contributor 
Jul 24, 2014 ~ 

In a car crash and need help? In the U.S. and other western countries, drivers reflexively dial 9-1-1 or other emergency numbers. But in China, it's more common to call a friend or lawyer first. Kevin Link, senior vice president and General Manager China at Verizon Telematics noted this difference during a discussion at Telematics Detroit. "It's a very different mindset and an important reminder that one cannot assume that the model you've used in one market is going to work in every market." ... Read more >

Share       
 
 

What You May Not Know: Security's Greatest Weakness

Nilesh Pritam, Contributor 
Jul 23, 2014 ~ 

Bryan Sartin's keynote on day two of the RSA Conference in Singapore has a little bit of everything - statistics, pictures, stories. The major takeaway? The fact that it continues to take organizations up to a staggering seven months to detect a breach, on average. Verizon's lead forensics investigator goes further concluding that almost two-thirds of victims don't even know when they've been breached.

"Security's greatest weakness is incidence detection," Bryan stressed. "If and when an incident is detected, victims often think that they're the only ones breached." ... Read more >

Share       
 
 

From Data to Wisdom: Big Lessons in Small Data

Nilesh Pritam, Contributor 
Jul 22, 2014 ~ 

Jay’s opening line, speaking at the RSA Conference held in Singapore, says it all. The data scientist and co-author of the 2014 Verizon Data Breach Investigations Report doesn’t mince his words while speaking about the way forward for the security industry’s ongoing battle with cybercriminals. “Adversaries are not random, they exhibit tendencies. Tendencies lead to patterns, therefore security controls should not be random,” Jay told a packed room. In essence, predictive analytics have a crucial role to play in enabling information security professionals to stay ahead of the game... Read more >

Share       
 
 

Verizon Enterprise Solutions: 2Q 2014 Highlights

Kelly Crummey, Contributor 
Jul 22, 2014 ~ 

Verizon Enterprise Solutions provided innovative cloud, security, M2M (machine-to-machine), networking and other technology solutions for a variety of clients around the globe in the second-quarter of 2014. Highlights include: ... Read more >

Share       
 
 

The Internet of Things, Location, Location, Location…and the Car

Marie McGehee, Contributor 
Jul 21, 2014 ~ 

Cisco estimates that the Internet of Things will generate $14.4 trillion in economic activity in the next decade. According to Kevin Link, senior vice president and GM China at Verizon Telematics, it’s the intersection between the Internet of Things (IoT) and the connected car which creates the most potential... Read more >

Share       
 
 

Business Sign-In

Manage your My Business or Verizon Enterprise Center account.
Watch Video >

Invalid Login

One or more of the values you entered is incorrect. Please verify your information and try again.

Forgot Password?