UBM: TECH DIGITAL RESOURCE LIBRARY

Latest Content From Verizon

Whitepaper: For secure access, Passwords Alone Do Not Work

by VerizonNov 16, 2013

The 2013 Data Breach Investigations Report assembled by the Verizon RISK team in conjunction with 19 global partners analyzes 621 data breaches, 47,000+ reported security incidents, and at least 44 million compromised records in 2012. Verizon has been researching and analyzing data for more than nine years.1 The pace of security breaches has not decreased despite advances in security measures and intrusion prevention technologies. Quarter-by-quarter, hacking attempts are increasing


Whitepaper: Safeguarding businesses in A Time of Expanding And Evolving Cyber Threats

by VerizonNov 16, 2013

Every security breach represents a battle between attacker and target. It's a battle of speed, a battle of skill, and often begins before a potential attacker takes a single physical action.

Over the nine years Verizon has conducted its Data Breach Investigations Report (DBIR), that battleground has continued to evolve. It has become more complex, rife with pitfalls and has opened up new opportunities for surprises.

Attackers remain varied, motivated by different reasons.


Whitepaper: SIP Trunking: Evolutuion And Position In The Market Today

by VerizonNov 11, 2008

P Trunkingis a VoIP solution that enables enterprises to maintain their IP private branch exchange (PBX) while leveraging the benefits of VoIP. A Verizon executive explores IT Trunking in this recent presentation.


Whitepaper: Considerations In The Evaluation Of IT As A Business Strategy: The IT Outsourcing Dilemma

by VerizonJan 01, 2008

In a majority of business environments, an objective comparison between existing internal IT operations and equivalent outsourced services will reveal significant advantages in cost, reliability, quality, speed, and flexibility. It should enable an organization to immediately identify opportunities to improve operations and support; to increase productivity; to reduce expenditures; to gain access to emerging technologies; and to strengthen competitive market position. Further examination will