TECH DIGITAL RESOURCE LIBRARY

Latest Content From Verizon

Whitepaper: For secure access, Passwords Alone Do Not Work

by VerizonNov 16, 2013

The 2013 Data Breach Investigations Report assembled by the Verizon RISK team in conjunction with 19 global partners analyzes 621 data breaches, 47,000+ reported security incidents, and at least 44 million compromised records in 2012. Verizon has been researching and analyzing data for more than nine years.1 The pace of security breaches has not decreased despite advances in security measures and intrusion prevention technologies. Quarter-by-quarter, hacking attempts are increasing exponentially. According to a report compiled by the Internet Crime Complaint Center (IC3), (a joint venture between the FBI and the National White Collar Crime Center), the following statistics indicate the number of complaints reported to the center and the financial scope of the problem.


Whitepaper: Safeguarding businesses in A Time of Expanding And Evolving Cyber Threats

by VerizonNov 16, 2013

Every security breach represents a battle between attacker and target. It's a battle of speed, a battle of skill, and often begins before a potential attacker takes a single physical action.

Over the nine years Verizon has conducted its Data Breach Investigations Report (DBIR), that battleground has continued to evolve. It has become more complex, rife with pitfalls and has opened up new opportunities for surprises.

Attackers remain varied, motivated by different reasons. Disaffected activists; disgruntled employees; state-affiliated actors; organized crime rings; individuals seeking notoriety or monetary gain. The most common trait they share is their ability to act fast, particularly when vulnerabilities are detected and exposed.

This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.


Whitepaper: SIP Trunking: Evolutuion And Position In The Market Today

by VerizonNov 11, 2008

P Trunkingis a VoIP solution that enables enterprises to maintain their IP private branch exchange (PBX) while leveraging the benefits of VoIP. A Verizon executive explores IT Trunking in this recent presentation.


Whitepaper: Considerations In The Evaluation Of IT As A Business Strategy: The IT Outsourcing Dilemma

by VerizonJan 01, 2008

In a majority of business environments, an objective comparison between existing internal IT operations and equivalent outsourced services will reveal significant advantages in cost, reliability, quality, speed, and flexibility. It should enable an organization to immediately identify opportunities to improve operations and support; to increase productivity; to reduce expenditures; to gain access to emerging technologies; and to strengthen competitive market position. Further examination will reveal advantages beyond the obvious. This white paper provides executives critical considerations when examining the outsourcing of information technology. It explores the primary business benefits of outsourcing value and provides key criteria for vendor selection.