Verizon Enterprise Cyber Security Solutions: MSSP Overview and Analysis

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

See our complete list of top managed security service providers

Company Description

Verizon has grown from its origins as Bell Atlantic to become the second largest telecommunications company in the world. Verizon Enterprise is the part of the business that provides managed services to enterprise customers.

Service Description

Verizon has three security operations centers (SOCs) in the U.S. (one serving only government customers), two in Europe and four in the Asia/Pacific region (one serving government customers). Verizon Enterprise offers several cybersecurity solutions, including the following:

  • Security Professional Services: Focuses on tackling security compliance and strategy to mitigate risk
  • Network and Gateway Security: Implements protection at the network edge to help detect and prevent advanced threats, intrusions and other exploits before they reach a company’s network
  • Security Monitoring and Operations: Manages devices and certificates, helps maintain compliance and offers threat intelligence
  • Incident Response: Responds to data breach incidents. Verizon’s Research, Investigations, Solutions and Knowledge (RISK) Team investigates hundreds of breaches each year.

Verizon’s Managed Security Services (MSS) analytics platform uses a Unified Security Services Portal for customers. Verizon’s log event collector (LEC) feeds security data to a big data-based analytics platform, along with Splunk, for automated analysis, visualization and log storage.

Markets and Use Cases

From SMBs to large enterprises.


The annual Verizon Data Breach Investigation Report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. The company analyzes more than 1 million security events every day at its global network operations centers and security operations centers.


Via SOCs that monitor the network.


Threat detection capabilities are available from Verizon’s Advanced Threat Intelligence and Monitoring Service. Assistance beyond basic incident response support, such as malware analysis and network and endpoint forensics, is available via professional services or Verizon’s Rapid Response Retainer (RRR) service. Verizon’s Research, Investigations, Solutions, Knowledge (RISK) team provides threat intelligence and the vendor’s incident response services.


Pricing is determined on a case-by-case basis and often includes components beyond the security solutions, including?professional services. Verizon’s pricing model for the MSS Analytics service is based on the data volume of log event and other data sources sent per day, measured in GB per day (management of security devices is still priced on a per-device basis).

Analyst View

Gartner said Verizon has a strong track record for delivering MSS and has a broad range of security services in multiple regions. Its position as a telecommunications service provider brings additional network-based offerings for networks and internet service customers through enhanced data acquisition and analysis of customer network traffic and on premises device logs. It named Verizon as a Leader in its latest security service Magic Quadrant. But those using its security analytics service, Gartner said, should carefully analyze how much event and data volume they currently generate to determine service costs accurately.

Get the Free Cybersecurity Newsletter

Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Drew Robb Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis