Verizon Business

2018_vz_better_matters_h_300_rgb_r.black

 

Address: One Verizon Way
Basking Ridge
New Jersey
07920
USA
10 Collyer Quay
16th Floor Ocean Financial Centre
Singapore 049315
Ke Stvanici 656/3
186 00 Rohansky Ostrov
Czech Republic
Telephone: +1 (804) 385 6166
Email: [email protected]
Website: http://www.verizonbusiness.com/uk/solutions/
Contact: Kevin Horvath

 

Address: HJ Wenckebachweb
1231096 AM
Amsterdam
Cary
NC 6400 Weston Pkwy
6W Floor
USA
Reading International Business Park
Basingstoke Road
Reading
Berkshire
RG2 6DA
UK

Capabilities

Penetration Testing

Contact: Kevin Horvath
+1 (804) 385 6166
[email protected]
http://www.verizonenterprise.com/products/security/security-professional-services/

To bolster your overall security, it is imperative that an understanding is gained of where your weakest points exist. Our highly skilled team can help you to prioritize your defenses.

Our services include:

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers:  Yes
Certified Web Application Testers: No
Certified Infrastructure Testers:  No
Certified Wireless Testers:  No

Cyber Security Incident Response

Contact: Laurance Dine
[email protected]
http://www.verizonenterprise.com/products/security/risk-team/investigative-response.xml
Emergency Help: +44 (0)800 376 2926 (option #4)

The Verizon RISK team (Research, Investigation, Solutions and Knowledge) is the practice group responsible for all customer-facing Incident Response, Computer Forensics, IT Investigative work, Risk Intelligence, as well as E-Discovery services.  The Verizon RISK team brings together experienced information security operators from different backgrounds including law enforcement, military and computer systems engineering.  Verizon investigators are located in a variety of locations throughout the Americas, Europe/Middle East/Africa (EMEA) and Asia-Pacific (APAC) regions of the world.

CREST Qualified Consultants:
Practitioner Intrusion Analysts:  No
Registered Intrusion Analysts:  No
Certified Network Intrusion Analysts:  No
Certified Host Intrusion Analysts:  No
Certified Malware Reverse Engineers:  No