{"id":1594,"date":"2010-05-21T00:00:00","date_gmt":"2010-05-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/21\/verizon-to-offer-network-security-via-the-cloud\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"verizon-to-offer-network-security-via-the-cloud","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/21\/verizon-to-offer-network-security-via-the-cloud\/","title":{"rendered":"Verizon to offer network security via the cloud"},"content":{"rendered":"<p>The service will enable organizations to add security services with &#8220;just the click of a mouse&#8221; through a simple and robust platform, the firm claimed, while removing the need to have any equipment installed on-site.  David Howorth, regional vice president for global services at Verizon Business, explained that the move could help enterprises of all sizes ensure that they have the necessary foundations to protect against a range of threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The company will offer cloud-based support for network firewalls and intrusion detection and prevention systems in the fourth quarter of this year, which will be available separately and can be used on Verizon and other providers&#8217; network connections.<\/p>\n<p>Howorth explained that this service would be split between a standard offering aimed at SMBs, and a premium services for mid-to-large enterprises, to give them complete control over security on their networks.<\/p>\n<p>http:\/\/www.v3.co.uk\/v3\/news\/2263506\/verizon-business-offer-network<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1594","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1594"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1594\/revisions"}],"predecessor-version":[{"id":4081,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1594\/revisions\/4081"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}