Verizon Offers Connected Security at the Enterprise

In this era of M2M and connected devices, many would argue the importance of cybersecurity has never been greater. Whether the data in question is personal or professional, in the wrong hands it can have a devastating impact. Thus, more and more organizations are coming to market with M2M security solutions to protect our connected devices and the information they hold.

One such company is Verizon,, which has launched MCS (Managed Certificate Services), a cloud-based platform designed to authenticate connected objects and machines at the enterprise level. MCS verifies the “identities” of the physical assets in question, and then secures the data transmitted between them.

By making MCS a cloud-based service, Verizon aims to provide strong security while eliminating the need for expensive hardware and complex implementations. This will allow clients to remain focused on their core business without the complexity and cost of managing and monitoring a physical infrastructure.

“It’s really a question of scale,” says Johan Sys, managing principal of identity access management services at Verizon. “With MCS, in the same configuration you can very easily scale something up … and then scale it down on the same platform.”

With MCS, Verizon hopes to provide customers with large degree of flexibility. For instance, the solution uses a pay-as-you-go model, allowing companies to only pay for resources as they need them. Sys cites certain medical devices as an example. Such devices might only be used for a few months during a medical trial, but would still require payment for up to two years worth of usage. With the MCS model, when the devices stop being used, payment is no longer required.

MCS can also easily integrate with existing client networks and applications via flexible APIs (application programming interfaces). Administrators are also given access to a Web-based portal for convenience.

Sys says one area of growth Verizon has seen in the security realm is the convergence of physical and logical identities for communities. For instance, a physician might be able to use connected technology to securely gain access to a variety of resources at their disposal.

“They can use that same card to physically access the hospital, but also to login over NFC to access patient records,” Sys says.

MCS aims to be applicable in a wide variety of instances, such as authentication and verification for online shopping cart capabilities and government service deliveries. The program may also prove useful for helping enterprises address regulatory security and authentication guidelines during production.

“With the continued explosion of the Internet of Things and the expansion of connected objects and machines, businesses require a simple, scalable and effective way to manage identity and data integrity,” says Eddie Schwartz, vice president of global security solutions for Verizon Enterprise Solutions. “Verizon’s Managed Certificate Services build upon our solid digital certificate technology and managed security services expertise with a cloud-based platform to deliver an ideal offering for the age of connected solutions.”

In many ways, modern day enterprises must become computer companies to keep up with the rapid advances in M2M and connected technology. Through solutions like MCS, companies can ensure their data assets remain secure, whether they’ve already made this transition, or are just dipping their toe into the proverbial M2M pool.

Want to tweet about this article? Use the hashtags #M2M, #security.

Related Articles
Connected World Issue
June/July 2014
magazine | newsletter
<< Take a look inside!

Advertising | Contact Us | Terms and Conditions | About Us | Privacy Policy | Press Room | Reprints | Subscriber Services
Copyright © 2014 Specialty Publishing Co. | Questions? Please contact the Webmaster at