Skip to Main Content
  • Support 
  • Solutions
  • Products
  • Resources
  • Why Verizon
  • Overview
  • Adapt and transform your business
  •    - Future of Work
  • Protect your enterprise from threats
  • Capitalize on your valuable data
  • Personalize your customer experience
  •    -Communicate with purpose
  •  
  • Private 5G Networks for Enterprise
  • Keys to success digital transformation
  • Tools for your digital journey
  • Industries
  • Customer Success Stories
  • Overview
  • Network
  • Mobility
  • Security
  • Business Communications
  • Customer Experience Services
  • Internet of Things
  • Products A-Z
  • Resources
  • Webinars
Language
  • Great Britain (eng)
  • Australia (eng)
  • Deutschland (de)
  • France (fr)
  • Netherlands (eng)
  • Singapore (eng)
  • USA (eng)
  • 日本(日本語)
  • Popular Search
  • CPE
  • Gartner
  • SD WAN
  • VNS
  • GDPR
  • Recent Searches
  • Support
Sign-In
  • My Account
  • Register
  • Support
  • My Account
  • Register
  • Home
  • Resources
  • Articles
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Home
    • Resources
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
    • Home
    • Resources
      • Products
      • Search
      • Solutions
      • Customer Support Netherlands
      • Why Verizon
      • Business
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
  • Insider Threat: One pattern, four scenarios, thirteen countermeasures
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
    • Home
    • Resources
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
    • Home
    • Resources
      • Products
      • Search
      • Solutions
      • Customer Support Netherlands
      • Why Verizon
      • Business
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
  • Home
  • Resources
    • Resources
      • Products
      • Search
      • Solutions
      • Customer Support Netherlands
      • Why Verizon
      • Business
    • Home
    • Resources
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
    • Home
    • Resources
      • Products
      • Search
      • Solutions
      • Customer Support Netherlands
      • Why Verizon
      • Business
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Uncertainty
      • Navigating the CARES Act process
      • How Tools That Leverage Blockchain Can Address Escalating Security Concerns
      • Contact Center Workforce Management
      • IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
      • What is UCaaS and is it right for my organization?
      • Zero trust security framework: benefits and downsides
      • 5G network slicing: Do you have the team you need?
      • How to Run a Public Meeting Online
      • Why You Need Managed Detection And Response Services
      • The golden age of voice communications
      • Worried about fraudulent calls? Build a strong voice security strategy
      • What are successful CX leaders doing differently?
      • Three ways technology can enhance your contact center performance
      • Five CIO Strategies to Create a CX Roadmap
      • Three reasons why the role of the CMO is now a technology job
      • Retail Apocalypse? We don’t think so.
      • Five technologies helping brand and CPG manufacturers survive disruption
      • Digital transformation is everywhere. But did you forget to transform your security program?
      • What is an ounce of cybersecurity prevention worth?
      • Three Energy and Utility Trends to Watch in 2019
      • Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
      • How 5G Impacts Your CX Strategy
      • IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
      • Why your digital transformation strategy requires a risk management plan
      • Overcoming the challenges to digital transformation
      • Three reasons why SD WAN is essential for cloud migration
      • SD WAN vs. MPLS: Understanding the Difference
      • Four ways AI can help build an omnichannel customer experience
      • Though behind the scenes, cybersecurity is a star in the media and entertainment industries
      • Why connectivity is key to digital transformation
      • How Digital Transformation Impacts CX
      • How technology is driving the transformation of content
      • Security in the public cloud: Get peace of mind
      • The Challenges and Benefits of Securing Hybrid Clouds
      • Private cloud security: What’s the difference?
      • When self-service is done right
      • Impact of Communication in Cybersecurity
      • Smart City 3.0
      • FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
      • Why rethinking your software culture can be a competitive advantage
      • Six reasons you can’t afford to go cheap on network
      • A thought experiment about shared credentials
      • Acceptable use policies: Keeping your workplace secure
      • Advanced threat detection – Adapting to change
      • Anatomy of well-managed malware incident
      • Briefing the board: Directing security evolvement
      • Can you explain IoT without saying IoT?
      • CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
      • Creating the city of the future today
      • CX Day 2017: Celebrating customer experience
      • Data breaches: how long does the damage last?
      • Darknet: The shady underbelly of the iceberg
      • Data Breach Digest Update Data ransomware the Catch 22
      • Delivering smart, sustainable energy solutions
      • Data breaches in industrial environments: Safety comes first
      • Error detecting data visualizations
      • Help Me, Help You. Sincerely, Your Customer.
      • Make sure the bad guys don’t get what they’re hoping for this Christmas
      • Man vs machine, which delivers the best customer experience?
      • My experience with the Kano Model
      • My superb Go-To-Gemba customer experience
      • Powering the digital economy with modern utilities
      • Preparing for GDPR? PCI DSS could help
      • Smart cities are the wave of the future
      • Smart traffic helps improve quality of life
      • Social engineering: Strengthening the weakest link
      • Where SMBs have the upper hand
      • What to consider when planning your future digital network
      • This framework ain't big enough for the both of us
      • What does IoT really mean for the enterprise
      • Verizons Data Breach Digest - Perspective is reality
      • Retail’s Digital Roadmap
      • Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
      • Mobile Customer Experience: Savvy shoppers Ready associates
      • Incident Management Focus: Two Approaches to Incident Response Plans
      • I Admit It: I’m Biased
      • How to retain viewers with your online video services
      • Virtual Network Security Services
      • Announcing VERIS Community
      • Are we reaching the limits of technology?
      • Virtual Network Services- WAN Optimization
      • Find the Right Construction Management Tools
      • Usage-Based Car Insurance Solutions
      • Enable Banking Virtually Anywhere with Wireless ATMS
      • Verizon Intelligent Video and Smart Surveillance
      • Ethernet Services & Ethernet Architecture Solutions
      • VGo Mobile Telepresence Robot Case Study
      • Fleet Maintenance and Performance Case Study
      • Auto Dealer Solutions for Courtesy Cars Case Study
      • Car Rental Solutions Streamline Rental Operations to Create New Business Models
      • Smart Fleet Management Basics
      • ICS Security Services
      • Adaptive CX Means Liquid Personalization
      • Verizon Wireless Private Network Connections
      • Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
      • Wireless Backup Solutions
      • Are you living in a glass house?
      • Utilities and Energy Management Technologies
      • When it comes to CX, don’t get hung up on the jargon
      • Tough Love and the Customer Experience Culture
      • “Retail is Dead” — and Other Rumors with no Validity
      • Are your vendors the weak link in your cybersecurity?
      • Banks—It’s Time To Start Talking To Each Other, Say UK Police
      • Cloud storming: You need more than an umbrella to stay secure
      • M2M Transportation Solutions Brief
      • Network Security Solutions
      • Fact Sheet: Verizon Network Analytics
      • Customer Experience and the Security Paradox
      • Customer Experience Mystification
      • Cybersecurity In 2017: It’s Not All Doom And Gloom
      • Digital Convergence: The Perfect Storm
      • Does connected working kill innovation?
      • Don’t make a fish climb a tree: customer preferences matter.
      • EESI as Pie: Essential Elements of a Successful Intrusion
      • Federal Government Modernization: Priorities for the Federal IT Executive
      • Five Ways Tech Can Supercharge Your CX Team
      • Get a new perspective on cybersecurity
      • Have Your Metrics Become Your Master?
      • How to move from product first to customer first
      • IoT: from theory to practice
      • Is automation your golden ticket to great CX?
      • To Sell Or To Serve?
      • Just because you can, doesn’t mean you should
      • Keep the "personal" in personalized customer experience
      • Make the right cybersecurity investments
      • The four pillars of digital transformation
      • Stop feeding your customers air sandwiches
      • Dedicated IP Internet Services
      • Retail Industry Solutions
      • Connected working: think outside the box
      • Travel and Hospitality Industry Solutions
      • Virtual Network Services
      • M2M Solutions for Government Brief
      • State of the Market: Internet of Things 2017
      • Grid Intelligence Water Case Study
      • Private IP: Get a network that grows with your business.
      • United Security Services
      • Business Connections- Business Communication Solutions
      • Verizon Cypher Encryption Software
      • Achieve Operational Transformation with Dynamic IT Services
      • Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
      • Workplace Mobility Strategies
      • Espionage Health Check
      • E-Discovery Support
      • Push to Talk Plus Phones & Technology
      • Security Incident Response Analytics
      • Visual Interactive Calling
      • Fleet management service helps improve performance and cut costs
      • A Foundation for Growth with Data Center Consolidation and More
      • Assessing Intrusion Detection
      • Digital Advisory Services - Software Defined Networking Strategic Assessment
      • Network Threat Monitoring
      • Virtual Network Services-Security
      • Drive Business with Fleet Telematics Solutions
      • Business Smartphones Jump-Start Productivity
      • Mobile Device Management
      • Fleet Management Solutions Factsheet
      • A better way to get the latest CPE technology
      • Rapid Response Services
      • Verizon Rapid Delivery Platform
      • Advanced Network Experts Retainer
      • Cyber Risk Management Program
      • Internet Dedicated Services
      • Express Connect WAN Services
      • MDM Software Management with OTA Distribution
      • Managed Security Services
      • Computer Emergency Response Team
      • Network discovery service: Discover your network’s potential
      • IP Contact Center
      • Network Management Solutions Brief
      • Mobile Technology for Retailers
      • Threat Intel and Response Services
      • Business VoIP & Business Phone System Solutions
      • Security Health Checks
      • Law Enforcement and Public Safety Solutions Brief
      • M2M Finance Solutions Brief
      • Choosing a Wireless Network Provider
      • 4G LTE Enables Business
      • Wireless ATMs & Kiosks Factsheet
      • Simplify Your Grid Solution
      • Take Control of Infrastructure Security with Intelligent Video Surveillance
      • Smart Lighting Technology Brief
      • Grow your business with leading-edge proof of concept testing
      • Managed Security Services – Analytics
      • ThingSpace IoT Management
      • SD WAN Services
      • DDoS Protection Service: DDoS Shield
      • Smart Communities Solutions
      • Enterprise Mobility Management Solution from MobileIron
      • Custom Apps and eForms for Mobile Devices
      • Making the Case for MPLS VPNs in the Modern Enterprise
      • Diary of a cybercriminal
      • HP Elite x2 Business PC on the Verizon 4G LTE Network
      • Private Network Traffic Management
      • Retail M2M solutions
      • SD WAN Service with Application Aware Routing
      • Virtual Network Services Solutions Brief
      • The Verizon Fleet Management System
      • Verizon Condition-Based Maintenance Solutions
      • Private Network Traffic and Bandwidth Management
      • Verizon ThingsSpace IoT Development Platform
      • The Verizon Network-Backed Asset Tracking System
      • The resonant theme of RSA 2016
      • Optimize Fleet Operations With Verizon Autoshare
      • Unified Communications and Collaboration as a Service Factsheet
      • Networkfleet Fleet Management Case Study
      • Leading the way for vision zero
      • How SDN can help your business transform and grow
      • Helping your workers get the most out of your new cloud based communications solution
      • Implementing automation in your contact center read this first
      • How to keep your business communications secure
      • Five reasons why your business needs software-defined networking
      • The Delicate Nature of Trust
      • Will SDN replace MPLS? Not so fast.
      • The future of connected vehicles hinges on today’s investments.
      • Disclosing cyber risk? New SEC guidance requires it.
      • Revolutionize your communications: Migrating to a cloud-based platform
      • The role human touch plays in the digital customer experience.
      • The importance of public-private partnerships to make smart cities a reality
      • Staying Ahead of the Curve
      • Why network visibility is important for your business
      • Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
      • How to break down the barriers to SDN adoption
      • Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
      • The four key steps to improving customer experience with artificial intelligence
      • Staying safe online: Observing good digital hygiene
      • 2017 Data Breach Digest: Half Year Anniversary
      • Better living through parking
      • Six ways to strengthen network security and maintain a competitive edge
      • Your Endpoint Security Strategy Needs a Hug
      • 5G and autonomous vehicles: turning fiction into reality
      • Making cities safer for everyone
      • Be a better bot boss: 3 tips for CX chatbot success
      • Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
      • For insurers, failure is learning—and you need to learn fast.
      • Network Orchestration Enhances Digital Transformation
      • It’s real: Digital transformation is already delivering results
      • The Humanability of Smart Cities
      • How DevOps can turn IT into the leaders of your business
      • Knowledge is power: How an intelligent knowledge base powers CX
      • Light the way to futureproof your smart city investment
      • Why DevOps is critical for improving the customer experience
      • Operation "Surprise and Delight"
      • Get the SD WAN facts before you buy
      • Are you "over-sharing" your customer feedback data?
      • Why risk scoring is critical for your business (and your career)
      • Changing consumer demands are forcing entire business models to be rethought
      • Cyber security posture FAQ: know your cyber risk
      • Deception Technology: A strategic imperative for detection and response
      • Voice Security Strategy Best Practices
      • CX Improvement: The need to put consumer data protection and privacy first
      • The Digital Transformation of the NFL Stadium and the 5G Fan Experience
      • How to Improve Customer Experience
      • Customer Personalization: The time is now for customized experiences
      • Why Cyber Risk Visibility is the Key to Security
      • 2019 LinkedIn Phishing Threat
      • Minimize Your Attack Surface
      • How Velocity Can Impact Cyber Security Strategy
      • The top 10 criteria for selecting an SD WAN vendor
      • How to implement SD WAN architecture the right way
      • The Power of SD WAN and 5G
      • Creating an Effective Cyber Security Incident Response Plan
      • Embedded Universal Integrated Circuit Card
      • How digital transformation is impacting the utilities sector
      • How to promote teamwork among remote employees
      • Three keys to managing remote employees
      • Business Impact of Coronavirus: Ready in the Face of Uncertainty
      • Tips to promote connectivity in digital workplace
      • Accelerate Your Digital Workplace with 5G Mobility
      • How to Prevent Phishing & Malware Attacks
      • Tips and strategies to improve virtual meeting performance
      • PCI Compliance: What to Know About Digital Payment Security
      • Getting Calls When Working Remotely
      • Keep your business open when your location is closed
      • How to improve the customer service experience in crisis situations
      • Methods & Types of Business Communication Services that Businesses Rely On
      • How to Work Remotely Using Collaboration Tools
      • How Mobile Hotspots Can Help When Working Remotely
      • Teamwork and Collaboration Best Practices
      • Remote Work Security Policy & Best Practices
      • Streamline CX with Better Tech Integration
      • Creating a Personalized Customer Experience
      • Does your school have these five critical security features?
      • Telehealth Relief for COVID-19
      • Transform Your Network with Edge Computing
      • Five ways the cloud can help improve your school's security
      • How to enhance distance learning and remote employee training sessions
      • Nine scary security stats educators everywhere should know
      • What is Zero Trust Architecture
      • Remote Work Tips for the Public Sector
      • Why 56 % of large business are turning to SDN for cybersecurity
      • Five top mobile security threats
      • Strategic Outsourcing
      • Tips for Small Businesses in a Tough Economy
      • The Future of Telehealth Starts Today
      • Considering Remote IT Support Solutions
      • Four tips to strengthen your digital marketing strategy
      • User Experience Checklist
      • BYOD Security for Remote Employees
      • Building a 30/60/90 Day Business Plan
      • Create an Acceptable Use Policy
      • Strategize with Small Business Cyber Security Plan
      • Small Business Cyber Security and Data Breaches
      • Sample Article Title
      • Five productivity tips for your newly remote team
      • Corporate Network Enhancements
      • In cybersecurity, integrity matters.
      • three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
      • Creating the New Normal for Your Small Business
      • Connectivity best practices for distance learning
      • Scalable Network Solutions During Critical Events
      • Ways to Find New Customers Now
      • How to Protect Data Security
      • Small Business Innovation for Big Impact
      • Finding Alternative Small Business Funding
      • Tips to Transition to Working from Home
      • Test
      • Five best practices for choosing the right security provider
      • Three next-gen technologies that will define cybersecurity in the next decade
      • IoT security: Why you need to encrypt your data
      • Analyzing the COVID-19 data breach landscape
      • Design considerations for a 5G network architecture
      • Five security blind spots you might not realize you have
      • How to drive business agility with remote collaboration tools
      • Mapping the 5G impact in the retail industry
      • 5G and IoT: The future of efficiency
      • The 5G evolution: Exploring the journey from 2G to 5G
      • Funding Safe and Secure Elections During the COVID-19 Pandemic
      • Low-latency 5G and the opportunities it can create
      • Three 5G application scenarios and how they could change your workforce
      • Optimizing business communications networks by combining SD WANs and MPLS
      • A guide to unified communications solutions: beyond VoIP and video
      • Improving customer experience with a contact center provider
      • Strategies to Get 5G Ready
      • The industries that will benefit from 5G
      • Optimize fleet operations through smarter supply chain disaster management
      • Six design principles to help mitigate latency
      • Understanding the five C’s of Latency
      • Where 5G and MEC work together
      • Securing your 5G edge computing architecture for business success
      • Unpacking the “5G” in Verizon’s 5G edge
      • Cloud computing security: Is it safer than on-premises?
      • Professional Services vs. Managed Services
      • How AI improves the customer experience
      • The human element in cyber security: When user error is the problem
      • Security threats in e-commerce: Protecting data while maintaining customer experience
      • How a power grid attack threatens the energy industry
      • Mobile device security in the workplace: five policies you must have
      • Cloud contact center technology: empowering your employees
      • How IIoT in manufacturing is made possible with MEC and 5G
      • How to cultivate customer relationships through social engagement
      • Supply chain communication strategies for successful management
      • What is edge computing and where is it being used?
      • 5G and edge computing: configuring the edge topology
      • Collaboration tools: focus on interoperability to avoid tool fatigue
      • How intelligent routing can improve the contact center experience
      • Securing the smart city of the future
      • Building a successful digital transformation strategy
      • Video conferencing network requirements: delivering the best user experience
      • Solving common remote work endpoint security challenges
      • Real-time crime centers and law enforcement technology
      • 5G and IoT edge computing: driving future business value
      • Smart cities and cyber security: protecting citizens from malicious attacks
      • Mapping the digital customer experience for optimal growth
      • 5G and AI: creating a connected global business
      • The power of AI: artificial intelligence examples for a modern world
      • Edge computing vs. cloud computing: What are the benefits in higher education?
      • A guide to IT/OT convergence
      • IoT in retail can help improve the customer experience
      • The benefits of contact and call center speech analytics software
      • New collaboration tools: rolling out an enterprise application
      • How cloud contact center solutions help workforce productivity
      • Diversify the contact center experience to better serve your customers
      • Benefits of unified communications services and platforms
      • IoT risk management in the mining industry
      • How virtual hold technology can boost customer satisfaction
      • How cloud-based call center solutions can boost customer satisfaction
      • Effective communication strategies in business for 2021 and beyond
      • Vehicle tracking solutions that can help protect drivers and customers
      • IoT and healthcare: near real-time health monitoring on hospital floors
      • How IoT and big data are transforming the construction industry
      • Nation-state cyber attacks aren't like your average cyber adversary
      • AI hacking: How IT security leaders can mitigate emerging cyber risks
      • What is a zero-day attack? How to prepare and respond
      • Social engineering attacks to watch out for
      • Four enterprise communications trends for 2021 and beyond
      • Edge computing examples: what is your edge?
      • 5G and telemedicine: Hospitals should take an individualized approach
      • Why deepfake video is a real threat to businesses
      • Fostering smart construction site solutions with a temporary network
      • Learning from cyber espionage attacks like Operation Soft Cell
      • User behavior analytics and the technology you need to realize its value
      • The next wave of telehealth services is coming, and 5G will power it
      • Secure fleet vehicle management is increasingly critical
      • Construction cyber security: protecting the worksite against threats
      • Professional and Managed Services Vendor: 4 Factors to Consider
      • Big data security and privacy concerns in healthcare
      • Is a cloud-based phone system right for your business?
      • AI-powered customer engagement: Is it worth the investment?
      • How pairing UCaaS and CCaaS transforms the customer experience
      • The future of education technology
      • Improving patient experience through on-premises telemedicine
      • Innovations in healthcare technology see boost from pandemic
      • Methods of communication on a construction site for a staggered team
      • Lessons from the RobbinHood ransomware attack on Baltimore
      • 2021 Resolutions for CISO & Security Leaders
      • Condition-based monitoring is crucial for preventative maintenance
      • A customer engagement strategy for insurance includes virtual call centers
      • Will hosted VoIP solve your mobile communications woes?
      • Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
      • How to budget for cyber security costs—and why it's crucial
      • Session hijacking attacks: understanding and preventing them
      • Can the cloud be hacked?
      • How a local government IT strategy can benefit from managed services
      • Cloud contact center solutions empower exceptional customer experiences
      • What is 5G Network Architecture?
      • How Businesses Should Prepare for 5G
      • How will 5G Affect Business?
      • The Future of 5G: 5G-Powered Technologies
      • What is 5G Beamforming?
      • The digital transformation challenges confronting retailers in 2020
      • Extending the lifespan of IoT sensors in industrial devices
      • Finding the future of IoT in municipal government
      • Enabling manufacturing automation and factory cost controls with IIoT
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • How to build a smart city from the ground up
      • From intelligent lighting to smart metering: how energy and utilities are transforming
      • Enabling manufacturing automation and factory cost controls with IIoT
      • Finding the future of IoT in municipal government
      • How to Build a Smart City from the Ground Up
      • How to solve public sector technology and government IT challenges
      • Extending the lifespan of IoT sensors in industrial devices
      • The future of healthcare technology—faster access and better information through 5G
      • Virtual contact centers for small businesses: how cloud-based options help
      • 5G and connected cars: the next-generation automotive industry
      • Learning from a backdoor attack: the takeaways of Operation ShadowHammer
      • Cyber security threats to schools and how to protect against them
      • Security vulnerability scanning on an ever-expanding attack surface
      • Is your organization's incident response plan up to par?
      • How camera hacking threatens remote workers—and their organizations
      • How data encryption protects patients
      • Exceed customer expectations with these five technologies
      • How cloud security best practices keep hospitals healthy
      • Social media phishing is on the rise
      • Considerations for a new small business network
      • A work-from-home security policy is essential for businesses
      • Financial services cyber security and edge computing
      • How user experience testing can detect customer experience friction in e-commerce
      • How the media and entertainment industry is using mobile edge computing
      • Disaster recovery after a hotel data breach
      • Is AI the future of personalized healthcare?
      • The benefits of network slicing: flexibility and more
      • How 5G will impact the future of farming
      • Cyber security posture FAQ: know your cyber risk
      • How public safety systems support natural disaster recovery
      • Preparing for disaster with storage virtualization
      • Is augmented reality the future of CX?
      • 5G vs. Wi-Fi 6: how do they compare?
      • Interactive voice response (IVR) systems: three tests to pass
      • Cyber security for smart energy and renewables
      • Digital signage can help transform public transportation
      • 10 Considerations for an ideal edge computing model
  • Articles
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Home
    • Resources
    • Articles
      • Recognition
      • Vidder
      • Events
      • Learn the Basics
      • Stay Informed
      • Notifications
      • Solutions Briefs
      • Latest Business News Articles
      • Coronavirus (COVID-19) Response for Businesses
      • Whitepapers
      • Webinars
    • Insider Threat: One pattern, four scenarios, thirteen countermeasures
      • Why you need MPLS and SD WAN
      • Intelligent Traffic Management and Intelligent Transportation System
      • Verizon Network Analytics
      • Intelligent Traffic Solutions Brief
      • Cybersecurity Benchmarking: Do you out-secure the competition?
      • Cybersecurity and 5G
      • Small Business Webinar: Leading Through Unc