Contact Us




Recognize threats early by
monitoring your NetFlow data. 

Discover NetFlow attacks before they do serious damage. 

A single exploit may take seconds for an experienced hacker, but large-scale cyber breaches often take them time. They have to sift through your systems for valuable data, then find a way to extract it. Diagnose these activities early, and you have a chance against attackers.  

With Verizon Network Threat Monitoring, you can identify an early-stage attack before it becomes a serious breach. As one of the world’s largest internet service providers, we combine the visibility of our own IP network traffic with information from many security disciplines. Based on these network monitoring tools and NetFlow data samples, we can see traffic going to suspicious locations in and around your network. 

What is Network Threat Monitoring?

Network Threat Monitoring leverages our ownership of one of the world’s largest IP networks. By sampling NetFlow traffic and usage, and comparing it to our extensive threat library, we can decipher suspicious patterns and potential security gaps that may be early indicators of a compromise, network problem or misconfiguration. 

How does Network Threat Monitoring work?

Network Threat Monitoring is a network monitoring tool that doesn't require additional hardware or software. You provide IP addresses, and we look at a NetFlow data sample to identify traffic running over our routers to those addresses. We automatically compare that data with watch lists to identify suspicious activity.

Features & benefits

With Network Threat Monitoring, you can better analyze your network’s activity and compare that data with Verizon’s extensive threat library to spot attacks before they become a major problem. Other features and benefits include: 

  • Sampling. Review troves of data packets using NetFlow monitoring tools
  • Dashboard. Flag issues early with a detailed, online overview of incidents
  • Early alerts. Get the data you need to stop a threat
  • Support. Solve urgent issues with the help of Verizon security analysts


years of security experience


security events processed yearly (on average)


times as a Gartner Magic Quadrant Leader*


Security Operations Centers worldwide

Managed & professional services

The Verizon Threat Research Advisory Center draws from Verizon’s global public IP backbone to fuel applied intelligence solutions that can strengthen cyberattack detection and recovery. Customers harness the power of this intelligence platform to recognize and react to today’s more sophisticated cyber threats. Our world-class services and security professionals, including one of the largest teams of PCI Qualified Security Assessors anywhere, are always ready to help you meet your security challenges.

Your experts in cybersecurity.

Protect. Detect. Investigate. Respond.

Gartner has recognized us as a Leader in its Magic Quadrant for Managed Security Services, Worldwide for seven times.*

*Gartner, Magic Quadrant for Managed Security Services, Worldwide, Toby Bussa, Kelly M. Kavanagh, Sid Deshpande, Pete Shoard, 2 May 2019.

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon representative for service availability. Contact us.