Cyber Security

Improve Your Security Operations and Internet Infrastructure with Verisign's Cyber Security Threat Intelligence

Verisign’s iDefense and suite of managed services help keep your network up, reliable and secure through actionable cyber intelligence, proactive DDoS mitigation and enhanced DNS security.

h4_1

p_2

p_3

h4_2

p_4

p_5

THREAT METER

LEVEL 3 - ELEVATED

Qualified threats require customers to address an imminent threat. Actionable intelligence exists for a threat to customers that is either likely or could have high impact. Customers should inform operational groups of the threat and dedicate resources accordingly.

LEVEL 1 - LOW

LEVEL 1 - LOW

Cyber security baseline. While some threat to customers exists, standard operating procedures, threat monitoring and mitigation are effective. This level of global risk is not elevated, reflecting normal daily operating conditions.

LEVEL 2 - GUARDED

LEVEL 2 - GUARDED

Intelligence exists that slightly increases the threat to customers. Although unconfirmed, emerging threats reflect a need for improved awareness without specific action.

LEVEL 3 - ELEVATED

LEVEL 3 - ELEVATED

Qualified threats require customers to address an imminent threat. Actionable intelligence exists for a threat to customers that is either likely or could have high impact. Customers should inform operational groups of the threat and dedicate resources accordingly.

LEVEL 4 - HIGH

LEVEL 4 - HIGH

A substantiated threat to customers, such as active exploitation, warrants immediate and focused action. The likelihood of damage is high, with possible significant financial impact.

LEVEL 5 - SEVERE

LEVEL 5 - SEVERE

A major attack is underway that directly impacts customers and other global institutions. The impact of such an attack is significant, warranting an immediate response. Organizations should initiate emergency response teams to respond to this level of risk.