Zayo Security specializes in providing security solutions that cover all aspects of security, including data security, product security, physical security, enterprise risk management, and cybersecurity. Our approach to security is based on a comprehensive risk management framework, which allows us to identify and mitigate potential threats before they become a problem.
Application & Product Security
Application & Product Security ensures the security of the Organization’s products and applications through services such as access management, security assessments, vulnerability management, security architecture design, and threat modeling.
Audit & Compliance
The Organization has codes of conduct, internal controls, and guidelines that define how business is carried out. While a lot of these codes and guidelines are developed internally, other compulsory standards exist with which Zayo must comply. Audit & Compliance, in conjunction with internal and external audit teams, performs evaluations of whether the Organization is following these set standards.
Cloud Security
The Cloud Security program is designed to implement sound security measures, leveraging best practices and cutting-edge technologies across critical domains such as Cloud Security Posture Management (CSPM), Cloud Identity and Access Management (Cloud IAM), and other relevant areas. This program enables Zayo to maintain a strong security posture, manage risks effectively, and ensure compliance with industry standards and regulations.
Customer Trust
This initiative is designed to prioritize and enhance the trust and confidence of Zayo customers. The program reflects our commitment to maintaining the highest standards of integrity, security, and reliability in all operational aspects, including the implementation of strong data security and privacy measures. This program emphasizes transparency, communication, and a dedication to keeping customers well-informed about the measures taken to secure their data and maintain the resilience of their network infrastructures.
Data Security
Zayo’s Data Security program is designed to safeguard the Organization’s data by ensuring its confidentiality, integrity, and availability in alignment with the company’s risk strategy. The program includes sound security architecture, incident detection, response, and recovery processes to protect sensitive information from cyber threats. Data classification is a critical element, enabling the Organization to categorize data based on its sensitivity, ensuring that appropriate security measures are applied to protect it. The increasing frequency and severity of cyber threats make it essential for businesses to implement strong data protection and security measures to safeguard their sensitive data and assets. Data Security works to ensure that Zayo’s data is protected from unauthorized access, use, or disclosure and that we remain compliant with applicable regulations and industry standards.
Enterprise Resilience
Enterprise Resilience provides the ability to identify, react, and recover from short term disruptive challenges and most importantly, adapt and evolve in response to more significant changes. This program encompasses Business Continuity, Disaster Recovery, and Crisis Management which provide the Organization with a comprehensive plan to effectively recover from disasters and disruptions and proactively address and navigate unexpected challenges.
Governance
The Governance program provides a structured framework and information lifecycle that aligns with the Zayo’s strategic goals and objectives. This program covers key aspects of security governance, including policies, standards, and processes and procedures for managing risks, ensuring compliance with industry standards and regulations, and driving accountability across the Organization.
Government Security
The Government Security program is designed to ensure that the company’s infrastructure, services, and operations meet the stringent requirements of Zayo’s government customers. This program focuses on safeguarding sensitive data and critical systems through comprehensive measures using cybersecurity protocols including threat detection, incident response, and continuous monitoring to protect against evolving cyber threats and ensure the confidentiality, integrity, and availability of government data.
Identity & Access Management
This program is designed to fortify Zayo’s security posture by integrating advanced Identity & Access Management (IAM) capabilities, including Single Sign-On (SSO), Privileged Access Management (PAM), and Identity Governance and Administration (IGA). IAM ensures streamlined access control processes, secure and efficient access for users, effective management of privileged accounts, and compliance with regulatory standards.
Knowledge Management
Knowledge Management aims to help to create, organize, share, use, and manage the information and knowledge within the Security area of the Organization and enhance performance, innovation, and competitiveness by leveraging our intellectual assets. Knowledge management is the process of capturing, organizing, storing, and disseminating collective knowledge to achieve its goals effectively.
Network Access Controls
The Network Access Controls program, starting with the deployment of Zscaler’s suite of security solutions, focuses on fortifying our network’s defenses, improving visibility into internet and cloud activities, and ensuring a seamless and secure user experience.
Physical Security
Physical Security employs the measures and systems designed to safeguard personnel, equipment, information, and resources from unauthorized physical access, damage, or harm. Physical Security involves securing physical perimeters and portable devices, as well as implementing access and environmental controls and surveillance and monitoring systems.
Program Management
Our mission as Security Program Managers is to lead the design, implementation, and oversight of comprehensive security initiatives. We are dedicated to ensuring the highest standards of Cybersecurity, Governance Risk & Compliance (GRC), Physical Security, and Government Security (Gov Sec). Through collaboration, innovation, and meticulous project management, we aim to safeguard Zayo’s assets and integrity.
Risk Management
As part of our commitment to risk management, this program aligns with the Three Lines of Defense model. The three lines consist of operational units (1st Line), risk management and compliance functions (2nd Line), and internal audit (3rd Line). By structuring our program in this way, we ensure a systematic and collaborative approach to governance and risk management, promoting accountability, transparency, and resilience across the organization.
Security Analytics & Automation
This program works to empower our engineering team to develop sophisticated alerting mechanisms, comprehensive dashboards, and efficient data aggregation processes. By harnessing the capabilities of security analytics tooling, the program aims to create a unified platform for security analytics that enhances visibility across our digital landscape and automate response actions to threats and anomalies. This program is pivotal in building a resilient security infrastructure that can adapt to the evolving threats.
Security Awareness Training
Security Awareness Training is critical to strengthening Zayo’s security posture by ensuring that employees are aware of potential security threats and have the knowledge and skills to identify and respond to them. This program provides comprehensive training that covers various aspects of security, including cybersecurity, physical security, and compliance.
Security Operations
Our Security Operations Center (SOC) is dedicated to strengthening the foundation of our SOC and Incident Response efforts through rigorous process improvement and strategic management of technological integrations. By focusing on the operational workflows, this program works to streamline incident detection, analysis, response, and recovery processes. It prioritizes the enhancement of collaboration between the SOC and security engineering teams, ensuring seamless communication and efficient utilization of security tools and intelligence.
Systems & Tools
Security systems and tools management involves the deployment, configuration, monitoring, and maintenance of security solutions to protect Zayo’s assets from threats. Security employs a variety of tools and practices designed to safeguard information, infrastructure, and users from unauthorized access, damage, or theft.
Third Party Risk Management
Third Party Risk Management (TPRM) works within the overall Supply Chain Management program to help the Organization identify, assess, and mitigate the security risks associated with its third party Suppliers.
Vulnerability Management
Vulnerability Management aims to identify, assess, prioritize, and remediate vulnerabilities across Zayo’s IT infrastructure and applications. By leveraging state-of-the-art scanning tools, threat intelligence, and best practices in cybersecurity, we are able to systematically address potential security weaknesses before they can be exploited by adversaries.