About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Verizon Business supercharges IT security offering with Trusted Connection cybersecurity launch

What you need to know:

  • Trusted Connection is a Zero Trust Network Access (ZTNA) service for businesses that allows them to secure their devices, network, and cloud-hosted applications. It constantly verifies who’s accessing what and from where.
  • It’s powerful technology that’s easy to use and ideal for midsize businesses. Trusted Connection combines networking and security services into an integrated secure access offering from a single provider in Verizon Business, with a simple interface that nearly any sized IT team can manage.
  • It enables anywhere, anytime secure access regardless of the location of the authorized user (office, remote, mobile, multisite) or the location of the application or digital resource they are accessing (web/cloud, SaaS, or private application), all through a simple centralized portal and with a single console to set policies once and see them enforced consistently.

NEW YORK, March 12, 2025 (GLOBE NEWSWIRE) -- Businesses of all sizes can now bolster cybersecurity along the complete digital pathway from their connected devices through their IT networks all the way to cloud-hosted SaaS applications with Trusted Connection, a new cybersecurity solution from Verizon Business. Instead of simply forming a secure perimeter around your digital landscape, Trusted Connection secures the connection and endpoints from any user device to any digital resource, spanning web/cloud, SaaS, private apps and more.

Trusted Connection is particularly suitable for larger midsize businesses that need enhanced security but don’t have the resources or dedicated expertise to install and run it themselves, or for enterprises looking to simplify the management of their security.

“Having the right cybersecurity architecture in place is one of the most important responsibilities technology decision-makers face. Ensuring end-to-end security is critical,” said Kyle Malady, CEO, Verizon Business. “If a perimeter is breached, bad actors can wreak havoc. Trusted Connection creates a protected environment within the outer walls of security, protecting each specific entry point and pathway that could lead a bad actor to a valuable digital asset. It’s sophisticated security technology combined with an ease of use that makes cybersecurity accessible to businesses of all sizes.”

“Cloud-related security is an urgent and escalating problem, but few enterprises have the resources to keep safe in real time as exploitable technologies gain ground. The service can dramatically reduce attack surface by encrypting paths between cloud and endpoint,” said Camille Mendler, Chief Analyst, Service Provider Enterprise, Omdia. “Trusted Connection's seamless network-native security offers a huge step forward in functionality and control -- especially for mid-sized companies that face similar threats as large enterprises but often lack the resources to address quickly evolving security threats comprehensively.”

Trusted Connection includes the following features and capabilities:

  • Security Service Edge (SSE) capabilities, a collection of tightly integrated, cloud-centric security capabilities facilitating safe access to websites, software-as-a-service (SaaS) applications and private applications. This includes Zero Trust Network Access (ZTNA), Cloud Secure Web Gateway (SWG), Cloud Access Security Broker (CASB) and Firewall-as-a-Service (FWaaS).
  • Per-user or per-group policy definitions from a single console to control access to sensitive data.
  • Secure connectivity along encrypted paths from any device endpoint to digital resources, covering SaaS apps, multi-cloud/hybrid cloud, data centers, multiple office/worksite locations and/or remote workers.
  • Performance insights, automated alerts and anomaly detection with response options, with single-pane-of-glass visibility and control via a centralized portal.
  • Single-provider for both network services and embedded security to connect to curated SaaS providers and additional managed service options from Verizon Business.
  • Cloud Access Security Broker (CASB), a cloud-based policy enforcement software that secures the data flowing between users and cloud applications and facilitates compliance with corporate requirements. Trusted Connection CASB helps users define policies across applications from a single location, simplifying policy management and providing consistency across apps.

According to the 2024 Verizon Data Breach Investigations Report, 77% of basic web application attacks and 31% of all breaches in the past 10 years involved the use of stolen credentials. Trusted Connection can help contain the negative impacts of stolen credentials by enforcing ZTNA on network connections, checking device security posture, providing access from a managed device and by enforcing multi-factor authentication on access as designated by administrators.

Learn more about Trusted Connection here and reach out to your Verizon Business representative today.

Verizon Communications Inc. (NYSE, Nasdaq: VZ) powers and empowers how its millions of customers live, work and play, delivering on their demand for mobility, reliable network connectivity and security. Headquartered in New York City, serving countries worldwide and nearly all of the Fortune 500, Verizon generated revenues of $134.8 billion in 2024. Verizon’s world-class team never stops innovating to meet customers where they are today and equip them for the needs of tomorrow. For more, visit verizon.com or find a retail location at verizon.com/stores.

VERIZON’S ONLINE MEDIA CENTER: News releases, stories, media contacts and other resources are available at verizon.com/news. News releases are also available through an RSS feed. To subscribe, visit www.verizon.com/about/rss-feeds/.

Media contact:
Matt Conte
matthew.conte@verizon.com
(917) 848-3040


Primary Logo

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.