Story image

The who, what, and why of managed security service providers

06 May 18

A wise man once said, “An attacker may defeat someone who is alone, but two can resist him, and a three-stranded cord is not easily broken.”

In an era that is bringing in the power of collective defence, collective threat intelligence, collaboration, and a plethora of security services and products, it’s an era like nothing we’ve ever seen before.

Organisations may not have the budget, the resources, and the skill sets to provide the best levels of cyber protection on their own – and it may not be the wisest idea to go the way of DIY security.

Luckily, managed security service providers (MSSPs) bring together people, process and technology as a strong three-stranded cord – one that can provide a holistic and customised approach to security designed for your organisation.

However, one of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.

Information security is managed best by a risk-based approach and leveraging defensive — as well as preventive (such as proactive cyber hunting) — tactics extensively.

Rackspace and Alert Logic understand the power of collaboration, which is why they have produced this full-version e-book called Managed Security Service Providers for Dummies.

The book will teach you how to leverage a managed security services provider to enhance your organisation’s security posture in the cloud.

Every chapter provides useful tips, making your decisions simple and pragmatic in nature. Here’s a sample:

  • How security challenges have evolved in the cloud
  • Why you need a new strategy to address security challenges in the cloud
  • How to optimise people, processes, and technology to enhance your security posture in the cloud
  • What you need to consider when choosing to “do it yourself” or go with a managed security services provider
  • How to address different industry use cases and compliance requirements in the cloud
  • Why you need to re-evaluate your enterprise security strategy for the modern cloud era
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.