Managed Security Services to Address Increasingly Sophisticated Cyber-Attacks

Total Page:16

File Type:pdf, Size:1020Kb

Managed Security Services to Address Increasingly Sophisticated Cyber-Attacks 283 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Managed Security Services to Address Increasingly Sophisticated Cyber-attacks Yoshitaka Narishima OVERVIEW: Companies and organizations have been facing increasingly Shinichi Kasai severe security risks in recent years as cyber-attacks have grown more Takayuki Sato complicated and sophisticated. Also, as cloud services have spread, the connection of information appliances and control system devices to the Masaki Mori Internet has added to the complexity of the information systems that must Akihiko Fujita be protected. Managed security services are a group of integrated services that provide everything from consulting to operations and the application of security measures. These services include technical assistance in the handling of incidents by applying Hitachi’s knowledge, and security event monitoring services that apply know-how in both construction and operations, thereby enabling the provision of solutions that are tailored to the information systems that are being protected and contributing to the safety and security of the social infrastructure. (PCs) and other such IT devices, information INTRODUCTION appliances, control system devices, and other INFORMATION technology (IT) is increasingly being devices are now being connected to the Internet. This utilized to achieve an advanced social infrastructure makes much larger number of system environments that provides greater user convenience. As the role of vulnerable to the cyber-attacks, making the scale of IT systems grows in this type of social infrastructure, the threats even greater. the importance of ensuring safety and security is Against the background of these threats, taking becoming more and more important. security measures based on defense in depth in order Companies and organizations have been facing to protect information systems from cyber-attacks, stark security risks in recent years as cyber-attacks the necessity is also growing for the immediate have grown more complex and sophisticated. This detection of incidents when an attack occurs, so that includes more advanced targeted e-mail attacks events can be handled rapidly to hold damage to a and larger distributed denial of service (DDoS) minimum. To this end, monitoring systems must be attacks, among others. Cyber-attacks target specifi c strengthened, with advanced log management systems organizations or individuals and relentlessly attempt that constantly monitor the complex IT systems, as to steal confi dential or personal information and to well as an organization comprised of engineering staff cripple IT system services, which even lead to exact with the technical skills required to take necessary money. measures quickly. Also, the necessity for outsourcing The information systems that must be protected security operations and security measures has been used to be set up within the organizations, but due to spreading as the operational burdens placed on the spread of cloud services, they can now be located information system departments has been increasing outside the organizations and on the Internet. With along with the required security expertise. internal corporate information systems sometimes This article discusses managed security services, linked to cloud services as well, the boundaries which are a set of comprehensive security measures between security regions are becoming less clear, designed to protect social infrastructures and and the administration of security increasingly information systems from more complicated and complicated. Also, in addition to personal computers sophisticated cyber-attacks. - 74 - Hitachi Review Vol. 63 (2014), No. 5 284 Achieving Dynamic Security Management MANAGED SECURITY SERVICES In order to strengthen measures against vulnerabilities Offerings from Hitachi include managed security in managed security services, in addition to services that oppose cyber-attacks and other threats. improvements based on the “PDCA cycle,” with These security solutions, everything from consulting planning that involves constructing cybersecurity to the application of security measures and operational incident readiness/response teams (CSIRT) within services, provide total support for companies in organizations and reviewing business continuity the social infrastructure fi eld and a variety of other plans (BCPs) (plan), measures and operations (do), industries and business categories, as well as for public inspections and audits (check), and improvements and agencies and local governments. corrections (act), the “OODA loop” concept is also These services manage security during the adopted in order to achieve decision making that is operational phases of IT systems with expanded needs both rapid and rational, through a series of steps that in outsourcing security measures and operations, and includes monitoring (observe), situational analysis not only do they “protect IT,” they offer an integrated (orient), decision making (decide), and action (act). set of security services designed for the “protection This method is used to strengthen dynamic security via IT.” Managed security services comprise three management in the operational stage, to establish categories: “managed security governance,” “managed information security policies based on the assumption channel security,” and “managed platform security,” that incidents will occur, and to implement stronger which can propose and provide the right solution for and more rapid security measures (see Fig. 2). the information system being protected, as well as the responsible offi ce and department in the organization Applying the Incident-handling Know-how (see Fig. 1). of a Team of Professionals The features of each of these three service The Hitachi Incident Response Team (HIRT), which categories are described below. acts as a CSIRT with responsibility for cyber-attack Managed security governance Category Service menu Feature overview Models of r3FWJFXPGQPMJDJFTBOE#$1T defended targets r4FDVSJUZQPMJDZGPSNVMBUJPOTVQQPSU suited to the cyber age ,OPXMFEHFBCPVU Security consulting r4FDVSJUZSJTLBOBMZTJTTVQQPSU r4JUVBUJPOBTTFTTNFOUCBTFEPO IPXUPQSPUFDU CISO/CIO service r#VTJOFTTDPOUJOVJUZNBOBHFNFOUGPSNVMBUJPO BXFBMUIPGJOUFMMJHFODF business operations support r3BQJEBOEBDDVSBUFJODJEFOU Security diagnosis r*5JOGSBTUSVDUVSFWVMOFSBCJMJUZEJBHOPTJT handling Information systems Managed service r.BMXBSFJOTQFDUJPO security governance r4ZTUFNWVMOFSBCJMJUZJOGPSNBUJPOQSPWJTJPO Intelligence service r)BSNGVMSVNPSTVSWFZTSFHBSEJOHTQFDJGJDTJUFT Managed channel security Business r*ODJEFOUSFTQPOTFTVQQPSU divisions r4FDVSFNFOUPGDVTUPNFS External cloud Customer CSIRT technical r$4*35PQFSBUJPOTVQQPSUXJUIJOPSHBOJ[BUJPOT service channel availability Sensor protection for service support service r5BSHFUFEBUUBDLNBJMUSBJOJOH OFUXPSLT r1SPUFDUJPOBHBJOTU services channels etc. r8FCBQQMJDBUJPOGJSFXBMMT VOBVUIPSJ[FEBDDFTT (Web) Website protection Managed service r8FCTJUF%%P4NFBTVSFT channel security Website check r8FCTZTUFNWVMOFSBCJMJUZEJBHOPTJT Managed platform security service r5BNQFSJOHEFUFDUJPO E-mail security r"OUJWJSVT BOUJTQBN Internal r,FFQJUPVU1SFWFOUJOHUIF Business service corporate r$POUFOUGJMUFSJOH JODVSTJPOPGNBMXBSF systems Monitoring and systems r63-GJMUFSJOHEVSJOH8FCCSPXTJOH r%POUMFUJUTQSFBE&BSMZ Web security service support system Managed r"OUJWJSVT detection and handling of for protecting incursions Information platform systems system Security event r*OUFHSBUFEMPHNBOBHFNFOU r%POUMFUJUMFBWF*GBO security departments monitoring service r-PHDPSSFMBUJPOBOBMZTJT JOGFDUJPOPDDVST QSFWFOU Control information leakage. systems Virtual server r7JSUVBM65.PQFSBUJPOTVQQPSU protection service BCP: business continuity plan CISO: Chief Information Security Offi cer CIO: Chief Information Offi cer IT: information technology CSIRT: cybersecurity incident readiness/response team DDoS: distributed denial of service URL: uniform resource locator UTM: unifi ed threat management Fig. 1—List of Menu Options for Managed Security Services. The systems defended by each category of managed security services are shown above. The table lists the service menu options available in each category. - 75 - 285 Managed Security Services to Address Increasingly Sophisticated Cyber-attacks Strengthened measures Operations based on assumption Security consultation Intelligence to avoid vulnerabilities that incidents will occur • Security policy and BCP formulation • Vulnerability information, including Construction of Review of Early detection Visualization support independently acquired information CSIRT within BCP, etc. of signs and of situation • ISMS/CSMS authentication • Information regarding new malware organization abnormalities acquisition support and other threats Plan Observe • Support for construction of • Global threat reports (planning) (monitoring) CSIRT/SOC within organizations Act Do Orient Strengthening of Act (improvements (measures and (situational security during (action) and corrections) operations) operational phase analysis) Plan Observe Check Decide (inspections (decision and audits) making) Act Do Act Orient Check Decide Implementation of Judgments based periodic diagnosis on information Security diagnosis CSIRT technical support Fig. 2—Relationship between PDCA Cycle and OODA Loop. • Vulnerability diagnosis • Distribution of intelligence affecting In addition to the continual improvements of the PDCA (plan, • Malware investigation customers do, check, act) cycle, operations based on the OODA (observe,
Recommended publications
  • Oracle Managed Security Services for Oracle Cloud and on Premises (PDF)
    Oracle Managed Security Services for Oracle Cloud and On-Premises Oracle Managed Security Services help customers protect their data Key Features in Oracle Cloud or on-premises, and meet their internal security and Complete lifecycle management regulatory requirements in an efficient and cost-effective manner. including design, implementation, monitoring, management, and End-to-end security services packages include design, reporting implementation, ongoing management, monitoring, and reporting, Proactive detection and prevention and provide a complete managed security service for customers of vulnerabilities through assessments and targeted tests looking to deploy Oracle security products and services. Expert installation and customer specific configuration of Oracle Security throughout the lifecycle security software such as encryption, database vault, and Data security, integrity, privacy, and compliance with regulatory requirements data masking are a top priority for most companies—no matter if they run their databases and Seamless service delivery applications in their own data centers, or on cloud. Oracle is addressing those management throughout the needs with a broad range of offerings. To ensure the highest level of protection engagement and to mitigate risk introduced with change, it is essential to expertly maintain Predictable cost and transparent and manage those Oracle security products and services, in the environments delivery planning where applications and databases are deployed, throughout their lifecycle. Oracle
    [Show full text]
  • Managed Security Services Portfolio Brochure
    Managed Security Services Portfolio The next level of Managed Security Services – now available for your business Determined, capable cyber criminals don’t concentrate BAE Systems Managed Security Services help our customers their efforts on those organizations best-equipped to to enhance and develop their security operations in line with defend against their attacks. It’s difficult, expensive and their unique business challenges and security objectives. A time consuming to get the right mixture of people, process, security partnership with BAE Systems allows: technology and training in place, and maintaining these defenses while adapting to constantly-changing threats is a • Intelligence Led and threat focused detection and huge task. Traditional defenses are reaching traditional limits, response BAE Systems has been trusted to protect the networks, data • Proactive threat hunting for insider and external threats and devices of governments for 40 years – and we can bring • Accuracy and speed of response through machine that scale, cutting edge knowledge and security operations accelerated human decisions capability to your defense. • Complete infrastructure coverage from endpoint to Managed security services may be the answer but, instead cloud of reaching for an “off the shelf” solution, try a service that focuses on what matters to you which can scale and adapt • Access to the latest technology techniques and to your specific business requirements in an ever changing processes, all supported by our experienced staff world. It is time to choose a managed security service which goes beyond traditional limits. BAE Systems managed security Available with regional data residency, all services are portfolio delivers a customisable service to: delivered by dedicated 24x7 Security Operations Centers.
    [Show full text]
  • Managed Security Services – Industry Brief
    01 Introduction to Managed Security Services 04 02 Managed Security Services Landscape 07 03 Industry Trends 26 04 Transactions & Valuations Overview 34 2 Growth momentum in segments such as Threat Intelligence, The global Managed Security Services (MSS) market size was $15 billion in Global Segmental Research, Detection and Remediation (TIRDR) and Regulatory 2018, and is projected to grow to $23 billion by 2021 at a Landscape Forecast Compliance Management (RCM) is expected to drive future compound annual growth rate (CAGR) of 15% growth of the MSS market M&A activity is primarily targeted at horizontal Security Asset Management and Monitoring acquisitions to either acquire/expand technical Transactions Segmental (SAMM), the largest revenue contributor at capabilities/portfolio of offerings, or enhance Revenue 50%, is expected to grow slower than the geographical presence overall MSS market The financial services and government Vertical sectors remain the top two revenue Key inhibitors to the growth of MSS include the Growth contributors to the global MSS market, lack of threat visibility and clarity on assessment of Breakup with the manufacturing sector growing return on investment Inhibitors quickly due to digital transformation Key factors influencing the growing adoption of MSS globally include Growth increasing attack surface, sophistication of threat actors, economies Drivers of scale, and stringent regulations 3 Introduction To Managed Security Services 4 Defining Managed Security Services Benefits Of Managed Security Services
    [Show full text]
  • Cybersecurity Tactics for the Coronavirus Pandemic
    Risk Practice Cybersecurity tactics for the coronavirus pandemic The pandemic has made it harder for companies to maintain security and business continuity. But new tactics can help cybersecurity leaders to safeguard their organizations. by Jim Boehm, James Kaplan, Marc Sorel, Nathan Sportsman, and Trevor Steen © Gorodenkoff/Getty Images March 2020 The COVID-19 pandemic has presented chief companies eliminate vulnerabilities soon after information security officers (CISOs) and their their discovery. Patches that protect remote teams with two immediate priorities. One is infrastructure deserve particular attention. securing work-from-home arrangements on an unprecedented scale now that organizations have — Scale up multifactor authentication. Employees told employees to stop traveling and gathering, and working remotely should be required to use government officials in many places have advised multifactor authentication (MFA) to access or ordered their people to stay home as much as networks and critical applications. Scaling up possible. The other is maintaining the confidentiality, MFA can be challenging: the protection it will integrity, and availability of consumer-facing add calls for a surge in short-term capacity. network traffic as volumes spike—partly as a result Several practices make the rollout of MFA of the additional time people are spending at home. more manageable. One is to prioritize users who have elevated privileges (such as domain Recent discussions with cybersecurity leaders and sys admins, and application developers) suggest that certain actions are especially helpful and work with critical systems (for instance, to fulfill these two priorities. In this article, we money transfers). Targeting those users in pilot set out the technology modifications, employee- rollouts of modest scale will allow cybersecurity engagement approaches, and process changes that teams to learn from the experience and use cybersecurity leaders have found effective.
    [Show full text]
  • The Business Value of Managed Security Services. Introduction
    THE BUSINESS VALUE OF MANAGED SECURITY SERVICES. INTRODUCTION For many organizations, outsourcing network security services appears to be a logical choice. You avoid hardware, licensing, and maintenance costs; you benefit from around-the-clock security monitoring and management from dedicated security experts; and you free up your in-house IT staff to pursue activities core to your business mission. Yet many business decision makers dismiss the managed security service option out of hand, fearing the loss of control over the network. This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources. THE NETWORK SECURITY CONUNDRUM: INCREASED THREAT, DIMINISHING RESOURCES The network security landscape is changing – and rapidly. With organized crime methodically searching for easy targets to infiltrate, statesponsored cyber-terrorism on the rise, and the proliferation of common thieves swiping identities, the on-line, linked enterprise is fraught with risk. Yet the Internet is indispensible. Regardless of the danger, organizations cannot conduct business without connectivity. Business without the Internet is not an option. Regulatory bodies are jumping into the fray mandating different types of security legislation, approaches, fines, and even solutions. Industry governing bodies like the Payment Card Industry (PCI) Security Standards Council are aggressively requiring comprehensive network security strategies and tactics. Failure to comply can result in sanctions, fines and even the inability to take credit cards – a death knell for merchants. Government regulations such as HIPAA, SOX, GLBA, FISMA, and many others include harsh penalties for non-compliance.
    [Show full text]
  • Managed Security Digital Trust Security Services Catalogue
    SERVICES CATALOGUE MANAGED SECURITY DIGITAL TRUST SECURITY SERVICES CATALOGUE MASTERING Dealing with cybercrime alone is a challenge, but as businesses BUSINESS look for a competitive edge through digital […] many SECURITY are looking for outside help. Increasingly that help comes in Businesses need help to defend against the rising the form of a Managed Security tide of attacks, exploitations and infections. Services Provider (MSSP). Businesses across Europe are facing increasingly complex Paul Fisher, Research Director, and challenging security issues – from new compliance PAC Study MSSP 2017 requirements, through the severe shortage of appropriately skilled staff, to a rapidly evolving threat landscape. Added to this, the onward march to digital is resulting in more data, more devices, increased user demand for access and the use of Cloud; all of which creates new attack surfaces, ready to be exploited. 2 DIGITAL TRUST SECURITY SERVICES CATALOGUE WITH OUR DIGITAL TRUST PROPOSITIONS, WE CAN MASTER BUSINESS SECURITY Our job is to manage your infrastructure, your network and your workplace. Security is a part of that job, and is defined in the services that make up our Digital Trust Security Proposition. • Cyber Defense Center INFORMATION SECURITY MANAGEMENT • Control Compliance • Security Monitoring & Analytics • Risk Analysis Services • Vulnerability Management CYBER DEFENCE • Security Management IDENTITY ACCESS MANAGEMENT • Cloud Security • Privileged Account Management • Firewall Management • Identity Governance • Information Prevention
    [Show full text]
  • Dimension Data Enhances Delivery of Managed Security Services with Algosec
    DIMENSION DATA ENHANCES DELIVERY OF MANAGED SECURITY SERVICES WITH ALGOSEC IT Solution Provider Streamlines and Automates Customer Name Security Operations for Clients Dimension Data Australia Line of Business AlgoSec Business Impact IT services and solutions provider for managed infrastructures • Generate incremental revenue from new policy compliance management services Location • Reduce cost of service for Managed Security Service offering Melbourne, Australia • Improve quality of service, assuring a direct and timely response to security issues dimensiondata.com Background Dimension Data, founded in 1983 and headquartered in Africa, provides global specialized IT services and solutions to help their clients plan, build, support and manage their IT infrastructures. The company serves over 6,000 clients in 58 countries and in all major industry verticals. Dimension Data serves 79% of the Global Fortune Top 100 and 63% of the Global Fortune 500. Challenge In an effort to bring greater efficiency and flexibility, Dimension Data Australia sought to apply security industry best practices and streamlined processes to its delivery methodology. Automation was identified as a key capability that would enable them to reduce service costs and increase quality of service. “The operational management of security infrastructure is quite labor intensive,” remarks Martin Schlatter, Security Services Product Manager at Dimension Data. “The principle reasons for automating managed services are reducing work time, freeing up people for other tasks, and leveraging expertise that is ‘built in’ the automated tool.” By doing this Dimension Data could offer better service to existing clients while expanding their client base. “Additionally, the increased appetite for the Managed Security Services offering has been fueled by an increasing focus on governance, risk management and compliance, and we are expected to deliver faster and more accurate visibility of the security and compliance posture of the network,” explains Schlatter.
    [Show full text]
  • 2019 Threats Posed to Healthcare Sector by Use of Third-Party Services
    TLP:WHITE HC3 Intelligence Briefing 2019 Threats Posed to Healthcare Sector by Use of Third-Party Services OVERALL CLASSIFICATION IS TLP:WHITE 4/2/2020 Report #: 202004021030 TLP:WHITE Agenda • Overview • MSPs and MSSPs • “Business Associates” • Mitigation: NIST Cyber Security Framework • Mitigation: Health Industry Cybersecurity Practices • Mitigation: Communicate Requirements • Assessment • HHS 405(d) Mitigation Practices: Third-Party Risks • References • Questions Slides Key: Non-Technical: managerial, strategic and high-level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) 4/2/2020 2 TLP:WHITE Overview Players • Managed Service Providers (MSP) and Managed Security Service Providers (MSSP) • Third-party companies, also called “business associates” (BA) • Third-parties provide various services to include IT, consulting, and administration services for healthcare facilities Mitigations • A comprehensive evaluation of the organizations that a healthcare entity intends to do business with. • Policies adopted by a healthcare entity may be desirable for those that they intend to do business with to adopt as well. Assessment – High Risk • The more third-parties in an environment the more uncontrolled entry points to your network you may have • Reputational harm to the healthcare entity could occur because of their association with a compromised third-party victim. 4/2/2020 3 TLP:WHITE MSPs and MSSPs Image by ControlScan Managed Service Providers (MSP) and Managed Security Service Providers (MSSP) are “high-value targets” for threat actors • MSPs and MSSPs as entry points to their true intended target—the MSP and MSSPs’ customers (you) • Once access to the target is gained the attackers will disable security tools on the victim’s network and expand their presence within the network.
    [Show full text]
  • What Financial Institutions Should Look for in a Managed Security Service Provider
    WHAT FINANCIAL INSTITUTIONS SHOULD LOOK FOR IN A MANAGED SECURITY SERVICE PROVIDER. SUMMARY Managed Security Service Providers (MSSPs) are responsible for protecting an organization’s critical data and ensuring that they avoid data breaches. Thus, choosing an MSSP is an important decision that requires a careful, thorough assessment of the options. This is especially true for financial institutions, which are among the most targeted and highly regulated organizations in the world due to the large amounts of sensitive account information they process and store. This whitepaper provides a useful framework to help financial institutions assess MSSPs. It also provides helpful, probing questions that they can use to vet potential providers. MSSPs provide fully managed security services, not just security technology. Therefore, it is important to assess the three key elements of comprehensive managed security – technology, processes, and people. This whitepaper starts with what financial institutions should look for in a provider from a high-level, company perspective, then uses the “technology, process, people” framework to help them assess potential providers. MSSPs help financial institutions reduce costs and complexity, reduce information security risk, and reduce the compliance burden. This whitepaper will help them reduce the amount of work and complexity involved in deciding which MSSP best meets the needs of their organization. COMPANY Analyst Validations Financial institutions should start by looking at providers that are included in Managed Security Services reports by major analyst firms such as Forrester and Gartner. Providers included in these reports have the necessary industry experience, meet minimum customer requirements, and meet critical MSSP technology and service requirements.
    [Show full text]
  • MSP Scope of Services Managed Service Plans
    Page 1 of 36 MSP Scope of Services Version: 2020.1 Last updated: 7-17-2020 Website: https://www.uscomputer.com/descriptions/ Managed Service Plans Proactive Care Plan Executive (PCPE) PCPE is our fully managed solution. PCPE provides unlimited IT service, helpdesk, and on-site support during business hours for a flat monthly rate per device. PCPE is designed for the company that needs a complete IT department experience, without having to hire anyone. We provide full IT management of your existing network and full IT support during and after installation and migration of a new or upgraded network. Included in the PCPE plan: • Unlimited IT Helpdesk and on-site support during normal business hours (Mon-Friday 8:00AM to 5:00PM EST) • IT management of PCPE Workstations, PCPE Servers, and PCPE Hypervisors. • Client approved Basic Security Recommendations (BSRs). Billable items not included in the PCPE Plan: • Projects (server migrations, email migrations, office moves, working with software and hardware vendors to implement their software and/or equipment, etc.) • Implementation of approved Basic Security Recommendations. • Billable overtime for client requests that fall outside normal business hours, projects, emergencies, etc. • On-site support at client’s remote location(s) located outside of Fairfield and New Haven Counties in CT and Westchester County in and if USCC dispatches a local resource to support the remote location. Services not included in the PCPE plan and not provided by USCC: • See Shared Cyber Security Responsibility PCPE
    [Show full text]
  • Managed Security Services – Policy Management +
    MANAGED SECURITY SERVICES – POLICY MANAGEMENT + 1. GENERAL 1.1 Service Definition 1.2 Service Implementation 1.3 Service Features 1.4 Service Levels 2. SUPPLEMENTAL TERMS 2.1 Excluded Serviced Device 2.2 Connectivity and Connectivity Equipment 2.3 End of Life Devices 2.4 Customer Responsibilities 2.5 Warranties 2.6 Term and Termination 2.7 Third Party Products or Services 2.8 Industry Alerts and Third Party Updates and Patches 2.9 Intellectual Property Rights 2.10 Confidential Information 2.11 Restriction on Encryption Functionality in India 3. SERVICE LEVEL AGREEMENT (SLA) 3.1 Key Performance Indicators 3.2 Service Credit Amount 3.3 Service Credit Claims 3.4 Service Credit Conditions 4. FINANCIAL TERMS 4.1 Rates and Charges 4.2 Per-Device Billing and On-boarding 5. DEFINTIONS 1. GENERAL 1.1 Service Definition. Managed Security Services (MSS) - Policy Management+ (Policy Management) services for Serviced Devices that are certified on Verizon’s MSS Product Feature Catalogue provides implementation of device initial Rule Sets and Policy Change Requests. The Serviced Devices may be located on the Customer’s premises or may be located in a Verizon Virtual Network Service (VNS), Verizon Hosted Network Service (HNS) or third party cloud environment (such as Microsoft Azure and Amazon Web Services). Policy Management services are provided at three service levels: Retail, Corporate, and Enterprise. Policy Management is not sold as a standalone service and must be purchased with Health Monitoring and Device Management services. 1.2 Service Implementation. Verizon will assign a Project Manager to Customer who will schedule a kick off meeting to introduce the Verizon service delivery team, identify the Authorized Contacts for Customer, discuss the scope of the Policy Management service and its business impacts, and obtain any required information from Customer.
    [Show full text]
  • HOW2-Select-A-MSSP-F
    How To Select a Managed Security Service Provider The NCSS recommends small businesses acquire a Managed Security Service Provider (MSSP) to protect your data, systems and access to online resources. A MSSP is defined as an IT service provider that delivers multiple security services – such as virus and spam blocking, intrusion detection, continuous monitoring, firewalls and/or virtual private network (VPN). A MSSP manages security for an organization as either a monthly service fee or by the number of employees serviced. Did you The unique value in using a MSSP, is this provider takes the burden off of the small business in managing security system changes, new configurations, and staying abreast know? with the latest security threats. Some MSSPs offer services for regulated industries such as health care and financial as well as provide compliance with GDPR. Ö Do you know what IT security In most cases, a MSSP provider will be more cost effective than acquiring in-house IT frameworks govern your security staff. However, you will still need to be able to discern what services to acquire business? because ultimately a data breach or cyber-attack is still your responsibility. Ö A MSSP is more cost effective STEP 1: Define your requirements than trying to do IT security on your own This might be a hard step for most small businesses, so we have made it easy by defining Ö Identify a company POC who the minimum set of capabilities your business should require from a MSSP. The MSSPs can interact with your MSSP that are listed under our Member Perks page are companies that the NCSS has evaluated account manager - a MSSP is for applicability in terms of cost and approach.
    [Show full text]