Jump to content

Managed security service: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Reverted 1 edit by Usamaawais (talk): Unsourced claims
Undid revision 1228752161 by 162.193.1.13 (talk) spam
 
(31 intermediate revisions by 19 users not shown)
Line 4: Line 4:
{{original research|date=December 2010}}
{{original research|date=December 2010}}
}}
}}

In [[computing]], '''managed security services''' ('''MSS''') are [[network security]] services that have been [[outsourcing|outsource]]d to a [[service provider]]. A [[company]] providing such a service is a '''managed security service provider''' ('''MSSP''')<ref name=Kairab>{{cite book|title=A Practical Guide to Security Assessments|author=Sudhanshu Kairab|pages=220&ndash;222|publisher=CRC Press|year=2004|isbn=9780849317064}}</ref> The roots of MSSPs are in the [[Internet Service Providers]] (ISPs) in the mid to late 1990s. Initially, [[Internet service provider|ISP(s)]] would sell [[customer]]s a [[Firewall (computing)|firewall]] [[Computer appliance|appliance]], as [[customer premises equipment]] (CPE), and for an additional fee would manage the customer-owned firewall over a [[Dial-up Internet access|dial-up connection]].<ref>{{cite news |title=Outsourcing Options |author=Denise Pappalardo |publisher=Network World | date=1997-03-17}}</ref>
In [[computing]], '''managed security services''' ('''MSS''') are [[network security]] services that have been [[outsourcing|outsource]]d to a [[service provider]]. A [[company]] providing such a service is a '''managed security service provider''' ('''MSSP''')<ref name=Kairab>{{cite book|title=A Practical Guide to Security Assessments|author=Sudhanshu Kairab|pages=220&ndash;222|publisher=CRC Press|year=2004|isbn=9780849317064}}</ref> The roots of MSSPs are in the [[Internet Service Providers]] (ISPs) in the mid to late 1990s. Initially, [[Internet service provider|ISP(s)]] would sell [[customer]]s a [[Firewall (computing)|firewall]] [[Computer appliance|appliance]], as [[customer premises equipment]] (CPE), and for an additional fee would manage the customer-owned firewall over a [[Dial-up Internet access|dial-up connection]].<ref>{{cite news |title=Outsourcing Options |author=Denise Pappalardo |publisher=Network World | date=1997-03-17}}</ref>


Line 15: Line 14:
Industry research firm, [[Forrester Research]], identified the 14 most significant vendors in the global market in 2018 with its 23-criteria evaluation of managed security service providers (MSSPs)--identifying [[Accenture]], [[IBM]], [[Dell SecureWorks]], [[Trustwave]], [[AT&T]], [[Verizon]], [[Deloitte]], [[Wipro]] and others as the leaders in the MSSP market.<ref>[https://www.forrester.com/report/The+Forrester+Wave+Global+Managed+Security+Services+Providers+MSSPs+Q3+2018/-/E-RES141654] The Forrester Wave™: Global Managed Security Services Providers (MSSPs), Q3 2018</ref> Newcomers to the market include a number of smaller providers used to protect homes, small businesses, and high networth clients.
Industry research firm, [[Forrester Research]], identified the 14 most significant vendors in the global market in 2018 with its 23-criteria evaluation of managed security service providers (MSSPs)--identifying [[Accenture]], [[IBM]], [[Dell SecureWorks]], [[Trustwave]], [[AT&T]], [[Verizon]], [[Deloitte]], [[Wipro]] and others as the leaders in the MSSP market.<ref>[https://www.forrester.com/report/The+Forrester+Wave+Global+Managed+Security+Services+Providers+MSSPs+Q3+2018/-/E-RES141654] The Forrester Wave™: Global Managed Security Services Providers (MSSPs), Q3 2018</ref> Newcomers to the market include a number of smaller providers used to protect homes, small businesses, and high networth clients.


==Early History of Managed Security Services==
==Early history==
An early example of an outsourced and off-site MSSP service is [[US West]] !NTERACT [[Internet security|Internet Security]]. The security service didn't require the customer to [[Purchasing|purchase]] any equipment and no security equipment was installed at the customers premises.<ref name=NW1>{{cite news |title=RBOC or ISP? |author=Tim Greene |publisher=Network World | date=1997-03-17}}</ref> The service is considered a MSSP offering in that US West retained ownership of the firewall equipment and the firewalls were operated from their own Internet [[Point of Presence]] (PoP)<ref name=PR1>{{cite web|title=Security Services for the Internet Release |url=http://www.uswest.com/com/atwork/interprise/031297_security.html/ |accessdate=24 November 2014 |url-status=dead |archiveurl=https://web.archive.org/web/19970516211801/http://www.uswest.com/com/atwork/interprise/031297_security.html/ |archivedate=May 16, 1997 }}</ref> The service was based on [[Check Point]] Firewall-1 equipment.<ref>{{cite web|title=Check Point Software Technologies ISP Market Initiative Partner Quote Sheet|url=http://www.checkpoint.com/press/1997/isp3quote.html/|accessdate=24 November 2014}}</ref> Following over a year long beta introduction period, the service was generally available by early 1997.<ref name=NW1 /><ref name=PR1 /> The service also offered managed [[Virtual private network|Virtual Private Networking]] (VPN) [[encryption]] security at launch.<ref name=PR1 />
An early example of an outsourced and off-site MSSP service is [[US West]] !NTERACT [[Internet security|Internet Security]]. The security service didn't require the customer to [[Purchasing|purchase]] any equipment and no security equipment was installed at the customers premises.<ref name=NW1>{{cite news |title=RBOC or ISP? |author=Tim Greene |publisher=Network World | date=1997-03-17}}</ref> The service is considered an MSSP offering in that US West retained ownership of the firewall equipment and the firewalls were operated from their own Internet [[Point of Presence]] (PoP)<ref name=PR1>{{cite web|title=Security Services for the Internet Release |url=http://www.uswest.com/com/atwork/interprise/031297_security.html/ |accessdate=24 November 2014 |url-status=dead |archiveurl=https://web.archive.org/web/19970516211801/http://www.uswest.com/com/atwork/interprise/031297_security.html/ |archivedate=May 16, 1997 }}</ref> The service was based on [[Check Point]] Firewall-1 equipment.<ref>{{cite web|title=Check Point Software Technologies ISP Market Initiative Partner Quote Sheet|url=http://www.checkpoint.com/press/1997/isp3quote.html/|accessdate=24 November 2014}}</ref> Following over a year long beta introduction period, the service was generally available by early 1997.<ref name=NW1 /><ref name=PR1 /> The service also offered managed [[Virtual private network|Virtual Private Networking]] (VPN) [[encryption]] security at launch.<ref name=PR1 />


==Industry terms==
==Industry terms==
Line 44: Line 43:


==Engaging an MSSP==
==Engaging an MSSP==
The decision criteria for engaging the services of a MSSP are much the same as those for any other form of outsourcing: cost-effectiveness compared to in-house solutions, focus upon core competencies, need for round-the-clock service, and ease of remaining up-to-date. An important factor, specific to MSS, is that outsourcing network security hands over critical control of the company's infrastructure to an outside party, the MSSP, whilst not relieving the ultimate responsibility for errors. The client of an MSSP still has the ultimate responsibility for its own security, and as such must be prepared to manage and monitor the MSSP, and hold it accountable for the services for which it is contracted. The relationship between MSSP and client is not a turnkey one.<ref name=Kairab />
The decision criteria for engaging the services of an MSSP are much the same as those for any other form of outsourcing: cost-effectiveness compared to in-house solutions, focus upon core competencies, need for round-the-clock service, and ease of remaining up-to-date. An important factor, specific to MSS, is that outsourcing network security hands over critical control of the company's infrastructure to an outside party, the MSSP, whilst not relieving the ultimate responsibility for errors. The client of an MSSP still has the ultimate responsibility for its own security, and as such must be prepared to manage and monitor the MSSP, and hold it accountable for the services for which it is contracted. The relationship between MSSP and client is not a turnkey one.<ref name=Kairab />


Although the organization remains responsible for defending its network against information security and related business risks, working with a MSSP allows the organization to focus on its core activities while remaining protected against network vulnerabilities.
Although the organization remains responsible for defending its network against information security and related business risks, working with an MSSP allows the organization to focus on its core activities while remaining protected against network vulnerabilities.


Business risks can result when information assets upon which the business depends are not securely configured and managed (resulting in asset compromise due to violations of confidentiality, availability, and integrity). Compliance with specific government-defined security requirements can be achieved by using managed security services.<ref>[http://www.sei.cmu.edu/library/abstracts/reports/03sim012.cfm] Outsourcing Managed Security Services</ref>
Business risks can result when information assets upon which the business depends are not securely configured and managed (resulting in asset compromise due to violations of confidentiality, availability, and integrity). Compliance with specific government-defined security requirements can be achieved by using managed security services.<ref>[http://www.sei.cmu.edu/library/abstracts/reports/03sim012.cfm] Outsourcing Managed Security Services</ref>
Line 58: Line 57:
The organizations across sectors are now shifting to Managed Security services from the traditional in-house IT security practices. A trend of outsourcing the IT security jobs to the Managed Security Services vendors is picking up at an appreciable pace. This also helps the enterprises to focus more on their core business activities as a strategic approach. Effective management, cost-effectiveness and seamless monitoring are the major drivers fueling the demand of these services. Further, with the increase in the participation of leading IT companies worldwide, the end user enterprises are gaining confidence in outsourcing the IT security.<ref>{{Cite web|url=http://www.sigmamarketresearch.com/managed-security-services-mss-an-opportunistic-it-security-segment-globally/|title=Managed Security Services (MSS): An Opportunistic IT Security Segment, Globally|date=17 December 2015}}</ref>
The organizations across sectors are now shifting to Managed Security services from the traditional in-house IT security practices. A trend of outsourcing the IT security jobs to the Managed Security Services vendors is picking up at an appreciable pace. This also helps the enterprises to focus more on their core business activities as a strategic approach. Effective management, cost-effectiveness and seamless monitoring are the major drivers fueling the demand of these services. Further, with the increase in the participation of leading IT companies worldwide, the end user enterprises are gaining confidence in outsourcing the IT security.<ref>{{Cite web|url=http://www.sigmamarketresearch.com/managed-security-services-mss-an-opportunistic-it-security-segment-globally/|title=Managed Security Services (MSS): An Opportunistic IT Security Segment, Globally|date=17 December 2015}}</ref>


Services providers in this category tend to offer comprehensive IT security services delivered on remotely managed appliances or devices that are simple to install and run for the most part in the background. Fees are normally highly affordable to reflect financial constraints, and are charged every month at a flat rate to ensure predictability of costs. Service providers deliver daily, weekly, monthly or exception-based reporting depending on the client's requirements.<ref>[http://www.itworld.com/article/2774665/small-business/security-for-small-business---how-to-make-the-most-of-managed-security-services.html] How to make the most of managed security services</ref> Security Tuning(Firewall tuning/ IDS tuning/ SIEM tuning) <ref>http://www.catcyfence.com/it-security/services/managed-security-service/</ref>
Services providers in this category tend to offer comprehensive IT security services delivered on remotely managed appliances or devices that are simple to install and run for the most part in the background. Fees are normally highly affordable to reflect financial constraints, and are charged every month at a flat rate to ensure predictability of costs. Service providers deliver daily, weekly, monthly or exception-based reporting depending on the client's requirements.<ref>[http://www.itworld.com/article/2774665/small-business/security-for-small-business---how-to-make-the-most-of-managed-security-services.html] How to make the most of managed security services</ref>


Today IT security has become a power weapon as [[cyberattack]]s have become highly sophisticated. As enterprises toil to keep at par with the new malware deviant or e-mail spoofing fraud gambit. Among different prominent players, Managed Security Service provider observe the growing need to combat increasingly complicated and intended attacks. In response, these vendors are busy enhancing the sophistication of their solution, in many cases winning over other security expert to expand their portfolio. Besides this increasing regulatory compliance associated with the protection of citizen's data worldwide, is likely to stimulate enterprises to ensure a high data-security level.
Today IT security has become a power weapon as [[cyberattack]]s have become highly sophisticated. As enterprises toil to keep at par with the new malware deviant or e-mail spoofing fraud gambit. Among different prominent players, Managed Security Service provider observe the growing need to combat increasingly complicated and intended attacks. In response, these vendors are busy enhancing the sophistication of their solution, in many cases winning over other security expert to expand their portfolio. Besides this increasing regulatory compliance associated with the protection of citizen's data worldwide, is likely to stimulate enterprises to ensure a high data-security level.
Line 67: Line 66:
* [[Information security operations center]]
* [[Information security operations center]]
* [[Security as a service]]
* [[Security as a service]]
* [[Managed detection and response]]


==References==
==References==

Latest revision as of 00:34, 13 June 2024

In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP)[1] The roots of MSSPs are in the Internet Service Providers (ISPs) in the mid to late 1990s. Initially, ISP(s) would sell customers a firewall appliance, as customer premises equipment (CPE), and for an additional fee would manage the customer-owned firewall over a dial-up connection.[2]

According to recent industry research, most organizations (74%) manage IT security in-house, but 82% of IT professionals said they have either already partnered with, or plan to partner with, a managed security service provider.[3]

Businesses turn to managed security services providers to alleviate the pressures they face daily related to information security such as targeted malware, customer data theft, skills shortages and resource constraints.[4][5]

Managed security services (MSS) are also considered the systematic approach to managing an organization's security needs. The services may be conducted in-house or outsourced to a service provider that oversees other companies' network and information system security. Functions of a managed security service include round-the-clock monitoring and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. There are products available from a number of vendors to help organize and guide the procedures involved. This diverts the burden of performing the chores manually, which can be considerable, away from administrators.

Industry research firm, Forrester Research, identified the 14 most significant vendors in the global market in 2018 with its 23-criteria evaluation of managed security service providers (MSSPs)--identifying Accenture, IBM, Dell SecureWorks, Trustwave, AT&T, Verizon, Deloitte, Wipro and others as the leaders in the MSSP market.[6] Newcomers to the market include a number of smaller providers used to protect homes, small businesses, and high networth clients.

Early history

[edit]

An early example of an outsourced and off-site MSSP service is US West !NTERACT Internet Security. The security service didn't require the customer to purchase any equipment and no security equipment was installed at the customers premises.[7] The service is considered an MSSP offering in that US West retained ownership of the firewall equipment and the firewalls were operated from their own Internet Point of Presence (PoP)[8] The service was based on Check Point Firewall-1 equipment.[9] Following over a year long beta introduction period, the service was generally available by early 1997.[7][8] The service also offered managed Virtual Private Networking (VPN) encryption security at launch.[8]

Industry terms

[edit]
  • Asset: A resource valuable to a company worthy of protection.
  • Incident: An assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an asset.
  • Alert: Identified information, i.e. fact, used to correlate an incident.

Six categories of managed security services

[edit]

On-site consulting

[edit]

This is customized assistance in the assessment of business risks, key business requirements for security and the development of security policies and processes. It may include comprehensive security architecture assessments and design (include technology, business risks, technical risks and procedures). Consulting may also include security product integration and On-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis[1][10]

Perimeter management of the client's network

[edit]

This service involves installing, upgrading, and managing the firewall, Virtual Private Network (VPN) and/or intrusion detection hardware and software, electronic mail, and commonly performing configuration changes on behalf of the customer. Management includes monitoring, maintaining the firewall's traffic routing rules, and generating regular traffic and management reports to the customer.[1] Intrusion detection management, either at the network level or at the individual host level, involves providing intrusion alerts to a customer, keeping up to date with new defenses against intrusion, and regularly reporting on intrusion attempts and activity. Content filtering services may be provided by; such as, email filtering and other data traffic filtering.[10]

Product resale

[edit]

Clearly not a managed service by itself, product resale is a major revenue generator for many MSS providers. This category provides value-added hardware and software for a variety of security-related tasks. One such service that may be provided is archival of customer data.[10]

Managed security monitoring

[edit]

This is the day-to-day monitoring and interpretation of important system events throughout the network—including unauthorized behavior, malicious hacks, denial of service (DoS), anomalies, and trend analysis. It is the first step in an incident response process.

Penetration testing and vulnerability assessments

[edit]

This includes one-time or periodic software scans or hacking attempts in order to find vulnerabilities in a technical and logical perimeter. It generally does not assess security throughout the network, nor does it accurately reflect personnel-related exposures due to disgruntled employees, social engineering, etc. Regularly, reports are given to the client.[1][10]

Compliance monitoring

[edit]

Conduct change management by monitoring event log to identify changes to a system that violates a formal security policy. For example, if an impersonator grants himself or herself too much administrative access to a system, it would be easily identifiable through compliance monitoring.[11]

Engaging an MSSP

[edit]

The decision criteria for engaging the services of an MSSP are much the same as those for any other form of outsourcing: cost-effectiveness compared to in-house solutions, focus upon core competencies, need for round-the-clock service, and ease of remaining up-to-date. An important factor, specific to MSS, is that outsourcing network security hands over critical control of the company's infrastructure to an outside party, the MSSP, whilst not relieving the ultimate responsibility for errors. The client of an MSSP still has the ultimate responsibility for its own security, and as such must be prepared to manage and monitor the MSSP, and hold it accountable for the services for which it is contracted. The relationship between MSSP and client is not a turnkey one.[1]

Although the organization remains responsible for defending its network against information security and related business risks, working with an MSSP allows the organization to focus on its core activities while remaining protected against network vulnerabilities.

Business risks can result when information assets upon which the business depends are not securely configured and managed (resulting in asset compromise due to violations of confidentiality, availability, and integrity). Compliance with specific government-defined security requirements can be achieved by using managed security services.[12]

Managed security services for mid-sized and smaller businesses

[edit]

The business model behind managed security services is commonplace among large enterprise companies with their IT security experts. The model was later adapted to fit medium-sized and smaller companies (SMBs - organizations up to 500 employees, or with no more than 100 employees at any one site) by the value-added reseller (VAR) community, either specializing in managed security or offering it as an extension to their managed IT service solutions. SMBs are increasingly turning to managed security services for several reasons. Chief among these are the specialized, complex and highly dynamic nature of IT security and the growing number of regulatory requirements obliging businesses to secure the digital safety and integrity of personal information and financial data held or transferred via their computer networks.

Whereas larger organizations typically employ an IT specialist or department, organizations at a smaller scale such as distributed location businesses, medical or dental offices, attorneys, professional services providers or retailers do not typically employ full-time security specialists, although they frequently employ IT staff or external IT consultants. Of these organizations, many are constrained by budget limitations. To address the combined issues of lack of expertise, lack of time and limited financial resources, an emerging category of managed security service provider for the SMB has arisen.

The organizations across sectors are now shifting to Managed Security services from the traditional in-house IT security practices. A trend of outsourcing the IT security jobs to the Managed Security Services vendors is picking up at an appreciable pace. This also helps the enterprises to focus more on their core business activities as a strategic approach. Effective management, cost-effectiveness and seamless monitoring are the major drivers fueling the demand of these services. Further, with the increase in the participation of leading IT companies worldwide, the end user enterprises are gaining confidence in outsourcing the IT security.[13]

Services providers in this category tend to offer comprehensive IT security services delivered on remotely managed appliances or devices that are simple to install and run for the most part in the background. Fees are normally highly affordable to reflect financial constraints, and are charged every month at a flat rate to ensure predictability of costs. Service providers deliver daily, weekly, monthly or exception-based reporting depending on the client's requirements.[14]

Today IT security has become a power weapon as cyberattacks have become highly sophisticated. As enterprises toil to keep at par with the new malware deviant or e-mail spoofing fraud gambit. Among different prominent players, Managed Security Service provider observe the growing need to combat increasingly complicated and intended attacks. In response, these vendors are busy enhancing the sophistication of their solution, in many cases winning over other security expert to expand their portfolio. Besides this increasing regulatory compliance associated with the protection of citizen's data worldwide, is likely to stimulate enterprises to ensure a high data-security level.

Some of the frontrunners in engaging managed security services are Financial Services, telecom, information technology etc. To maintain a competitive edge, MSS vendors are focusing more and more on refining their product offering of technologies deployed at clients. Another crucial factor of profitability remains the capability to lower the cost yet generate more revenue by avoiding the deployment of additional tools. Simplifying both service creation and integration of the products ensures unprecedented visibility as well as integration. Besides this, the MSS market would witness a tremendous growth in regions such as North America, Europe, Asia –Pacific and Latin America, Middle East and Africa.[15]

See also

[edit]

References

[edit]
  1. ^ a b c d e Sudhanshu Kairab (2004). A Practical Guide to Security Assessments. CRC Press. pp. 220–222. ISBN 9780849317064.
  2. ^ Denise Pappalardo (1997-03-17). "Outsourcing Options". Network World.
  3. ^ [1] Pressure to deliver new IT projects despite security concerns felt by 80% of IT professionals
  4. ^ "5 Pitfalls to Avoid When Choosing a Managed Security Service Provider". Archived from the original on 21 August 2016. Retrieved 29 July 2016.
  5. ^ "CSO Magazine: Study shows those responsible for security face mounting pressures". February 11, 2014.
  6. ^ [2] The Forrester Wave™: Global Managed Security Services Providers (MSSPs), Q3 2018
  7. ^ a b Tim Greene (1997-03-17). "RBOC or ISP?". Network World.
  8. ^ a b c "Security Services for the Internet Release". Archived from the original on May 16, 1997. Retrieved 24 November 2014.
  9. ^ "Check Point Software Technologies ISP Market Initiative Partner Quote Sheet". Retrieved 24 November 2014.
  10. ^ a b c d Brian T. Contos; William P. Crowell; Colby Derodeff; Dan Dunkel & Eric Cole (2007). Physical and Logical Security Convergence. Syngress. pp. 140. ISBN 9781597491228.
  11. ^ "Managed Services". www.itb.com.sa. Retrieved 2020-11-15.
  12. ^ [3] Outsourcing Managed Security Services
  13. ^ "Managed Security Services (MSS): An Opportunistic IT Security Segment, Globally". 17 December 2015.
  14. ^ [4] How to make the most of managed security services
  15. ^ "Cloud-based Managed Security Services to Overtake On-Premise Deployment within 12 Months". 14 August 2015.

Further reading

[edit]
  • Amanda Andress (2003). "Managed Security Services". Surviving Security. CRC Press. pp. 353–358. ISBN 9780849320422.
  • Roberta Bragg; Mark Rhodes-Ousley & Keith Strassberg (2004). "Managed Security Services". Network Security. McGraw-Hill Professional. pp. 110–113. ISBN 9780072226973.
  • C. Warren Axelrod (2004). Outsourcing Information Security. Artech House. ISBN 9781580535311.