SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
MSSP
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
Agenda
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
What do mean by Managed Security Services
"the remote monitoring or management of IT security
functions delivered via shared services from remote
security operations centres (SOCs), not through
personnel on-site."
Gartner 2014
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
MSSP Market Segmentation - Services
Security Monitoring and Management
• Log management.
• Security Incident and Event Management
(SIEM)
• Security Asset Management
Security Solution Management
• Managed Firewall
• Managed IDS/IPS
• Managed IAM
• Managed Endpoint / DLP
• Managed Mobility
Risk and Compliance Management
• Vulnerability Scanning
• Compliance auditing (PCI/DSS, ISO 27001)
Threat Research, Intelligence, Detection and
Remediation
• Intelligence via investigation of incidents,
malware, exploits, vulnerabilities
• Event Correlation and threat intelligence
• Managed APT
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
Roadmap and Direction
Increased
importance of
SIEM
Greater Adoption
of Advanced
Threat
Further
Compliance
Drivers
Cloud Delivery
Increase in
mobile Security
Offering
Advanced
Analytics
McAfee
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
Global Providers
No Single Dominant leader
In 2013 < 40% of market
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
Drivers
Access to in-house highly skilled security professionals
Evolving Compliance and Regulatory Drivers
Increased Sophistication of attacks
Increased fear – Data Breaches
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
The ‘promise’ an MSSP
• Increase Security
• Lower Costs
• Reduce Risk
• Expert Skills
• Experience – tools /processes
• Broad capability
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
What may inhibit MSSP adoption
• Can you show ROI
• Control over data
• Outsource security
• Underestimating the risks
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
You take the blue pill, the story ends.
You wake up in your bed and believe
whatever you want to believe. You take
the red pill, you stay in wonderland,
and I show you how deep the rabbit
hole goes."
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
What to look for when Selecting an MSSP
1. Range of services and capability
2. Multivendor Support
3. People with Expertise
4. Reputation / Experience
5. Local Support
6. Customer Portal - Single Pane of Glass Management
7. Standards and Certifications
8. Contracts / Commercial
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.
Ward Solutions
Ward Solutions are an independent information security
consultancy and system integration company. We help
organisations protect their brand, people, assets,
intellectual property and profits by identifying the
threats, and minimising the risks that organisations face.
© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.

Contenu connexe

Tendances

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1Todd Petty
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Chris Ross
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protectioncentralohioissa
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Servicessahrens1
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive SecurityBlueliv
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.Mindtree Ltd.
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problemNathan Burke
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 

Tendances (20)

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1Microsoft Word   Morningstar Rfp   Security Assessment 2008 V2 1
Microsoft Word Morningstar Rfp Security Assessment 2008 V2 1
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive Security
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problem
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 

En vedette

Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPHuntsman Security
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
C&W Product Portfolio
C&W Product PortfolioC&W Product Portfolio
C&W Product PortfolioCWBusiness
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramMorphick
 
Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Morphick
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesEASY EGOV
 
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...David Castro
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion, Inc.
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...David Castro
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsDavid Castro
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningDell EMC World
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupseFolder
 

En vedette (20)

Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Citrix Day 2012: ShareFile
Citrix Day 2012: ShareFileCitrix Day 2012: ShareFile
Citrix Day 2012: ShareFile
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
C&W Product Portfolio
C&W Product PortfolioC&W Product Portfolio
C&W Product Portfolio
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
 
Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015
 
Forrester Emerging MSSP Wave
Forrester Emerging MSSP WaveForrester Emerging MSSP Wave
Forrester Emerging MSSP Wave
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectives
 
Webinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWSWebinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWS
 
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 

Similaire à To MSSP or not to MSSP IISF 2015

IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingPaul Hogan
 
Kavvach enterprises private limited company profile SECURITY SYSTEMS
Kavvach enterprises private limited   company profile SECURITY SYSTEMSKavvach enterprises private limited   company profile SECURITY SYSTEMS
Kavvach enterprises private limited company profile SECURITY SYSTEMSKapil Rode
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
kelida-brochure-2015
kelida-brochure-2015kelida-brochure-2015
kelida-brochure-2015Dave Johnson
 
Hipora company profile
Hipora company profileHipora company profile
Hipora company profileVivien Wamalwa
 
LIVE WIRE MARKETING SLIDES.pptx
LIVE WIRE MARKETING SLIDES.pptxLIVE WIRE MARKETING SLIDES.pptx
LIVE WIRE MARKETING SLIDES.pptxDamilareOgundimu2
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Assset Security and protection Ltd About Us Documents
Assset Security and protection Ltd  About Us DocumentsAssset Security and protection Ltd  About Us Documents
Assset Security and protection Ltd About Us Documentsbiscuits1980
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Rakesh Kumar
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Rampart services corporate ppt
Rampart services corporate pptRampart services corporate ppt
Rampart services corporate pptRampart Services
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURCyren, Inc
 
ACSPL PROFILE - FEB 2021.pptx
ACSPL PROFILE - FEB 2021.pptxACSPL PROFILE - FEB 2021.pptx
ACSPL PROFILE - FEB 2021.pptxShashiShetty11
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management ProviderPriyanka Agarwal
 

Similaire à To MSSP or not to MSSP IISF 2015 (20)

IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
 
Kavvach enterprises private limited company profile SECURITY SYSTEMS
Kavvach enterprises private limited   company profile SECURITY SYSTEMSKavvach enterprises private limited   company profile SECURITY SYSTEMS
Kavvach enterprises private limited company profile SECURITY SYSTEMS
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
kelida-brochure-2015
kelida-brochure-2015kelida-brochure-2015
kelida-brochure-2015
 
kelida-brochure-2015
kelida-brochure-2015kelida-brochure-2015
kelida-brochure-2015
 
Hipora company profile
Hipora company profileHipora company profile
Hipora company profile
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
LIVE WIRE MARKETING SLIDES.pptx
LIVE WIRE MARKETING SLIDES.pptxLIVE WIRE MARKETING SLIDES.pptx
LIVE WIRE MARKETING SLIDES.pptx
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Assset Security and protection Ltd About Us Documents
Assset Security and protection Ltd  About Us DocumentsAssset Security and protection Ltd  About Us Documents
Assset Security and protection Ltd About Us Documents
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Rampart services corporate ppt
Rampart services corporate pptRampart services corporate ppt
Rampart services corporate ppt
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
 
ACSPL PROFILE - FEB 2021.pptx
ACSPL PROFILE - FEB 2021.pptxACSPL PROFILE - FEB 2021.pptx
ACSPL PROFILE - FEB 2021.pptx
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
 

To MSSP or not to MSSP IISF 2015

  • 1. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. MSSP
  • 2. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. Agenda
  • 3. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. What do mean by Managed Security Services "the remote monitoring or management of IT security functions delivered via shared services from remote security operations centres (SOCs), not through personnel on-site." Gartner 2014
  • 4. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. MSSP Market Segmentation - Services Security Monitoring and Management • Log management. • Security Incident and Event Management (SIEM) • Security Asset Management Security Solution Management • Managed Firewall • Managed IDS/IPS • Managed IAM • Managed Endpoint / DLP • Managed Mobility Risk and Compliance Management • Vulnerability Scanning • Compliance auditing (PCI/DSS, ISO 27001) Threat Research, Intelligence, Detection and Remediation • Intelligence via investigation of incidents, malware, exploits, vulnerabilities • Event Correlation and threat intelligence • Managed APT
  • 5. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. Roadmap and Direction Increased importance of SIEM Greater Adoption of Advanced Threat Further Compliance Drivers Cloud Delivery Increase in mobile Security Offering Advanced Analytics McAfee
  • 6. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. Global Providers No Single Dominant leader In 2013 < 40% of market
  • 7. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. Drivers Access to in-house highly skilled security professionals Evolving Compliance and Regulatory Drivers Increased Sophistication of attacks Increased fear – Data Breaches
  • 8. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. The ‘promise’ an MSSP • Increase Security • Lower Costs • Reduce Risk • Expert Skills • Experience – tools /processes • Broad capability
  • 9. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. What may inhibit MSSP adoption • Can you show ROI • Control over data • Outsource security • Underestimating the risks
  • 10. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in wonderland, and I show you how deep the rabbit hole goes."
  • 11. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. What to look for when Selecting an MSSP 1. Range of services and capability 2. Multivendor Support 3. People with Expertise 4. Reputation / Experience 5. Local Support 6. Customer Portal - Single Pane of Glass Management 7. Standards and Certifications 8. Contracts / Commercial
  • 12. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary. Ward Solutions Ward Solutions are an independent information security consultancy and system integration company. We help organisations protect their brand, people, assets, intellectual property and profits by identifying the threats, and minimising the risks that organisations face.
  • 13. © 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.© 2000-2014 Ward Solutions, Ltd. All rights reserved. Confidential and Proprietary.