You are viewing 'managed security service provider'
Important Steps for an Effective Security Program
There is no shortage of articles presenting the (shocking) statistics on how many companies have been breached and how many have active malware within the network. A Web search on “percent of companies breached” will return numerous credible results with numbers ranging from around 50% to above 90%.
There is a growing consensus in the information security space that we need to accept the fact that our perimeter is full of holes – that the “bad guys” are already in our networks and are sophisticated enough to avoid detection until after they get what they want. Only when the data exfiltration hits a level that triggers an alarm do we notice what has happened. By then, the bulk of the damage has already been done.
So what is an organization to do?
Everything is not created equal. That is especially true about the data in our environments. Yet, many organizations implement a... read more >
Tips for writing a request for proposal for managed security services
Here at Solutionary, I work on Request for Proposals (RFPs). I respond to hundreds of RFPs that other organizations, who are looking for a Managed Security Services Provider (MSSP), send us. Throughout the past couple of years, I’ve noticed how some proposals are really getting good, concise content back, while others (based on the template they’ve provided us) get a huge document back – which I am sure either takes forever to go through, or they don’t even read.
To avoid sending one of the ‘huge’ RFP templates, and getting back a hundred page document, I’ve provided some tips for RFP writing. The below will not only help organizations looking for a MSSP get a relevant response with good content back, but also makes it so those responding aren’t putting together a needlessly huge document (that no one will read!).
Many organizations... read more >
Why Organizations are Failing to Secure Their Data
Solutionary, as a Managed Security Services Provider (MSSP), not only has insight into the types of events that occur in our clients' environments, but also sees how the CSOs, CISOs, and CIOs responsible for protecting those assets respond. From our unique position, we are able to evaluate what works for different organizations and what doesn’t.
We are able to observe how these leaders approach data and asset protection from a very operational perspective. Seeing these different approaches on a day-to-day basis gives us a unique understanding of what technologies and roadmaps actually work and, just as importantly, which do not.
One consistent observation is clear, “if you do not plan it, it will not happen, or it will not happen with great success.”
What do I mean?
One of the greatest failures we see is that organizations do not realize that securing their data requires both tactical... read more >
In in a recently-released report, a leading technology research and advisory firm recognized Solutionary as a Managed Security Services Provider (MSSP) leader in North America.
Analyst reports like this are extremely useful for enterprises that are considering vendors to provide a service, giving them advice and perspective on a range of potential vendors.
For this research, the firm chose participants based on their ability to deliver enterprise managed security services to clients in North America. Participating companies were evaluated based on 26 criteria grouped into the following three categories:
- Current offering
- Market presence
To learn more about the MSSP market and how Solutionary was evaluated, download the full report... read more >
Security Jobs, MSSPs and the Wisdom of Yoda
A long time ago, in a galaxy far far away… No. Wait. This is not a fairy tale or even a blog about the highly-anticipated new J.J. Abrams Star Wars: Episode VII movie. As much fun as that would be (as I’ve said before, I’m a bit of a Star Wars geek), this is still a blog about information security and an issue impacting many organizations – the information security talent crunch.
If this is not the blog you are looking for, I apologize.
Never Tell Me the Odds: Hiring and Retaining Security Talent
Hiring and retaining information security talent is a serious challenge. There are simply not enough experienced, qualified security practitioners to fill the demand. I was astonished at the number of vendors at a recent security conference with “We're Hiring” signs in their booths.... read more >