Managed security service providers explained

November 2003 Asset Management

A managed security service provider (MSSP) offers outsourced information security to businesses, small and large. The type of services offered by the MSSPs can be clearly split into managed services and monitoring services.

Managed services

Managed services typically involves the comprehensive management of one or more devices (such as firewalls and intrusion detection) within the customer's network. A strict service level agreement (SLA) will determine the interaction with the customer in terms of change control, recommendations, etc. Typically these services include setting up devices, device configuration, updating software and changing rule sets. What managed services should include:

1) Architecture design.

2) System deployment.

3) Configuration management.

4) Software updates.

5) Notification of EOL products.

6) Health and performance monitoring: These services should be offered for firewall, network/host intrusion detection and anti-virus.

Monitored services

Monitored services are more tailored towards offering as close to realtime monitoring and analysis of events as possible. The events in question are generated by devices and can occur at a number of network access points. It may be helpful to compare the monitoring of a network to the way a physical security company monitors a home, in that an event occurs when one of the sensors is breached, setting off an alarm in the control room to which the company then responds.

The monitoring service is controlled with an SLA, having more emphasis on the intelligent analysis of inputs, alerting and escalation. Analysis refers to the identification of an event, subsequent comparison to a known database of events which make up an incident and then the interpretation or categorisation of security incidents or alerts in a specific environment. Reporting of the correlation and trends is included in the monitoring service.

What monitored services should include:

1) Collection of data - this can be in the form of system logs or agent (device) based collection.

2) Aggregation of data - meaning the aggregation of multiple device data into one database.

3) Secure communication - the data sent from the customer site must be encrypted.

4) Correlation - the ability to correlate information from various devices.

5) Analysis - the ability to analyse the data from events to incidents to alerts.

6) Escalation - an ability to produce a trouble ticket in order to escalate events and track progress.

These services should be offered for firewall, network/host intrusion detection and antivirus.

Chris Davis, executive, NamITrust (Enterprise Security Solutions Provider at NamITech)
Chris Davis, executive, NamITrust (Enterprise Security Solutions Provider at NamITech)

For more information contact Chris Davis, NamITrust, 011 458 0081, [email protected], www.namitech.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
250 000 connected vehicles in Africa
Asset Management Transport (Industry) Logistics (Industry) IoT & Automation
Wialon, the global fleet digitalisation platform created by software developer Gurtam, announced it has reached a record number of 250 000 fleet vehicles and assets connected in Africa.

Read more...
Managing stock efficiently and cost-effectively
Editor's Choice Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
AI making South African roads safer
Asset Management Transport (Industry) AI & Data Analytics
Driver fatigue is a significant contributor to road accidents globally. While reliable statistics for South Africa are hard to come by, it has been estimated that fatigue is a factor in 25% - 30% of fatal crashes.

Read more...
Simplified fire and facilities management from one screen
Fire & Instrument Services Facilities & Building Management Fire & Safety Asset Management
Fire & Instrument Services (F&IS) and Scansoft are simplifying the complexities of facilities management, including fire safety, with iBMS Adrenaline, an integrated building and facilities management system enabling companies to monitor, control, and manage system hardware through a single interface.

Read more...
Three-quarters of cars sold in 2023 had embedded telematics
IoT & Automation Asset Management
A new research report from the IoT analyst firm, Berg Insight, shows the number of telematics service subscribers using embedded systems will grow at a compound annual growth rate (CAGR) of 14,6% 2023 to 2028.

Read more...
Vivotek unveils new AI RealSight Engine
AI & Data Analytics Asset Management
Vivotek has announced an upgrade to its AI security solution that transforms images captured by network cameras into clear, visible facial images under any lighting conditions. Even in backlit environments, facial expressions are rendered clearly.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.