Saving MSPs’ time and money

SMART Cybersecurity Handbook 2022 Information Security

Acronis has released research conducted by VansonBourne showing that consolidating and integrating cybersecurity, backup and disaster recovery (DR) services produces US$ 229 159 in savings on average and reduces the time required to recover from a breach or data loss incident by an average of five hours.

In conjunction with ChannelPro Network, the survey of 400 managed service providers across the globe, titled MSPs Speak: Cybersecurity and the future role of the MSP, dives deep into the biggest challenges and opportunities that MSPs (managed service providers) currently face when providing cybersecurity, backup and disaster recovery services. Available as a free download (use the short link www.securitysa.com/*acronis1), the report focuses on critical issues like cybersecurity attacks, ‘vendor sprawl’, remote work environments and the use of SaaS tools by clients.

MSPs feel vulnerable and a lack of trust abounds

Data from the study underscores why MSPs urgently need the efficiency gains vendor consolidation makes possible, beginning with today’s dangerous threat landscape. Given the recent flurry of supply-chain attacks seen in the MSP industry, it is not that surprising to learn 96% of MSPs are concerned about suffering a cybersecurity breach in the next 12 months.

This sense of vulnerability is amplified by a lack of trust in two directions: 49% of MSPs responded that their clients do not completely trust the security of the services their organisation provides, while 53% of MSPs do not completely trust the vendors they use to provide cybersecurity services.

To combat this sense of vulnerability, many MSPs have added additional tools to their technology stack. MSPs use an average number of four vendors to provide cybersecurity, backup and/or DR services, with 30% report using more than five vendors.

The role of SaaS management

MSPs report that their clients use an average of 14 SaaS tools, a finding very consistent with recent Acronis end-user research (short link: www.securitysa.com/*acronis2). However, MSPs also report only managing an average of 58% of their clients’ SaaS tools, with only 3% indicating they manage 100%. This discrepancy results in greater vulnerabilities for clients, because SaaS data is not being properly protected and the MSPs have limited visibility into these environments. However, there is a huge potential for growth for service providers if they are able to prove to their clients that there are benefits to them managing the licences, on-boarding, security and performance of these SaaS applications.

MSPs report that the biggest obstacles to managing more of their clients’ SaaS tools are not having the right relationships with line of business decision makers (44%), not having the right tools (41%) and a lack of trust (39%).

More tools, more problems

Unfortunately, deploying technology tools against a problem does not make it go away. In fact, the resulting ‘tool sprawl’ can and does create a new set of problems. According to the results, the two most commonly faced challenges are the integration of security offerings with existing business and IT systems (40%) and security workflow and process creation and updates (37%).

In addition to integration, training, documentation and workflow challenges created by more tools, there is a glaring cost concern. Over the past two years, the average cost of providing cybersecurity, backup and/or DR services has increased by 19%. However, 71% of MSPs report struggling to demonstrate the value of these cost increases to their clients, which creates a serious dilemma and pressure on profit margins.

Benefits of consolidation and integration

Given the reported tool sprawl among MSPs and corresponding integration, workflow and cost issues, it is not surprising that 92% of MSPs report having consolidated vendors and 70% plan to consolidate further due to the substantial savings they’ve realised from lower licencing costs, training costs and employee documentation costs and the hours of time they save when recovering from incidents.

Further time and money savings can surely be realised, as 41% of MSPs indicate they want to see the automation of backup and recovery tasks more tightly integrated into their cybersecurity services to address the ongoing and pervasive threat of ransomware more adequately.

The results from this research are clear – MSPs are facing numerous challenges in providing cybersecurity services and simply throwing more tools at the problem is making matters worse, not better. As such, there is a trend towards consolidating vendors, as well as more tightly integrating existing vendors with workflows and those MSPs which are successful in these efforts will have a material advantage over their competition.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...