Managed Security Services In The Age of Advanced Threat Intelligence 

In recent years, the Managed Security Services Provider (MSSP) market has developed considerably. In particular, service providers have been increasingly embracing advanced technologies that can triage and reduce alert fatigue, increase accuracy and broaden access to complex automation solutions to smaller organisations that they can’t manage themselves.  
 
This is in contrast to legacy approaches whereby MSSPs focused on staff augmentation for organisations that lacked the skills and people to build their own security teams, even though this didn’t necessarily improve effectiveness and was more akin to expensive outsourcing. Today, however, numerous managed detection and response (MDR) services have come to the market, making advanced detection and response capabilities more widely available. One of the major drivers of this trend is the growing importance of threat intelligence, which enables enterprises to get ahead of attacks and proactively plan ahead instead of merely reacting to alerts and incidents as they unfold.

The problem is, however, that managing and making sense of threat intelligence has proven difficult for many security teams, especially smaller ones. 
 
Indeed, Gartner suggests that there are relatively few organisations out there that have an accurate picture of their own threat landscape, and in particular, security and risk management leaders struggle to understand the threats that represent real concerns for their organisations. 
 
Part of the challenge is that there is now a plethora of threat data available from open-source feeds, commercial providers, industry associations, and internal security processes. This can translate into problems for organisations trying to aggregate, correlate and prioritise potentially huge volumes of information into a single source of truth. 
 
Yet, this is a crucial capability given that threat intelligence depends on communicating the relevant data to the right people at the right time, so they can act upon it swiftly. In some cases, the challenge can overwhelm SMEs and their security teams because it relies on the use of complex technologies that are geared towards large enterprises and their threat intelligence analysts. 

Bridging the Gap: How MSSPs Are Making Threat Intelligence Accessible & Actionable for All   

So, where can organisations turn to deliver on their threat intelligence objectives? One option is the use of Threat Intelligence Platforms (TIPs), which give users the ability to automatically extract relevant indicators from threat feeds, perform enrichment to add contextual information and integrate this insight with existing security controls. The problem here is that many security teams find them too expensive and complex to deploy, while conventional TIPs don’t easily integrate with other SOC orchestration, automation and collaboration tools. 
 
This is where today’s MSSPs can step in to meet this increasingly important need by helping customers manage threat intelligence, sift through the noise and deliver concise, actionable threat alerts.

By leveraging their proven shared resources model, MSSPs are much better placed than individual organisations to invest in scalable TIP platforms, expert analysts and effective collaboration tools to bridge the gap between threat intelligence data and actionable insight. 
 
In practical terms, by offering threat intelligence-as-a-service, MSSPs can meet the needs of organisations looking to detect and mitigate emerging threats, vulnerabilities and indicators of compromise that could put their networks and systems at risk. Moreover, by identifying potential threats and vulnerabilities before they are exploited, customers can significantly reduce the likelihood of serious security incidents and the major costs that can result. 
 
In addition, industry-specific information sharing and analysis centres (ISACs) have an important role to play and, today, operate across a range of sectors, from financial services and energy to healthcare and automotive, among others. ISACs can help aggregate threat intelligence and other security data from multiple sources for their members based on recognised threat level protocol (TLP) classifications. Among the more advanced ISACs, bidirectional sharing is also emerging, allowing members to share real-world intel for the benefit of the entire community. 
 
This hub-and-spoke approach to intelligence-sharing can now also be seen in other contexts, with MSSPs bringing like-minded organisations together across industries as diverse as healthcare, manufacturing supply chains and sport. What they have in common is the need to receive proactive threat intelligence and benefit from a collective defence model. 
 
Ultimately, the goal of threat intelligence is to ensure organisations have the tools to make better and faster decisions based on timely and contextual data.

MSSPs are ideally placed to meet this need, and by making proven technologies and data sources available to a wider market, they can help strengthen cybersecurity protection, safeguard assets and maximise resilience in the ever-evolving cyber risk ecosystem. 

Avkash Kathiriya is Sr. VP - Research and Innovation at Cyware

Image: ThisIsEngineering

You Might Also Read:

Cybersecurity In Managed Cloud: Best Practices For Keeping Your Data Safe:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Top Three Types of Data Security Technology
A Goal Without A Plan Is Just A Wish »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards has been started with a great vision to safeguard India from the current threats in the cyber space.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.