Access "On The Radar: Preparing for managed security services"
This article is part of the June 2006 issue of Is your data safe from next-generation attackers?
Make sure you have your house in order before calling a managed security service provider for help. I've seen a troubling trend when it comes to security outsourcing: Over-whelmed by a flood of firewall and IDS alerts, companies want a quick fix--they figure they can outsource their security and their problem. Not so fast. Outsourcing certainly can look like the easy answer. Hiring a managed security service provider (MSSP) to monitor your evening and weekend alerts should be simpler and cheaper than having your staff do the job. An MSSP could provide you with a crew of security experts that you can tap for your overall security needs more cheaply than your own hired guns. But to make outsourcing work, you'll need to have your security house in order. Instead of throwing your problems over the fence, you'll have to figure out just how your security program should be running. You'll need a clear picture of the exact state of your system and a solid set of working processes in place. Taking inventory and implementing processes will improve your security ... Access >>>
Premium Content for Free.
Network Access Control: StillSecure's Safe Access 4.1
StillSecure's Safe Access 4.1
Hot Pick: BlueCat Networks' Adonis 1000
BlueCat Networks' Adonis 1000
Today's Attackers Can Find the Needle
EMERGING THREATS From massive botnets to targeted phishing and transacting Trojans, today's new breed of attacker is more dangerous than ever.
Intrusion Prevention: McAfee's IntruShield 3000
McAfee's IntruShield 3000
Unified Threat Management Guide for Managers
A special guide bringing together all types of threat management. Find advice on firewalls, IPS, antivirus, antispam and more.
Extrusion Detection: Security Monitoring for Internal Intrusions
Read a review of the security book Extrusion Detection: Security Monitoring for Internal Intrusions.
- Network Access Control: StillSecure's Safe Access 4.1
This is a definition of biometrics by sister site whatis.com.
Configuration Management: FullArmor's FullArmor PolicyPortal
FullArmor's FullArmor PolicyPortal
Recent releases: Security product briefs, June 2006
Learn about the security products released in June 2006.
Reworking Risk Policy
POLICIES Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync.
Exploring your Endpoint Protection Options
Understand your options for building an endpoint security solution. Get advice on network access control (NAC), Network Access Protection, endpoint security policy definition, enforcement and detection.
- Biometrics by WhatIs.com
Perspectives: Security training must be a visual, interactive experience
Security awareness training exercises must be interactive and visually stimulating, and must help users judge the validity and reliability of websites and web content.
On The Radar: Preparing for managed security services
Editor's Desk: Debating a national data protection law
Wanted: Federal Legislation
Ping: Don Ulsch
- Perspectives: Security training must be a visual, interactive experience
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...