Access "Outsourcing security services in the enterprise: Where to begin"
This article is part of the March 2013/ Volume 15 / No. 2 issue of Outsourcing security services
Enterprises across a wide variety of industries are turning to cloud computing to reduce the burden on their IT support staff, decrease costs and provide services that would otherwise be out of reach. As organizations evaluate the best options for cloudsourcing, attention is naturally turning to information security services because of the high cost of maintaining the hardware, software and staff required to provide these services on-site. However, the options for outsourcing security services are numerous, and not without risk. Fortunately, not every organization’s solution to security outsourcing has to be found in the public cloud. In this article, we look at the managed security service provider (MSSP) landscape and discuss the use of MSSPs for vulnerability management, security incident and event management (SIEM), intrusion detection, virtual private networking (VPN) and more. We also offer advice on how to manage an MSSP relationship to reduce risk. The Benefits and Risks of Outsourcing Security Services The adoption of managed security services is ... Access >>>
Premium Content for Free.
Outsourcing security services in the enterprise: Where to begin
by Mike Chapple, Enterprise Compliance
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services.
Managing big data privacy concerns: Tactics for proactive enterprises
by Lynn Goodendorf, Contributor
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help enterprises get smarter while keeping consumers happy.
- Outsourcing security services in the enterprise: Where to begin by Mike Chapple, Enterprise Compliance
Antivirus evasion techniques show ease in avoiding antivirus detection
by Joe Granneman, Contributor
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed.
- Antivirus evasion techniques show ease in avoiding antivirus detection by Joe Granneman, Contributor
Big data creates cloudy security forecast
by Robert Richardson
Security in the cloud has come a long way and it’s now possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud.
Well-rounded information security education benefits IT professionals
by Doug Jacobson and Julie A. Rursch
A security-savvy IT staff can help reduce risk. Learn about information security training and education options for IT professionals.
Marcus Ranum: Cloud service-level agreements
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with Randy Sabett, counsel at ZwillGen PLLC and formerly with the National Security Agency to discuss cloud SLAs.
- Big data creates cloudy security forecast by Robert Richardson
More Premium Content Accessible For Free
Unified threat management aspires to the enterprise class
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...