Managed Security Services In The Age of Advanced Threat Intelligence 

In recent years, the Managed Security Services Provider (MSSP) market has developed considerably. In particular, service providers have been increasingly embracing advanced technologies that can triage and reduce alert fatigue, increase accuracy and broaden access to complex automation solutions to smaller organisations that they can’t manage themselves.  
 
This is in contrast to legacy approaches whereby MSSPs focused on staff augmentation for organisations that lacked the skills and people to build their own security teams, even though this didn’t necessarily improve effectiveness and was more akin to expensive outsourcing. Today, however, numerous managed detection and response (MDR) services have come to the market, making advanced detection and response capabilities more widely available. One of the major drivers of this trend is the growing importance of threat intelligence, which enables enterprises to get ahead of attacks and proactively plan ahead instead of merely reacting to alerts and incidents as they unfold.

The problem is, however, that managing and making sense of threat intelligence has proven difficult for many security teams, especially smaller ones. 
 
Indeed, Gartner suggests that there are relatively few organisations out there that have an accurate picture of their own threat landscape, and in particular, security and risk management leaders struggle to understand the threats that represent real concerns for their organisations. 
 
Part of the challenge is that there is now a plethora of threat data available from open-source feeds, commercial providers, industry associations, and internal security processes. This can translate into problems for organisations trying to aggregate, correlate and prioritise potentially huge volumes of information into a single source of truth. 
 
Yet, this is a crucial capability given that threat intelligence depends on communicating the relevant data to the right people at the right time, so they can act upon it swiftly. In some cases, the challenge can overwhelm SMEs and their security teams because it relies on the use of complex technologies that are geared towards large enterprises and their threat intelligence analysts. 

Bridging the Gap: How MSSPs Are Making Threat Intelligence Accessible & Actionable for All   

So, where can organisations turn to deliver on their threat intelligence objectives? One option is the use of Threat Intelligence Platforms (TIPs), which give users the ability to automatically extract relevant indicators from threat feeds, perform enrichment to add contextual information and integrate this insight with existing security controls. The problem here is that many security teams find them too expensive and complex to deploy, while conventional TIPs don’t easily integrate with other SOC orchestration, automation and collaboration tools. 
 
This is where today’s MSSPs can step in to meet this increasingly important need by helping customers manage threat intelligence, sift through the noise and deliver concise, actionable threat alerts.

By leveraging their proven shared resources model, MSSPs are much better placed than individual organisations to invest in scalable TIP platforms, expert analysts and effective collaboration tools to bridge the gap between threat intelligence data and actionable insight. 
 
In practical terms, by offering threat intelligence-as-a-service, MSSPs can meet the needs of organisations looking to detect and mitigate emerging threats, vulnerabilities and indicators of compromise that could put their networks and systems at risk. Moreover, by identifying potential threats and vulnerabilities before they are exploited, customers can significantly reduce the likelihood of serious security incidents and the major costs that can result. 
 
In addition, industry-specific information sharing and analysis centres (ISACs) have an important role to play and, today, operate across a range of sectors, from financial services and energy to healthcare and automotive, among others. ISACs can help aggregate threat intelligence and other security data from multiple sources for their members based on recognised threat level protocol (TLP) classifications. Among the more advanced ISACs, bidirectional sharing is also emerging, allowing members to share real-world intel for the benefit of the entire community. 
 
This hub-and-spoke approach to intelligence-sharing can now also be seen in other contexts, with MSSPs bringing like-minded organisations together across industries as diverse as healthcare, manufacturing supply chains and sport. What they have in common is the need to receive proactive threat intelligence and benefit from a collective defence model. 
 
Ultimately, the goal of threat intelligence is to ensure organisations have the tools to make better and faster decisions based on timely and contextual data.

MSSPs are ideally placed to meet this need, and by making proven technologies and data sources available to a wider market, they can help strengthen cybersecurity protection, safeguard assets and maximise resilience in the ever-evolving cyber risk ecosystem. 

Avkash Kathiriya is Sr. VP - Research and Innovation at Cyware

Image: ThisIsEngineering

You Might Also Read:

Cybersecurity In Managed Cloud: Best Practices For Keeping Your Data Safe:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Top Three Types of Data Security Technology
A Goal Without A Plan Is Just A Wish »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.