Enterprise strength protection for the SME

January 2012 Information Security

The IT threat landscape is one which is constantly evolving with a multitude of malware that is becoming increasingly intelligent and targeted, and increasingly delivered through ever more diverse channels including search engines and social networking. As cybercrime has become the most profitable criminal empire in the world, these threats are not to be taken lightly, and organisations have a greater need than ever to ensure they are adequately protected.

This, along with an increased trend towards outsourcing of services to expert providers within the IT space, has led to the emergence of managed security service providers (MSSPs), which offer outsourced expertise and infrastructure around security services to deliver enterprise class protection to businesses of all sizes.

MSSPs focus specifically on offering security solutions either using equipment on the customer's premises or by rerouting traffic through centre cloud-based system, ensuring that security solutions are up to date and can provide the necessary levels of protection. This is particularly useful in the small and medium enterprise (SME) space, where security is not necessarily a core capability, but due to the nature of the modern IT environment has become a business necessity.

"Threats today evolve so quickly that if security is not managed by someone who knows the field inside out and keeps up to date, then organisations are left open to severe vulnerabilities. It makes sense then for these organisations to contract in a specialist provider to manage security, who has all of the necessary infrastructure, skills and expertise to keep up with the evolution of threats, which is where MSSPs come into the picture," says Dominique Honnay, director of Emerging Markets and EMEA Distribution at SonicWALL.

This managed services model has a number of benefits, not least of which is access to specialist skills at a cost effective price that suits the budgets of SME organisation. Contracting an expert MSSP also ensures that security solutions remain up to date, with the latest spyware, virus and malware definition, and are able to counter the constantly evolving nature of threats that present themselves to organisations. It also allows organisations with limited cash flow to choose between running security as an operational expense or a capital expense depending on budgets, and since MSSP is in essence an outsourced service allows customers to incorporate security as a monthly fee rather than a large annual expense.

"While this type of service is beginning to emerge in South Africa, it is currently fairly basic, and mainly offered by integrators or resellers of connectivity and not at the service provider level itself," says Martin Tassev, managing director of Loophold Security Distribution. "This follows the trend that emerged in Europe and the USA, where these services began in the same way and only in the last few have years moved to large regional (formerly national) telco's and service providers."

When looking for a MSSP, there are several key factors that need to be considered. Flexibility with licensing and billing is very important so that service providers can tailor this to meet the needs of the customer, and scalability is a must in order to meet the needs of organisations of all sizes on the same platform.

"Central management should also be a feature, but these tools need to be flexible and able to integrate into existing management platforms to deliver seamless integration of the security solution into existing environments so that this additional layer can be easily accommodated. Reporting is also a vital component of a managed service, since it is the only tangible aspect of the service that the customer will have and is a way of showing the value derived from the service," says Honnay.

"Reports provide a graphic overview of data including the threats blocked, bandwidth used and websites frequented by users, as an example, and the information derived from these reports can be used to discover correlations between events such as websites visited and increased threats or increased bandwidth usage, which enables more intelligent network and connectivity cost management," Tassev adds.

MSSP at its heart should be about providing innovative technology that meets the needs of customers today and in the future through delivery methods that suit their business and budgets. By incorporating intelligent reporting on aspects such as bandwidth usage, organisations are empowered to drill down per user, per application and so on to prioritise bandwidth and ensure that existing resources are used effectively. Using MSSP, not only can SMEs in particular access enterprise class security for up to date protection, resources can also be optimised for improved efficiency across the network.

Martin Tassev
Martin Tassev

For more information contact Martin Tassev, Loophold Security Distribution, +27 (0)11 575 0004, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.