Security management by cloud

July 2016 Editor's Choice

There is no doubt that cloud-based managed security services will be the only way for most enterprises to handle their information security in future.


Paul Williams, major account manager at Fortinet.
Paul Williams, major account manager at Fortinet.

Frost & Sullivan predicted that the market for Managed Security Service Providers (MSSPs) would grow from $6.66 billion in 2011, to $15.63 billion this year, while a new report by Markets and Markets predicts the market size will grow from $35.54 Billion this year to $76.73 Billion by 2021. Infonetics Research says the managed security market will exceed $9 billion by 2017. In EMEA, a 2014 Frost & Sullivan report predicted the MSSP market would grow to $5 billion by 2018. A growing share of this MSSP market is cloud-based, particularly in small to mid-sized enterprises and for non-critical data and systems.

This growing confidence in cloud-based hosted solutions for securing critical enterprise data is a marked change from attitudes just a few years ago, when enterprises feared for the security of any data hosted in the cloud. They expressed concerns about losing control of their data, the implications of hosting it across borders, and accountability for security breaches.

Now, organisations are moving to benefit from cloud-based managed security services in growing numbers, thanks to the cost savings, advanced protection and operational efficiencies they offer. In South Africa, we are seeing steady growth in the number of MSSPs running multi-tenant solutions.

Cloud-based hosted managed security allows even small and mid-sized businesses to benefit from high-level security skills and solutions they would not be able to procure independently. In many cases, the security services are provided by the same service provider supplying other hosted services, simplifying the overall management of the organisation’s systems and applications. Concerns about where data is hosted are falling away as local hosting centres proliferate and organisations become accustomed to regularly using internationally-hosted cloud-based tools.

The benefits are proving to be significant: access to specialised security skills and the latest threat protection, a lower total cost of ownership, less management complexity and greater ease of use. The only potential drawbacks of using a cloud-based MSSP would be the loss of a certain amount of control over the organisation’s data, and the potential for SLAs to inadequately spell out all processes and accountability.

For this reason, it is crucial for in-house IT and risk management to carefully scrutinise the credentials and SLAs presented by MSSPs, addressing questions like guarantees on DDoS protection, risk audits, recovery times and penetration testing procedures. Responsibilities, liabilities and penalties must be clearly spelt out. Organisations must also take responsibility for those components of information security that are out of the hands of the MSSP – including employee risk, mobile risk, unsecured corporate Wi-Fi hot spots, the effective encryption of data in transit and the need to have backups of backups to mitigate the impact of data being wiped.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...