Key considerations for a secure and effective MSSP partnership

January 2024 Information Security


Martin Luphai.

he global managed security services provider (MSSP) market was valued at more than $31 billion in 2023 and is anticipated to reach an impressive $64,73 million by 2026. However, despite its solid performance and proven capabilities, the MSSP model can fail. It can become the victim of its own hype, but it has the potential to revolutionise how an organisation approaches, manages and spends on security. The solution is to ensure that an MSSP is the best fit for the company, not just a solution slotted into a problem.

The answer is to ensure that the scope of service fits the MSSP bill. If an organisation already has an existing IT workforce and resources within the company, an MSSP approach may not be the ideal fit, unless the goal is to bolster existing security services and visibility. However, if an organisation does not have a cybersecurity programme or enough IT staff to ensure robust security, then an MSSP is the right step forward.

Deciding the fit lies in the hands of the organisation. If you are confident your staff can handle the work, then an MSSP can guide the direction of your investments and security management, helping you refine your approaches. If not, an MSSP can guide you in the right direction and take on the overall refinement and configuration of the business security ecosystem to ensure it is aligned with best practices and the highest possible standards.

Of course, determining whether or not an MSSP is the right route also comes down to capabilities. Will managing the volume of products be possible for the existing IT workforce? Are they on top of their attack surface area? What are the current security outcomes? If these remain uncertain or the business is falling behind, then finding an MSSP will fit the business and its needs.

That said, the real journey begins once the business has engaged an MSSP. The scope of responsibilities is twofold – how the organisation approaches and manages security from within, and the deliverables promised by the MSSP itself. If there is not a trusted partnership, there is a very real risk of failure. The reality is that security is a shared responsibility. The organisation has to manage its data, the platform, the applications, identities and access management, while the MSSP is responsible for encryption, network and traffic protection, operating systems, networking and firewalls. These responsibilities can shift from one side to the other, depending on the organisation's resources. For example, identity and access management can move from a business responsibility to that of the MSSP.

Taking this relationship further, it is also important to measure the effectiveness of your MSSP consistently. You can use benchmarking tools to assess your MSSP's performance, including competencies, credentials, service offerings, and demonstrable inheritable controls. The latter are key as they demonstrate how competent or safe you are when engaging with your MSSP, and the level of control your provider will have over your production environment. You need to avoid being locked in with a proprietary MSSP and ensure that they have the relevant experience for your particular niche, sector and business. For example, if you are looking at endpoint protection, then you want an MSSP that has many years of experience in this space and the relevance of the experience.

Finally, it is important to ensure that your MSSP prioritises compliance. Where are they storing the data? What are the controls when accessing the data? It is absolutely essential your MSSP aligns with regulations such as GDPR and PoPIA, so you are not held liable for compliance complexities. In the partnership between yourself and your MSSP, you need to both traverse the regulatory landscape with complete visibility and a shared focus on remaining compliant across all touchpoints.

These are just some of the key steps to ensuring that your move towards an MSSP is one guided by shared goals, visibility, proven expertise, relevant capabilities and a realistic view of service delivery. They also ensure that if you opt into an MSSP relationship, it delivers success, not disappointment.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.