Quick Guide to Managed Computer Security Services
It’s important to make an informed decision when choosing a computer security service for your business. There are SIX basic categories when it comes to managed security service provider, or M-S-S-P.
ONE. On-site consulting. Many M-S-S-Ps provide CUSTOMIZED assistance to pinpoint your network’s vulnerabilities, and will HELP you develop security policies and processes. Consulting can ALSO involve integration of security products, on-site forensics and incident response.
TWO. Remote perimeter management. Your M-S-S-P can install and upgrade your FIREWALL, provide intrusion DETECTION, and handle configuration changes as needed.
THREE. Product resale. Although it’s TECHNICALLY not a service, product resale provides value-added hardware and software for a VARIETY of security-related tasks.
FOUR. Managed security monitoring. This is the FIRST STEP in the incident response process. Most computer security providers will monitor your network daily for threats such malicious hacks, denials of service, and unauthorized behavior.
FIVE. Penetration and vulnerability testing. This includes occasional software scans and hacking attempts designed to reveal VULNERABILITIES in your network.
And SIX. Compliance monitoring. This service measures compliance by monitoring EVENT LOGS to identify system changes that breach security policies. This will prevent ADMINISTRATORS, for example, from granting themselves too much access to the system.