Security
Yes or No? When to outsource security monitoring to a service provide
11/01/2017 | Written by: Think Blog redactie (0cB) and Erno Doorenspleet
Categorized: Security
Share this post:
Blogpost by Erno Doorenspleet, Executive Security Advisor |
Who would not agree that in this day and age security monitoring is a must?
As the market-leading SIEM vendor we have, however, no illusions about the amount of effort required to get a security monitoring platform up and running. Let alone, what it takes to keep it current and useful. Many of our customers lack the time and people needed to reap the benefits from monitoring systems and gain that much-needed visibility into threats. This is often the initial trigger for managed security monitoring.
There are a variety of use cases that make a lot of sense for managed security monitoring. These include device monitoring and alerting, advanced detection and compliance reporting. In some situations, however, it doesn’t work out as well. Networks with highly sensitive intellectual property or without any kind of external access, for example, have little use for managed security monitoring.
Ultimately, the choice to investigate a managed service involves the reality that a service provider may be able to move faster and be more effective than internal resources. The service provider can invest in tools and personnel across many customers; a typical enterprise cannot.
Before you approach a managed security vendor (such as IBM), you may want to learn more about the drivers, use cases and partner selection criteria of managed security monitoring. This concise paper by Securosis, an independent research and analysis firm, will give you a good start.
Download the whitepaper by Securosis on Managed Security Monitoring
What can we learn in the Benelux from the current data breach trends?
Never before was the impact of cybercrime as large as in 2021. The average cost of a data breach, for example, increased by 10 percent compared to last year, according to the 2021 edition of IBM’ s annual Cost of a Data Breach Report. What are the most striking findings in this report? And […]
How Crelan will use AI and machine learning to monitor and detect online fraudulent transactions
How Crelan will use artificial intelligence and machine learning to monitor and detect online fraudulent transactions
Close the gap in the protection of your employees at home and in the office
IBM partners Proofpoint and CrowdStrike integrate best-of-breed e-mail and endpoint security More and more people are working remotely. This results in extra security risks, as also shown from the figures: 92% of all malware on a business network comes in via e-mail. How can you protect your employees against this? Watch the webinar to find […]