Managing security

Escalating threats are forcing companies to look at new ways of fortifying their security capabilities, and in many cases enlisting the help of a third party makes more sense than doing it in-house. There’s also growing confidence that the managed security services business is a legitimate one

But it seems every carrier – Bell, Telus, Allstream, AT&T and Primus – not to mention IT service providers, resellers and integrators, are all offering security as a managed service. For customers, the choices can be confusing, and there’s not a lot of clarity on the definition of managed security services.

Security is a specialized role, traditionally something that organizations have handled internally – in a lot of cases by their network management team.

“Security is a very different animal than managing the network,” said James Quin, senior research analyst at Info-Tech Research Group. “That’s because for the most part network management is about ensuring speed of throughput and easy flow of communications, whereas IT security really is making sure that packets are handled in a safe manner, which slows down connections and limits throughout, so passing the functionality onto the networking group really puts them in a difficult position.”

As a result, security has often come second. But the requirement for security has increased, he said, and dedicated security people are few and far between. They’re difficult to find, hire and retain, and expensive once you’ve got them. Then there’s the cost of infrastructure. Buying security tools can be expensive, particularly when a lot of tools on the market aren’t integrated with one another. That’s why paying a flat monthly fee for security tools and expertise is becoming such an attractive alternative.

Firewall management is a strong candidate for outsourcing, said Quin, because maintaining a rules database can be a complex process – some companies have up to 300 rules in their firewall. But intrusion detection is the primary candidate for outsourcing because it’s exceedingly manpower-intensive. “Someone has to comb through all those alerts,” said Quin. “It’s got to be one of the most boring jobs on the face of the planet, going through a list of 2,000 to 3,000 alerts trying to find one that’s valid.”

One of the primary reasons why organizations keep security in-house, however, has to do with regulatory compliance. “If I’m a Canadian company I have to work under the constraints of PIPEDA,” said Quin. “If I’m using a provider in the U.S., that provider doesn’t necessarily have to conform to PIPEDA regulations.” That means if there’s a security breach that falls under PIPEDA, the service provider may not accept any responsibility for it.

Businesses should be extremely careful when they sign a contract, said Joe Greene, vice-president of IT security research with IDC Canada. “If you completely outsource your security and you get hacked and company secrets or lists of people with their ID are stolen, who would be liable for that kind of thing?” he said. If there’s a huge turnover in staff, for example, or a smaller company is acquired, what happens?

“They should certainly take stock of what they currently have and match that to the threats out there,” he said, “and take stock of their current technical capabilities in terms of security and their current in-house capabilities.”

The difficulty in these relationships often occurs when something goes wrong and both sides end up blaming the other. “You need to find a provider that is accountable and clearly identifies what they are responsible for and what the customer is responsible for,” said Sandra Palumbo, senior analyst of security solutions and services with the Yankee Group.

Know what you are paying for, what is in scope, and have established reporting procedures and service-level agreements. “If you are a control-freak-type organization, managed services may not be for you,” she said. “While you need to keep track of what your provider is doing for you, you don’t want to spend all of your time managing them.”

Typically an organization won’t turn all of its security over to a third party, but aspects of it. Those are typically areas that are either challenging to manage, requiring a lot of time and expertise, said Palumbo, or are not core to the business itself. Managed security service providers can also be used as part of backup or disaster recovery plans.

Small or mid-size businesses often consider managed security as a way to augment their staff with security expertise they would not have otherwise, she added, or look at it as a way to save on management and other costs.

Managed firewalls or IDS systems are already established offerings, but of increasing interest to organizations is managed messaging, said Palumbo, including storage, e-mail cleansing or hygiene and security intelligence services.

It’s not so much an either/or scenario, but a question of where and how a third party can complement or augment your internal competencies, said Jeff Kaplan, managing director of THINKstrategies.

Organizations should make sure the service provider’s approach matches their corporate and cultural environment, he said, because there are varying kinds of businesses with varying security requirements.

Banking or financial services firms, for example, are strict about the way they handle security, whereas other sectors may not have the same kind of security requirements – and therefore don’t have the same constraints.

In some cases, too much security can get in the way of getting work done as opposed to making sure your systems are secure.

“The biggest uncertainty is the financial viability of the [service provider] and the potential they could be acquired by a third party, like IBM’s acquisition of ISS, and what kind of an impact that could have on their operations,” he said.

Make sure you understand who is accountable for what, because in some cases the accountability still rests in your hands, especially in the financial services realm.

“A lot of organizations obviously need to maintain an internal competency in these areas,” said Kaplan, “and it’s important that you don’t relinquish the responsibility entirely, no matter who you are.”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Vawn Himmelsbach
Vawn Himmelsbach
Is a Toronto-based journalist and regular contributor to IT World Canada's publications.

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs