Content

Technology Guide: What MSSPs Should Look for Now and Next

Share
Close up of Asian women with hi tech digital technology screen over the eye.

MSSPs have their work cut out for them. Demand is up. Infrastructures are increasingly complex, and cyberattacks are growing in frequency and sophistication. Like all service providers, MSSPs have to keep an eye on their margins and make technology investments that deliver fast ROI as well as continued value over the long term.

Far more enterprises – of all sizes – are outsourcing to MSSPs, according to the 2022 Cyberthreat Defense Report from CyberEdge Group. The report hypothesizes that the increase “is partly attributable to the fact that operations entails very labor-intensive activities... MSSPs have achieved a high level of automation of these tasks, so they can provide these services very economically to their clients.”

To make the economics work you need to constantly improve your levels of automation while continuing to provide high-value services to your customers. Otherwise, you’re caught in a vicious, margin-busting cycle.

Given where you are today: What should you implement now or soon? And what should you be keeping your eye on for the future to ensure ongoing resilience, relevance, and margins?

We’ve worked with a lot of MSSPs for years, and they’ve shared with us that their biggest problems today include:

  1. Too many siloed tools. They juggle too many low-level tools that don’t talk to each other. Each tool may do what it does well, but there’s a cost to integrating technologies, managing vendors, and finding employees with the right expertise to run them. Each new tool introduces new benefits but also new risks.
  2. Data ingestion and storage is expensive. Maintaining security requires data, and it’s expensive. You need a lot of data so you can determine when and if something could be going wrong that indicates an attack or breach. You want to collect all that data and sift through it, but ingestion and anything close to real-time analysis is expensive – often prohibitively so.
  3. It’s hard to get and keep talent. Well-trained security analysts who understand your tools and environments aren’t easy to find or to keep – and they’re expensive.
  4. Mapping threats against assets is hard. It’s harder to know where to focus when you don’t have asset information integrated with your security data. Maintaining asset data is extremely challenging in a world where assets come on and offline frequently.
  5. Far too many alerts and false positives. You need to find signals in the noise, but when your tools are low level, you won’t see patterns above them. When you don’t have the data you need to find patterns – in real time and over time – you’ll miss trends.

Here’s what to look for in new technologies that can address each of these five issues.

1. Too many siloed tools

If you already have or anticipate this challenge of too many siloed tools, look for solutions that leverage your current investments and that integrate into a multi-tool world.

As Gartner, Inc. points out, “leaders must integrate security tools into a cooperative ecosystem” in a way that’s “composable and scalable.” They call this approach cybersecurity mesh architecture (CSMA).

“By 2024, organizations adopting a cybersecurity mesh architecture will reduce the financial impact of security incidents by an average of 90%,” Gartner reported.

Advantages of a cybersecurity mesh architecture include flexibility, adaptability, and continuous improvement. There is no one product that provides it – it’s an architecture, after all. But some technologies are better suited to an open, agile architecture approach than others.

There’s another major issue: Too many siloed and low-level tools can inhibit your ability to perform behavioral detection analytics. Behavioral analytics identify potentially malicious activity within a system or network that may not rely on prior knowledge of adversary tools and indicators. It is a way of leveraging how an adversary interacts with a specific platform to identify and link together suspicious activity that is agnostic or independent of specific tools that may be used. You can use the MITRE ATT&CK framework to construct and test behavioral analytics to detect adversarial behavior.

Look for technologies that offer:

  • Support for Cybersecurity Mesh Architecture.
  • Secure APIs as well as prebuilt integrations.
  • Scalability, ideally through native cloud platforms.
  • Behavioral detection analytics.
  • Mapping to a framework like MITRE ATT&CK.

2. Data ingestion and storage is expensive

Actually, data ingestion and storage no longer has to be expensive. There are new options out there well worth your consideration. Look for data ingestion and storage technologies that offer:

  • Ability to scale to capture the amount of data you need for your customers now and in the near future – even if you “open the aperture” and filter less.
  • Fast search speed for your current and near-term data volumes.
  • Real-time (or close) data analytics.
  • Ability to use your current security telemetry sources.
  • Ability to ingest data from all sources: on premise, cloud, etc.
  • Pricing that doesn’t penalize you for collecting more data.

3. It’s hard to get and keep talent

Getting and keeping talent is an ongoing and growing problem. Many employees are burned out from the grind. Automation can relieve your people of tedious L1 and L2 tasks. Technology products that use data analytics and machine learning can provide extensive context, identify trends and anomalies, add data enrichment, and other functions that speed resolution while reducing tedium.

Use technology to dramatically improve how you run security ops, not just to automate current processes to make them more efficient. For example, look beyond threat detection and response to proactive “peacetime” activities that shore up resiliency in advance of attacks.

Consider effectiveness as opposed to “efficiency” against specific metrics that the new technology may make obsolete. For example, enabling your team to manage more customers is a better metric than the number of tickets that they can close. (After all, the technology may also cause more tickets to be generated.)

If you have a good team, help them be happy and highly productive. Look for technologies that:

  • Enable your current team to be more effective, not only through automation but also through data analytics, machine learning, etc.
  • Support proactive “peacetime” activities that shore up resiliency in advance of attacks.
  • Don’t require that you hire more experts.
  • Reduce burnout and that your team is excited to use.

4. Mapping threats against assets is hard

When there are too many alerts, it’s impossible to know where to focus. Is an attack is targeting a high-value business resource or an isolated asset without significant data? That depends on knowing about the assets. But maintaining asset data is extremely challenging when assets come on and offline frequently.

So look for technologies that offer:

  • Automatic asset discovery and the ability to tag assets depending on their business importance.
  • Ability to map known threats against any customer’s assets to see where they may not have sufficient log coverage for early detection.

5. Far too many alerts and false positives

More tools provide more data but produce even more noise, hiding important events in plain sight. It’s an area ripe for data analytics, machine learning, and improved automation.

The goal is to make your people more effective, not more efficient at closing tickets for false positives.

Look for technology that provides realistic ways of reducing false positives while enhancing important signals – fast.

Think about the types of signals you need to detect:

  • Across the entire infrastructure to find more complicated patterns of attack.
  • Across time to find trends going back months or longer.

Think about how signals need to be enhanced:

  • Correlating related alerts from various sources with tickets, users, and asset.
  • Prioritizing and scoring to assess which signals should be addressed first for maximum effectiveness.

Conclusion - It’s all about security – and margins: To maintain your business and your margins, you continuously evaluate the technologies that enable your teams to ensure your customers’ security. At the same time, you can’t maintain margins with a more-tools-more-people approach. So choose your tech wisely.

Try Resolution Intelligence Cloud from Netenrich

If any of the challenges discussed in this guide resonate, we have a solution: Resolution Intelligence Cloud is purpose-built for MSSPs, MSPs, and enterprises using a service-provider model.

Resolution Intelligence takes a holistic, operations-based approach to dramatically improving how you run security so that you’re more effective with the people and tools you have. Contact us to learn how Resolution Intelligence cloud improves threat detection and security operations by:

  • Bridging silos between tools while leveraging your tools investment.
  • Providing a low-cost, no-penalty ingestion and data storage (hot data for 1+ year).
  • Enabling your teams to be dramatically more effective with far less tedium.
  • Automatically discovering assets, enabling you to identify which are business critical, and using that information to identify where security analysts need to focus.
  • Identifying patterns and correlating events from different sources to cut down the noise of false positives while enhancing the signals of real issues.

To learn more and get a demo, visit www.netenrich.com.


Guest blog courtesy of Netenrich. See more Netenrich guest blogs here. Regularly contributed guest blogs are part of MSSP Alert’s sponsorship program.