{"id":2178,"date":"2007-02-20T00:00:00","date_gmt":"2007-02-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/20\/security-outsourcing-heats-up\/"},"modified":"2021-12-30T11:40:50","modified_gmt":"2021-12-30T11:40:50","slug":"security-outsourcing-heats-up","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/20\/security-outsourcing-heats-up\/","title":{"rendered":"Security Outsourcing Heats Up"},"content":{"rendered":"<p>Has security&#8217;s outsourcing day finally come? Some pretty big names in the industry think so &#8212; and they&#8217;re backing up those claims with money, people, and research.  The Computing Technology Industry Association (CompTIA) &#8212; one of the world&#8217;s largest associations of computing product manufacturers and service providers &#8212; has released the findings of a new study, conducted by Harris Interactive, which suggests security has become one of the key drivers in the managed services market. According to the study, firewall (60 percent) and security (40 percent) services are the two top managed services currently employed by user organizations, and security services (33 percent) are tied with storage and backup services (33 percent) as the top managed services scheduled to be added or upgraded in the coming year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;While there&#8217;s still some skepticism out there &#8212; security was also cited as one of the top three factors keeping companies from engaging a managed service provider &#8212; there are some providers that have reached a kind of &#8216;trusted advisor&#8217; status, and they are being engaged more and more frequently to deliver security services,&#8221; says Richard Rysiewicz, vice president of services at CompTIA.<\/p>\n<p>RSA president Art Coviello announced a few weeks ago that his division will be working with parent company EMC&#8217;s professional services division for risk assessment for enterprises.  And BT, which acquired MSSP Counterpane last year, is quietly making a major push into large, global enterprises, according to security guru Bruce Schneier, CTO of BT Counterpane.<\/p>\n<p>&#8220;It&#8217;s not a choice between doing it in-house and doing it out-of-house.&#8221;  <\/p>\n<p>The trust issue is a plus for Internet Security Systems, the formerly-independent security vendor that now has become IBM&#8217;s arm for delivering managed security services.<\/p>\n<p>Tom Noonan, a founder of ISS who now heads up IBM&#8217;s security efforts, says that rather than serving as an add-on, security is now driving many outsourcing projects.  He says the researchers &#8220;were surprised&#8221; when security showed up in the top three reasons for selecting a supplier, just behind quality of service and price.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=117795&#038;WT.svl=news1_4<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2178","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2178"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2178\/revisions"}],"predecessor-version":[{"id":4665,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2178\/revisions\/4665"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}