When firewalls emerged to protect networks in the early 1990s, outsourcing cyber security to a Managed Security Service Provider (MSSP) wasn’t even a consideration.
However, defending your network from sophisticated cyber attackers today requires a laundry list of appliances and applications, including DDoS protection, intrusion prevention systems (IPS), web application firewalls, data loss prevention, security information and management, deep packet inspection, Wireshark, network analyzers, and more.
With so many requirements just from an appliance perspective, it’s easy for companies to become overwhelmed by their growing cyber security budget. Like many other aspects of your business, outsourcing security might make sense now—but do your research before deciding.
Before diving into the world of MSSPs, check out these pros and cons to see if outsourcing security is right for you.
If you’re already outsourcing functions such as customer support, web design, or manufacturing, the advantages of outsourcing security might seem familiar to you. These are some of the key benefits to having a managed provider take care of your cyber security needs:
While these advantages can be enough to push companies of all sizes to outsource their security, there are still disadvantages to keep in mind.
Before diving into the risks associated with hiring an MSSP, it’s important to understand that MSSPs do not completely eliminate your security costs—for example, you’ll still need an in-house CISO or similar security team member for the MSSP to report to and coordinate with. MSSPs offer security expertise; but they are meant to supplement your own security team, not replace it.
One disadvantage that keeps companies from outsourcing their security functions is the risk of letting someone take care of their sensitive data. For many companies, allowing outsiders to handle customer personal identifiable information (PII) is totally unacceptable. This is why a detailed SLA is essential to an MSSP relationship—so that confidentiality can be maintained and you are protected legally in the case of a data breach.
At least when security is in-house, you can take it on yourself to guarantee customer data protection, which leads to another risk-related MSSP disadvantage—a lack of control. We mentioned the standard security appliances and applications any defense strategy needs; but with an MSSP you don’t have control over the actual cyber security portfolio. While MSSPs are hired for their security expertise, it can still be a daunting task to relinquish all defense responsibilities to an external provider.
To mitigate these disadvantages, do your research before choosing who to outsource with. There are plenty of service providers and each one will approach your network slightly differently—make sure you take the time to ensure SLAs will meet your needs and that you can trust the provider with your sensitive data.
One last thing to remember when choosing your MSSP is that an MSSP might have all of the necessary appliances and applications for security and network monitoring; but without the guaranteed visibility from a network TAP, there’s no way to ensure these solutions are effective.
Ask prospective MSSPs how they handle NGFW/IPS updates, maintenance and trouble-shooting. Only a network TAP will allow for continued network monitoring while performing these tasks.
Looking to add visibility or bypass to your deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.