Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: MSS
You are here: Home \ MSS \ Page 2
vulnerability assessments vs vulberability management
Posted on Monday, February 19th, 2018 by
The terms vulnerability scans, vulnerability assessments and vulnerability management are often mixed up and still cause confusion on many accounts. To make sure that your organization can focus on the most effective tactics when it becomes to dealing with vulnerabilities, we’ve explained the main differences between vulnerability assessments and vulnerability management once and for all.

Topics: Managed Security Services, MSS, Vulnerability Assessment, Vulnerability Management

ATM
Posted on Wednesday, December 27th, 2017 by
Securing ATMs and other payment channels is no longer a choice but a necessity to avoid serious financial and reputational damage.

Topics: Managed Security Services, MSS, SIEM

5 Ways an MSSP Can Save You Money
Posted on Thursday, November 16th, 2017 by
Understanding the cost savings an MSSP (Managed Security Service Provider) provides is critical for companies in our increasingly digital age.

Topics: Managed Security Services, MSS

benefits of managed security service provider
Posted on Wednesday, November 8th, 2017 by
Executives have become overwhelmed with the threat of a breach, compliance, exploding security budgets and frankly, not understanding what information security really is and how it is best managed. A solution that organizations are increasingly touting is partnering with a managed security services provider (MSSP) to empower their security organizations with the people, processes and technology to secure their critical assets and data.

Topics: Managed Security Services, MSS

Posted on Thursday, October 26th, 2017 by
One way for businesses to respond to the latest threats is through the services provided by managed security service providers at a fraction of the cost of a similar capability built in-house...

Topics: Managed Security Services, MSS

6 Questions You Have to Ask When Building Your Own Security Operations Center
Posted on Thursday, February 9th, 2017 by
Building a SOC is not to be taken lightly, and presents a myriad of challenges. To help you get a head start in your planning and decision making process, we’ve gathered a list of six questions you should ask yourself.

Topics: MSS, Security Operations Center, Security Practices

Building a Security Operations Center
Posted on Thursday, November 10th, 2016 by
We rely on connectivity for nearly all aspects of business which puts companies at risk to a multitude of hacks such as malware, phishing, ransomware, and denial-of-service attacks. It is more important than ever for organizations to escalate their level of protection against cyber-attacks. Fortifying your organization’s security posture has become one of the top priorities for businesses across all industries. Building a Security Operations Center or SOC in order to centralize defenses, coordinate and deploy people, processes and technology is a growing part of the strategy of information security leaders in even small and medium-sized businesses.

Topics: MSS, Security Operations Center, Security Practices

building trust relationship with mssp
Posted on Tuesday, March 8th, 2016 by
When it comes to trusting your MSSP, it’s quite a big deal. You are basically inviting a third party to get under your kimono. For a threat monitoring service to be effective, the service provider needs to have access to all network traffic and to have the ability to perform deep packet analysis in many cases to determine if there is a real evolving threat or not. That begs the question: what can your service provider see or not see?

Topics: Managed Security Services, MSS, Security Practices

Build an IT Dream Team or Outsource
Posted on Tuesday, January 12th, 2016 by
This is not an easy question to answer and one that many CISOs, CIOs and CSOs struggle with.

Topics: CISO, MSS, Security Operations Center, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now