Managed security service providers (MSSPs) are IT service businesses that specialize in providing security-as-a-services offerings for their customers. While MSPs (managed services providers) have been around for 20+ years, MSSP practices have only begun to crop up and gain momentum in more recent years.
MSSPs function similarly to MSPs (Managed Service Providers), but are primarily focused on security, while MSPs provide a broader range of IT services and are generally less focused and less specialized with regards to cybersecurity. Additionally, while MSPs frequently establish their own network operation center (NOC) from which they monitor and administrate over customer operations, MSSPs on typically establish one (or more) security operations center (SOC), which is responsible for protecting the infrastructure (networks, applications, databases, servers, etc.).
An MSSP can help its customer(s):
Scale up security
Layer on needed expertise where there is an internal IT skills gap
Understand the best solutions in the market
Apply their know-how of having tackled similar challenges for diverse client environments
Increase visibility into threats while expediting a security response (by having visibility into threats across multiple customers, an attack on one customer can allow MSSP adapt security to better protect its other customers)
An MSSP can take over security, step in to fill in-house skills and resources gaps, or provide back-up as needed.
Typical MSSP technology offerings may include deploying, configuring, and/or managing the following technologies:
Intrusion prevention systems (IPS)
Web content filtering
Identity access management (IAM)
Privileged access management (PAM)
Firewalls (UTMs, NGFWs, etc.)
Data loss prevention (DLP)
An MSSP may offer a broad, generalized suite of security capabilities and services, or it may specialize in one or a few core focus areas, such as IAM or privilege management. MSSP services may include:
Risk assessments and gap analysis
Policy development and risk management
Solution/tool research and requisition
Management of security systems
Reporting, auditing, and compliance
Training and education