Keeping a business network secure is a constant struggle for today’s IT staff. Protecting your company’s valuable information against constantly evolving malware, identity theft, hacktivism, state sponsored hacking, etc. is a full time job. In fact, the Identity Theft Resource Center received reports of 419 security breaches in 2011 that exposed more than 22 million records. Symantec’s 2011 Internet Security Threat Report estimates a 93 percent increase in Web attacks from 2010. Recently, LinkedIn.com and eHarmony.com made news when they both reported that user passwords had been leaked and decrypted.
It can be difficult for a managed service or IT solutions provider to keep track of network security for all of their customers. It is not enough to simply install a firewall at the network edge and make sure anti-virus software is uploaded on every computer. PCs, tablets, switches, routers and firewalls all need to be constantly updated and monitored to guard against network threats. Solution providers that excel at keeping up with threats can set themselves apart from the competition and also (and perhaps more importantly) keep a customer’s trust.
But updating PCs, tablets, servers, etc. with security updates and service packs from the manufacturer is only a piece of the puzzle. Third-party software such as Java, Adobe products and browsers are often gateways for malware. The manufacturers of those products publish updates and patches regularly, though users seldom install those updates on their own. Using a remote monitoring and management (RMM) tool that includes the ability for both operating system and third-party patching makes this process easy for a solution provider to update all software on an endpoint for its entire customer base. RMM tools can also monitor and update anti-malware programs.
It is important to have the most up-to-date version of your chosen anti-malware solution. Not just the latest signature files or service pack, but the latest full release, fully updated. Having this latest version could mean the difference between staying in front of network security threats and spending time clearing viruses, rootkits or malware and explaining downtime to customers.
Firewalls, routers, managed switches and wireless access points need management as well. Just as RMM tools are available to manage PCs, servers, etc. at multiple sites, companies that make network infrastructure devices also have programs to monitor and manage their devices at multiple sites. Juniper’s Care Plus and Cisco’s Smart Care are two examples. Those initiatives help solution providers ensure all of their customer networks are healthy, offer access to vendor technical support and also provide reporting on a scheduled basis.
Managing and monitoring customer networks through a set of tools that let solution providers see all networks at once is a good start. The next step should be to test the theory that the customer network is secure. Such testing would come in the form of penetration testing and, if the customer takes payments via credit card, PCI Compliance testing. Plenty of tools are available so solution providers can do the testing on their own.
However, in this case, it may benefit the solutions provider and their customer more to outsource this testing to a third party. That allows the solutions provider to ensure their customer that others have certified that the network is secure. The third party penetration testing and PCI compliance testing can be scheduled at regular intervals, and the solution provider can then use the reports generated to remediate security issues and ensure that all of their work has been fruitful.
Operating system and software patching, using the most up-to-date anti-malware programs, keeping the network infrastructure healthy and current, and performing regular security testing will go a long way toward ensuring a solutions provider’s customer networks are secure against evolving network threats. And keeping the customer network healthy and secure can help keep that customer’s trust and business.
- The Massive SaaS Opportunities For VARs
- A Reseller's Guide: Recipe For Channel Partnership Success
- Cloud Connection: Seven Steps To Effective Public Cloud Services
- From CapEx To OpEx: Channel Strategy In The Federal Push To The Cloud
- A Reseller's Guide: Coming Out On Top In The Face Of Channel Conflict
- How To Create A Case For Disaster Recovery Plan
- How To Offset Your Customers' BYOD Risks
- How To Ease Client Anxiety About Private Cloud Deployments
- How An SMB Cloud Provider Can Create 'Swagger' In A Competitive Market
- A Reseller's Guide: Creating A Successful Solution Provider Event
- How to Prepare for the Future of the IT Solutions Industry
- How to Consolidate Data Protection Services for Greater Customer Value
- 10 Attributes to Support Revenue Marketing and Sales Success.
- How To Improve Efficiency: Upgrade Mountain Lion and iOS6
- How To Cash In On the Cloud Through Collaboration
- How To Sell Cloud Storage In Five Steps
- How To Protect High-Value Data Assets
- Moving Data to the Cloud: Options for SMBs and Small Enterprises
- How To Apply Big Data Security Analytics to Detect Advanced Threats and Breaches
- How To Get Customers To Invest In New Technology Through Leasing