Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Outsourcing Security Doesn't Mean You're Desperate


WHO TO CALL?

Self Protection
Before handing your security over to an outsourcer:
>> Inventory your databases, networks, and systems
>> Check the background and financial stability of the provider
>> Outline regulatory compliance needs and how they'll be met
>> Define all interfaces the provider will use to access data on your network
Perimeter and Symantec are among the dozens of companies that offer services for keeping out malicious e-mail, blocking network-borne viruses, and automatically patching software as vulnerabili- ties are fixed. In recent years, a number of smaller service providers have been absorbed by larger service providers looking to add security offerings. Symantec spent $145 million in 2002 on Riptech, a provider of outsourced network-monitoring services run by Amit Yoran, who went on to become director of the National Cyber Security Division of the Department of Homeland Security.

VeriSign bought Guardent in 2003 for $140 million, and BT Group earlier this year acquired Counterpane Internet Security, founded by IT security luminary Bruce Schneier. Other security vendors have merged, including SecureWorks with Lurqh in September (keeping the name SecureWorks), and TruSecure with Betrusted in 2004 to form Cybertrust.

SecureWorks' customer Digital Federal Credit Union isn't likely to outsource the maintenance and management of its core IT infrastructure for loans and deposits anytime soon, but the not-for-profit financial cooperative formed in 1979 as part of Digital Equipment Corp. knows its limitations when it comes to security. "We're a financial services company, we're not security experts," says VP of IS Kris VanBeek. Digital Federal serves more than 300,000 members at 1,000 companies.

Digital Federal has SecureWorks perform security assessments on the products and services it develops for the Web. "SecureWorks is able to keep up with the latest; we don't have anyone on staff who can do that," says David DeWitt, the credit union's IS risk manager.

"We're looking at SecureWorks in place of hiring a whole department to do this full time," says VanBeek, who estimates it costs about half as much to outsource as it would to hire a security staff and buy the necessary technology.

25%
The portion of U.S. companies outsourcing security functions
Data: InformationWeek/Accenture Global Information Security survey of 966 U.S. business technology and security pros
Before opting to outsource any aspect of its security, a company needs to be able to clearly define all interfaces into its data and how the service provider will access that data. Security services, like any other, must be managed, and that typically costs about 10% of the services contract when you factor in the time and effort of your IT staff to do it, says Paul Simmonds, global information security director of Imperial Chemical Industries Group, which develops and sells paints, foods, fragrances, and personal care products.

ICI Group has relied on Qualys for the past four years to scan every IP address ICI owns or has data on for signs of trouble. Before hiring Qualys, ICI didn't have a regular or repeatable process for detecting viruses or other problems with its IT systems. When Simmonds joined in 2001, "we ran a penetration test and actually defaced the ICI Web site in under a half hour," he says.

Qualys manages all of the devices used to protect ICI's systems and provides the company's security staff with a Web-based interface for checking the information collected. This approach lets ICI avoid investing in security hardware and software. If Qualys went bust, "the only thing we'd have committed to was their services. This is difficult work," Simmonds says, so the decision to outsource was easy.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.