{"id":7334,"date":"2023-08-22T17:30:00","date_gmt":"2023-08-22T17:30:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/10\/02\/managed-security-service-providers-mssps-making-it-security-easier\/"},"modified":"2023-09-28T00:01:32","modified_gmt":"2023-09-28T00:01:32","slug":"what-is-a-managed-security-service-provider","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/","title":{"rendered":"What is a Managed Security Service Provider? MSSPs Explained"},"content":{"rendered":"\n<p>Cybersecurity can be difficult to implement, and to make matters worse, the security professionals needed to do it right are in short supply. Managed IT security service providers (MSSPs) make life easier for organizations by providing outsourced expertise and tools at a fraction of the cost, time, and trouble of doing it yourself.<\/p>\n\n\n\n<p>This article will explore the nature of MSSPs and how they can help businesses, nonprofits, governments, and other organizations have better security with less effort.<\/p>\n\n\n\n<p><strong>Jump ahead to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#importance\">Why Businesses Need Managed Security Services<\/a><\/li>\n\n\n\n<li><a href=\"#mechanics\">How MSSPs work<\/a><\/li>\n\n\n\n<li><a href=\"#vs-msps\">MSSPs vs MSPs<\/a><\/li>\n\n\n\n<li><a href=\"#pros\">8 Benefits of MSSPs<\/a><\/li>\n\n\n\n<li><a href=\"#history\">History of MSSPs<\/a><\/li>\n\n\n\n<li><a href=\"#top-providers\">3 Top Managed Security Service Providers<\/a><\/li>\n\n\n\n<li><a href=\"#bottom-line\">Bottom Line: MSSPs Help Clients Avoid Costly Breaches<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"importance\">Why Businesses Need Managed IT Security Services<\/h2>\n\n\n\n<p>Different companies develop IT management software, security tools, cloud infrastructure, and physical hardware, which makes it increasingly difficult to create a seamless security strategy. Organizations typically decide to outsource cybersecurity for a number of reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>IT talent shortages<\/strong> make it difficult to hire and retain experienced cybersecurity professionals.<\/li>\n\n\n\n<li><strong>Cyberattack sophistication and speed<\/strong> continues to increase, which puts additional pressure to detect and mitigate attacks earlier.<\/li>\n\n\n\n<li><strong>Cybersecurity tool costs<\/strong> continue to increase and often require advanced training or cybersecurity experience.<\/li>\n\n\n\n<li><strong>Expanding attack surfaces<\/strong> require additional skills to secure, maintain, and monitor an ever-expanding environment of assets such as mobile, cloud, and the internet of things (IoT).<\/li>\n\n\n\n<li><strong>Poor integration<\/strong> of cybersecurity tools and IT infrastructure requires greater expertise to identify and close gaps in layers of security.<\/li>\n\n\n\n<li><strong>Expanding compliance requirements<\/strong> and the growing number of regulations make it increasingly difficult for organizations to keep up.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Managed Security Service Provider (MSSP)?<\/h2>\n\n\n\n<p>MSSPs are a subcategory of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-managed-service-provider\/\">managed IT Service providers<\/a> (MSPs) that specialize in the consultation, installation, configuration, monitoring, maintenance, and utilization of cybersecurity tools and techniques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"history\">History of MSSPs<\/h3>\n\n\n\n<p>As internet service providers (ISPs) and telecommunications companies (telecoms) began offering commercial access to the internet in the late 1990s, they began to also offer firewall appliances and associated managed services. As cybersecurity needs expanded, so did the offerings and the variety of organizations that supplied them, such as ISPs, telecoms, MSPs, IT consultants, and independent cybersecurity specialists.<\/p>\n\n\n\n<p>As cyber attacks continue to increase in number and sophistication, the need for MSSPs grows. Markets also continue to evolve in diversity of offerings and the variety of organizations providing services. Even the largest organizations with the most robust internal security teams will engage with MSSPs for specialty projects, penetration tests, and other specific needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"vs-msps\">MSPs vs MSSP Options<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-1024x512.png\" alt=\"Different major categories of MSPs and MSSPs and how they overlap\" class=\"wp-image-32144\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-1024x512.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-300x150.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-768x384.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-1536x768.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/ESP_MSPsMSSPs_2023_DA_rnd2-2048x1024.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">eSecurity Planet: MSP and MSSP Options<\/figcaption><\/figure>\n\n\n\n<p>Some MSPs will also offer options for cybersecurity, but may not offer the full suite of options or the depth of expertise that a dedicated MSSP can provide. Other MSPs offer a full range of internally provided security services, while others subcontract to dedicated MSSPs for white-labeled security services.<\/p>\n\n\n\n<p>Specialists have even evolved within the MSSP category to provide specific services. Corporations, MSPs, and even other MSSPs subcontract to specialists providing services such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Alert monitoring<\/strong> focuses on the analysis of incoming alerts from security tools for networks, servers, or endpoints and the determination of which alerts are false alarms and which might indicate incidents in progress; sometimes offered as a service of SOCs or MDR.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response\/\">Incident response<\/a> and remediation<\/strong> specializes in <a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\">threat hunting<\/a>, stopping attacks, blocking further attacks, and remediating affected systems; these specialists often offer <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">forensics<\/a> services to preserve evidence of attacks and can overlap with MDRs and SOCs.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/managed-detection-and-response-mdr\/\"><strong>Managed detection and response<\/strong><\/a> (MDR) services monitor a broad array of alerts, often delivered to a <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">security incident and event management<\/a> (SIEM) tool or an internal SOC and then remediate any detected attacks.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\"><strong>Security operation centers<\/strong><\/a><strong> (SOCs)<\/strong> receive alerts and either respond directly to threats or provide validated alerts as a service to external MDR vendors, or even an organization\u2019s internal incident response team.<\/li>\n<\/ul>\n\n\n\n<p>For more options for IT solutions, consider reading <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-security-outsource-option\/\">Best Cybersecurity and IT Outsourcing Options<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">MSSP Services<\/h3>\n\n\n\n<p>In addition to the type of MSSP, MSSPs provide a range of specific services. Organizations can outsource all cybersecurity needs to an MSSP or focus on specialty services such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access management<\/strong> uses <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management<\/a> (IAM) and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\">privileged access management<\/a> (PAM) tools to control access to resources based on the profile of the users, devices, and services.<\/li>\n\n\n\n<li><strong>Anti-spam services<\/strong> focus on eliminating dangerous and annoying SPAM messages from inboxes through configuration and monitoring of email security and similar tools.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/applications\/application-security-definition\/\">Application<\/a> and website security <\/strong>monitors and manages tools to prevent incidents such as server attacks, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-ddos-attacks\/\">distributed denial of service<\/a> (DDoS), and <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-xss-attacks\/\">cross-site scripting<\/a> (XSS) attacks.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\"><strong>Email security<\/strong><\/a><strong> <\/strong>deploys <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">tools<\/a>, uses techniques, and implements protocols such as <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\">SPF<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">DKIM<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\">DMARC<\/a> to prevent threats delivered via email and attachments.<\/li>\n\n\n\n<li><strong>Managed endpoint security<\/strong> installs, configures, and maintains endpoint protection tools (<a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response<\/a> (EDR), etc.) and then monitors the endpoint alerts to respond to detected threats.<\/li>\n\n\n\n<li><strong>Managed <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\">firewall<\/a><\/strong> services setup, configure, and maintain physical or virtual firewall appliances and then monitor alerts to respond to threats detected by the firewall.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/trends\/ids-ips-still-matter\/\">Intrusion detection and prevention system<\/a> (IDS\/IPS) services<\/strong> install, configure, and monitor tools on an organization\u2019s network to detect (IDS) or automate responses (IPS) to threats; the services often also include MDR services to threats that cannot be automatically remediated.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\"><strong>Penetration tests<\/strong><\/a> use tools and experts to probe cybersecurity defenses to locate weaknesses that should be fixed.<\/li>\n\n\n\n<li><strong>Risk assessments<\/strong> and gap analysis of existing security controls provide strategic and technical evaluations of an organization\u2019s cybersecurity strategy to determine if critical assets are sufficiently protected.<\/li>\n\n\n\n<li><strong>Secure remote connection services<\/strong> can be provided by MSSPs through implementation and management of older technology such as a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vpn-security\/\">virtual private network<\/a> (VPN) or through solutions such as <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">virtual desktop interfaces<\/a> (VDIs), desktop-as-a-service (DaaS), and browser isolation.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\"><strong>Employee training and education<\/strong><\/a> services help to prepare employees for potential types of attacks, how to avoid becoming victims, and how to properly report incidents to security teams.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\"><strong>Threat intelligence<\/strong><\/a> services provide information on the most recent vulnerabilities discovered, attackers, and attack trends.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-what-it-is-and-how-to-do-it-right\/\">Vulnerability scanning<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\">management<\/a><\/strong> helps organizations to detect, track, and resolve or mitigate vulnerabilities throughout systems (networks, Kubernetes platforms, etc.), assets (endpoints, servers, IoT, routers, etc.), and installed software (operating systems, applications, firmware, etc.).<\/li>\n\n\n\n<li><strong>Web browsing security<\/strong> manages internal or local <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\">domain name service<\/a> (DNS), <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-web-gateway-vendors\/\">secure web gateways<\/a> (SWGs), firewall settings, and other techniques, tools, and protocols used to block dangerous or unwanted websites and URLs.<\/li>\n<\/ul>\n\n\n\n<p>Most MSSPs will offer an array of these services, but some will also specialize in certain categories such as <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud<\/a>, application, or email security. All MSSPs should be able to provide scoping, implementation, configuration, integration, and tool research capabilities within the specialities they provide. Reporting and auditing for compliance should also be available with most MSSPs as this requirement has become universal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">MSSP Pricing and SLAs<\/h3>\n\n\n\n<p>MSSP prices and service level agreements (SLAs) will be as varied as the potential solutions that are offered. In general, an organization can follow the tips in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/evaluating-outsourced-it-services\/\">How to Find &amp; Choose IT Outsourcing Services<\/a>, but more emphasis will need to be placed on an MSSP&#8217;s ability to demonstrate, explain, and report on cybersecurity issues.<\/p>\n\n\n\n<p>Keep in mind that no solution can be perfect and even a capable MSSP cannot prevent all threats. Some attacks will succeed and some breaches may occur. MSSP vendors should work with the organization to explain how they will <a href=\"https:\/\/www.esecurityplanet.com\/networks\/tips-to-mitigate-data-breaches\/\">limit the extent<\/a> of the breach or attack.<\/p>\n\n\n\n<p>Most SLAs are based on availability of the service itself, or how quickly the MSSP will issue an alert once a threat is detected. For example, a monitoring service may offer 24\/7\/365 monitoring and a 24-hour response time to detected threats. Premium services will reduce response times and add expert threat hunters, while low-cost services will increase response times or simply provide alerts for the organization to resolve.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mechanics\">How MSSPs Deliver Services<\/h3>\n\n\n\n<p>The MSSP will initially invest time to learn a client&#8217;s business processes and existing cybersecurity implementation before suggesting new managed security services or specific security tools. This audit of a client\u2019s current security infrastructure and procedures creates a strategic gap analysis that provides a roadmap for improvement throughout the engagement.<\/p>\n\n\n\n<p>While managed services might require switching tools or services, the MSSP must be able to explain the drawbacks, benefits, installation time, configuration challenges, and both the initial and ongoing costs of the new approach. MSSPs deliver their services directly through the tools, through the MSSP\u2019s proprietary environments, and through remote access to the client\u2019s environment.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Direct Tool Access<\/h4>\n\n\n\n<p>Many security tools offer multi-tenant capabilities and extend control of a customer\u2019s system to the MSSP through the tool. Some commercial and proprietary tools will enable management by the MSSP through local or cloud-based consoles. In either case, the tool should create a secure tunnel between the tool and the environment under management without the need to create separate, secure connections such as VPNs.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Proprietary Environments<\/h4>\n\n\n\n<p>Many cybersecurity tools can be configured to send alerts out of the customer\u2019s environment for analysis within the MSSP\u2019s proprietary environment. For example, alert monitoring or SOC services will receive the alerts in their environment and generally will never need access to the client\u2019s environment unless they are also providing incident response services.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Remote Access to Client Environments<\/h4>\n\n\n\n<p>Both cloud and locally hosted tools may need to create remote connections through indirect means. MSSPs providing configuration, maintenance, and incident response may also need to remotely access assets within an organization\u2019s network.<\/p>\n\n\n\n<p>Traditionally, this leads to the use of VPNs or remote desktop functions to enable remote access to specific machines. More integrated MSSPs may create management networks that connect to their clients\u2019 networks using technologies such as software defined wide area networks (<a href=\"https:\/\/www.esecurityplanet.com\/networks\/sd-wan\/\">SD-WAN<\/a>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pros\">8 Benefits of MSSPs<\/h2>\n\n\n\n<p>The benefits of outsourcing to an MSSP are the same as they are for any IT managed service provider \u2014 with one notable exception (shared threat intelligence) that we&#8217;ll get to in a moment. But first, the seven benefits that MSSPs and MSPs share:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Accounting and cost advantages<\/strong> enabled by an MSP splitting costs over multiple customers, elimination of upfront costs, partner discounts and the ability to use labor in less expensive regions<\/li>\n\n\n\n<li><strong>Time advantages<\/strong> gained by bypassing training and evaluation time, fractional time use of experts, as well as obtaining 24\/7\/365 capabilities through a large staff or advantageous use of time zones<\/li>\n\n\n\n<li><strong>Hiring advantages<\/strong> because MSPs can offer the salaries, consistent work, and challenges needed to recruit and retain IT and security experts or to scale up or down as a client\u2019s needs fluctuate<\/li>\n\n\n\n<li><strong>Instant expertise<\/strong> from employees with consistent and regular experience in installing, troubleshooting, and maintaining security tools, as well as configuration and reporting for compliance<\/li>\n\n\n\n<li><strong>Organizational focus<\/strong> can be obtained when an organization eliminates the distractions of managing IT and security needs outside of the core objectives of the organization<\/li>\n\n\n\n<li><strong>Competitive competence<\/strong> can rarely be obtained by internal professionals shielded from competition; however, MSPs and MSSPs face competitive challenges that force them to stay current and provide stronger punishments for mistakes<\/li>\n\n\n\n<li><strong>Legal advantages<\/strong> for an organization can arise in working with outside vendors that can help to offset the costs of legal liabilities in the event of a breach or other cybersecurity incident.<\/li>\n\n\n\n<li><strong>Leveraged threat intelligence<\/strong> allows the experience of protecting one customer to become experience that will be applied to all customers of the MSSP<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Leveraged Threat Intelligence<\/h2>\n\n\n\n<p>Operations failures in IT tend to occur sporadically because of device failure or consistently because of IT architecture design flaws. However, security failures tend to occur because of an active adversary that uses a technique or tool to exploit vulnerabilities, misconfigurations, and other issues. These active attackers pose a much larger and more time-sensitive threat than simple device failure.<\/p>\n\n\n\n<p>Fortunately, MSSPs defend a much broader environment than any one of their customers, so an attack on any <em>one <\/em>of their customers becomes leveraged as experience to protect <em>all <\/em>of their customers. Once an attacker is detected and remediated for one client, the MSSP can quickly make proactive adjustments or watch for indicators of compromise to disrupt similar attacks quickly and effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"top-providers\">3 Top MSSP vendors<\/h2>\n\n\n\n<p>Picking an MSSP is a bit like picking one\u2019s favorite restaurant. The best choice for one type of organization may not be suitable for the tastes and needs of another organization. Many high-quality MSSPs are regional providers that will never make any top MSSP list, yet deliver services that fit the needs of their customers more effectively than a larger provider.<\/p>\n\n\n\n<p><em>eSecurity Planet<\/em> provides a list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">top MSSP providers<\/a> as well as a guide for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/evaluating-outsourced-it-services\/\">How to Find &amp; Choose IT Outsourcing Services<\/a> that will help smaller organizations locate potentially more suitable MSSP providers for their needs. Meanwhile, we will profile three top MSSP providers here to illustrate some common considerations for buyers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secureworks: Tech-focused Outsourcing<\/h3>\n\n\n\n<p>Atlanta-based Secureworks provides managed IT security services and a SIEM technology sold as a SaaS solution. Secureworks can provide outsourcing through ten global offices and focuses on assessments, testing, adversary exercises, and incident response. Organizations selecting Secureworks may view the company\u2019s proprietary technology or the relationship to parent company Dell Computers as a deciding factor for a purchase.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">WiPro: Global Outsourcing<\/h3>\n\n\n\n<p>As one of the largest outsourcing consultancies based in India, Wipro can offer a global reach with the advantage of low-cost resources within their home country. Many cost-sensitive organizations will favor outsourcing to WiPro or similar companies that use lower-cost tech labor overseas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verizon: U.S. Outsourcing<\/h3>\n\n\n\n<p>U.S. companies may trust U.S. vendors more in general and thus prefer working with well-known and established brands. Telecommunications MSSPs such as Verizon satisfy these needs and provide the financial security of a large corporate partner for equally large customers.<\/p>\n\n\n\n<p>Companies in other regions often consider outsourcing to trusted telecommunication MSSPs in their home region for the same reason. For example, Europeans may consider BT (formerly British Telecom) a strong candidate and corporations in Asia might prefer NTT (Japan) or Trustwave (owned by Singapore Telecommunications, Ltd.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: MSSPs Help Clients Avoid Costly Breaches<\/h2>\n\n\n\n<p>In an environment of increasingly sophisticated cyber attacks, organizations cannot hope that security threats will simply overlook their vulnerabilities. The cost of remediation and incident response outweighs the costs of preventive security so organizations should take preventive measures now.<\/p>\n\n\n\n<p>Fortunately, MSSPs of all sizes exist to handle the varied security needs of organizations of all sizes. While not every MSSP will be a perfect fit, organizations can consider a variety of options to obtain distinct and tangible benefits from outsourcing to cybersecurity specialists.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/mitre-mssp-tests\/\"><strong>MSSPs Fare Well in First MITRE Evaluations<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/managed-security-mdr-firewalls-siem\/\"><strong>Choosing a Managed Security Service: MDR, Firewalls &amp; SIEM<\/strong><\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6f6f029258-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f6f029258\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f6f029258\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f6f029258\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f6f029258\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f6f029258\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f6f029258\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.<\/p>\n","protected":false},"author":271,"featured_media":31534,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[31514,23044],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[377,389,375],"class_list":["post-7334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-mdr","tag-mssp","b2b_audience-evaluation-and-selection","b2b_product-gateway-and-network-security","b2b_product-managed-security-services","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Managed Security Service Provider? MSSPs Explained<\/title>\n<meta name=\"description\" content=\"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Managed Security Service Provider? MSSPs Explained\" \/>\n<meta property=\"og:description\" content=\"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-22T17:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T00:01:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"922\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"What is a Managed Security Service Provider? MSSPs Explained\",\"datePublished\":\"2023-08-22T17:30:00+00:00\",\"dateModified\":\"2023-09-28T00:01:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\"},\"wordCount\":2457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png\",\"keywords\":[\"mdr\",\"MSSP\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\",\"name\":\"What is a Managed Security Service Provider? MSSPs Explained\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png\",\"datePublished\":\"2023-08-22T17:30:00+00:00\",\"dateModified\":\"2023-09-28T00:01:32+00:00\",\"description\":\"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png\",\"width\":1400,\"height\":922,\"caption\":\"Image: Murrstock\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Managed Security Service Provider? MSSPs Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Managed Security Service Provider? MSSPs Explained","description":"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/","og_locale":"en_US","og_type":"article","og_title":"What is a Managed Security Service Provider? MSSPs Explained","og_description":"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/","og_site_name":"eSecurity Planet","article_published_time":"2023-08-22T17:30:00+00:00","article_modified_time":"2023-09-28T00:01:32+00:00","og_image":[{"width":1400,"height":922,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"What is a Managed Security Service Provider? MSSPs Explained","datePublished":"2023-08-22T17:30:00+00:00","dateModified":"2023-09-28T00:01:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/"},"wordCount":2457,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png","keywords":["mdr","MSSP"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/","url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/","name":"What is a Managed Security Service Provider? MSSPs Explained","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png","datePublished":"2023-08-22T17:30:00+00:00","dateModified":"2023-09-28T00:01:32+00:00","description":"Learn what a Managed Security Service Provider does, the services they offer, and how they can help you protect your business from cyber threats.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/esp08222023-what-is-a-managed-security-service-provider.png","width":1400,"height":922,"caption":"Image: Murrstock\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-a-managed-security-service-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What is a Managed Security Service Provider? MSSPs Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7334"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7334"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7334\/revisions"}],"predecessor-version":[{"id":32146,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7334\/revisions\/32146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31534"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7334"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7334"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7334"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}