MSP vs. MSSP: Blending Both for Best-in-Class Risk Management

by

October 6, 2021

Managed service providers and managed security service providers are frequently confused.

A managed service provider (MSP) is not the same as a managed security services provider (MSSP). While the MSP may effectively function as an MSSP for a small and midsize business (SMB), they do so by bundling specific/narrow MSSP services into their general/broad outsourced IT offerings through MSSP channel programs.

This MSP reselling arrangement is the most cost-effective and efficient way of getting best-in-class risk management and security services (MSSP) from one provider. The same company also monitors, manages, supports, and secures all of your infrastructure and users.

When your MSP manages all of the moving parts through a single pane of glass, they gain visibility into every variable (and hiccup) that affects your quality of service. If something goes wrong, they own it and quickly effect a resolve.

On the other hand, the pure MSSP plays frequently featured in Gartner Group rankings are typically well-known technology brands (AT&T, IBM, Verizon) who sell directly to larger enterprises with in-house IT personnel.

The following three sections are quick summaries inspired by Nick McCourt, a
vCISO/Cyber Security Engineer/CISSP at Integris IT. Nick is quoted amply because his down-to-earth examples and commentary are easily digestible by non-technical types.

#1 – The MSP World

Pardon my time-saving oversimplification in advance. There are two kinds of MSPs: old school and new school.

The former is more reactive and break-fix in nature. They more than likely support clients who still have a significant number of on-premise servers and non-standard technology.

This setup requires a great deal of manual intervention and firefighting.

The latter is more proactive and strategic in its approach. Most of their client assets are in secure clouds with standards-based architecture that aligns with an established risk management framework like NIST.

This setup is more resilient, self-healing, automated, and less prone to hard fails that require an engineer to be in your IT closet in the middle of the night.

As I mentioned in a previous blog, Comparing MSP Services, forward-thinking MSPs are consistently weaving cybersecurity into every client conversation.

Each of the following products, services, topics, and initiatives are part of an ongoing dialogue:

  • Microsoft 365 Business Premium
  • Security Information Event Management (SIEM)
  • Internal Vulnerability Scanning
  • Managed Firewalls
  • Content Filtering
  • Anti-Virus, SPAM, and Malware Protection & Removal
  • Regulation & Compliance
  • NIST CSF, ISO 27001, ISO 27002, SOC2, HIPAA, and GDPR
  • Backup & Disaster Recovery
  • Microsoft Azure AD
  • Duo Security
  • Two-Factor Authentication (2FA)
  • Single-Sign-On (SSO)
  • Password Management
  • Cybersecurity Awareness Training
  • Acceptable Use Policies
  • Network diagrams and IT roadmaps
  • Projects to upgrade hardware, software, applications
  • Penetration testing and GAP assessments

Does your MSP follow a framework? If so, there’s a good chance you’re currently taking advantage of several bundled MSSP services.

Learn More: NIST Framework Part OneNIST Framework Part TwoNIST Framework Part ThreeNIST Framework Part FourNIST Framework Part FiveThe Best of Both WorldsNIST & M365Are You Getting Genuine Managed IT Services?

#2 – The MSSP World

One glance at the following MSSP websites will make one conclusion abundantly clear: security solutions are highly specialized software and consulting packages compared to standard MSP infrastructure fare, diminutively nicknamed “plumbing.”

These companies sell Penetration Testing, GAP Assessments, Managed Detection and Response (MDR), Internal Vulnerability Scanning (IVS), SIEM, and more, directly to larger SMBs (200+ employees) and enterprises (1,000+ employees).

While the MSSPs mentioned above have offerings that integrate with and complement most standard MSP offerings, they don’t include:

  • Strategic Account Management & vCIO
  • 24/7/365 Coverage & Support
  • Mobile Device Management/BYOD
  • Backup and Disaster Recovery/Business Continuity
  • Cloud Monitoring, Management & Support
  • Server Monitoring, Management & Support
  • Workstation Monitoring, Management & Support
  • User Help Desk
  • Network Monitoring, Management & Support (Switches, Firewalls, Wireless Access Points & UPS)
  • IT Process Automation (Systematic Patch, Software & Security Updates)
  • Vendor Technical Assistance (Microsoft Azure, Microsoft 365, Google Apps, Telecom, Internet, VoIP, & Document Solution Providers)
  • Equipment Procurement & Technology Life-Cycle Management

In the next section, we’ll tie everything together with real-world guidelines to help you maximize the complementary nature of both services and minimize potential conflicts.

#3 – Notable and Quotable Risk Management Insights from Nick McCourt

Nick McCourtvCIOs like Nick provide strategic consulting services to their SMB clients. This requires a combination of business, consulting, technical and communication skills.

Nick and his peers need all four to explain how various MSSP offerings work within an MSP service offering. Nick is equally comfortable with diverse audiences: CFOs, CIOs, Software Developers, Network Engineers, Operations Executives, HR, Office Managers, and more.

Nick’s Insights

IT services and security solutions are mutually inclusive and should be designed and implemented according to your organization’s preferred risk and compliance management framework.

Risk Management is not a project. It’s a continuous program that requires generalists and specialists to understand an organization’s exposure and move leadership in the right direction. Any practical risk management program has five steps:

  • Identify the risk
  • Analyze the risk
  • Prioritize the risk
  • Treat the risk
  • Monitor the risk

The risk management piece is the trickiest part of the puzzle. Figure this out, and everything else falls into place.

MSPs with a high level of operating maturity can help create this foundational sheet of music. MSPs with lower levels of operating maturity usually cannot. This circumstance creates three problems:

  • They will have a hard time selecting the right security tools to assimilate into your IT environment
  • They will struggle to support the applications on your behalf
  • They will not be able to make a compelling business case for you to spend the extra money

MSSPs have a vested interest in working with MSPs who understand their services and lower their support overhead as a result.

MSPs are generalists and translators for many different industries, which makes them a powerful ally when managing risk for an organization.

Managing risk much more than a Penetration Test. A Penetration Test only provides a single snapshot for one moment in time. Nothing stays the same. IT environments are a moving picture.

The act of assessing and managing risk for an organization requires cooperation from multiple departments and includes:

  • Policies
  • Procedures
  • Plans
  • Rosters
  • Technology
  • Security

You can always purchase MSP and MSSP services separately, but tensions may arise between vendors who don’t have 100% visibility into the nuances of each other’s offerings.

For instance, an MSSP may identify a gap the MSP already mentioned to the client six months earlier but couldn’t get them to approve the remediation project. Understandably, the client forgets this detail and gets upset at the MSP for being negligent.

MSPs often require organizations to have specific security services BEFORE they agree to monitor, manage, support, and secure all of their IT systems and users. This arrangement lowers the risk for both the client and the MSP.

When an MSP makes security recommendations, they’re not only trying to protect you and your clients, but they’re also attempting to protect themselves and all of their clients.

An attack on the reputation of one organization can lead to damage for all. And the reputations of the various MSSPs the MSPs recommend and support.

This detail makes MSPs valuable risk management assessors and demonstrates that they don’t just “fix computers.” Their services may be stereotyped as “plumbing,” but everyone knows plumbers do a lot more than fix toilets. They have expertise with faucets, sewer lines, water heaters, sump pumps, piping, and more.

In many cases, the MSP recommends MSSP tools they employ in their corporate environment, so they have real-world experience dealing with all the bits, bytes, speeds, feeds, and 3 AM alerts. It’s personal.

What’s Next?

Is your MSP providing the risk management expertise you require?

Are you clear on the business rationale for all of the extra security tools they recommend?

Do you have documentation that everyone on your IT Steering Committee can understand?

Are you currently using an MSP and an MSSP, and suspect you may be overpaying for duplicate services? We welcome a conversation to help you better understand all of these details.

Jed is a Solutions Advisor at Integris with over 17 years in MSP solution development, sales and marketing communications.

Keep reading

Is Multi-Factor Authentication Worth The Cost?

Is Multi-Factor Authentication Worth The Cost?

By Jed FearonYes, yes, yes times infinity. Okay, I think I made my opinion obvious. While there is no such thing as a silver bullet for 100% cybersecurity protection (even Multi-Factor Authentication AKA MFA isn’t perfect), I can’t think of one reason not to implement...

Start Solving Persistent IT Problems Today: (3 Trouble Spots)

Start Solving Persistent IT Problems Today: (3 Trouble Spots)

The biggest IT problems are the ones you don’t know exist. Organizing your business enabling technology into simple buckets is one of the best ways to track, score, report, and collaborate with your MSP. While the IT world is filled with much more advanced models and...