TECH SUPPLIER Jan 2021 - Market Perspective - Doc # US46232520
Blending Together/Overlap of Consulting and MDR
This IDC Market Perspective looks at how security service providers have to be able to provide the mix of MDR, managed, and professional security services that their clients and prospects need in order to plan for, protect against, and respond to cyber-attacks. Security service providers are increasingly utilized to provide the unique blend of managed and consultative services that are needed to secure organizations from the advanced cyberthreats that their clients face. In a bid to help secure their clients, many service providers have launched their own MDR service to provide the daily tactical cybersecurity needs that their current and prospective clients so desperately need. Service providers that enable the touch point of a strong MDR or other managed security service offering to provide the strategic professional security services for their clients will position their clients for success and in the process reap the financial rewards that these higher margin services often provide.
The reverse is also true, as many firms are brought in to do a cybersecurity assessment, provide incident response services, or provide other testing and assessment capabilities. Opportunities to pair up these successful engagements with an ongoing managed security service offering reduces the number of complex relationships that the consuming CISO needs to balance, while also providing the consuming firm with a partner that now has a holistic view of its business and security needs.
"Security service firms that willingly choose to not provide a complete suite of security service offerings shortchange their stakeholders and force unnecessary complexity for their clients," said Craig Robinson, program director, Security Services at IDC. "Full-feature cybersecurity offerings that can mix in the right blend of managed and professional security services reduce complexity and provide their clients with a prescriptive, elevated cybersecurity posture."