Build or buy? Eight factors for measuring TCO on security operations centers
When it comes to security operations, most enterprises need to intensify their efforts with 24/7 threat detection and response, but what’s the best approach? Is it more effective to expand your existing in-house resources or should you trust a provider to do the work? Analyzing the total cost of staffing a security operations center (SOC) can help you arrive at the right decision. Here are eight cost factors and some key trends to keep in mind as you decide if the do-it-yourself approach is best suited to strengthen your security posture.
What you’ll learn
- Average salaries and costs
- The biggest threat to ROI
- Trends impacting TCO
Blurred borders call for scalability
With trends in edge computing, mobility, bring-your-own-device, and IoT connected devices, the network is becoming an ever-expanding entity. Much like urban sprawl, these blurred borders create an increasing amount of “ground” that SOC teams must cover. The takeaway: The SOC’s must be as fluid and adaptable as the extensive IT environment.
Human intelligence still critical
Today, there is a dizzying array of security products that claim to automate the collection, correlation, and analysis of everything happening on your network. While advancements in security technologies are taking us to new heights, these products still require a certain level of human effort to work as advertised. More than a marginal level of significance, talent can be as much as 50 percent of the success equation:
- Machine learning and artificial intelligence are good at spotting anomalous behavior, but it still requires security analysts to investigate all of its findings.
- The cloud’s shared security model is taking some security pressure off of SOC employees, but enterprises that have migrated infrastructure, platforms, and apps to the cloud do not shed all security responsibilities. Cloud-first enterprises must still ingest and evaluate security data. Plus, they must verify that the cloud provider is doing their job correctly.
ROI threat: skills shortage
The biggest problem with security operations is finding and keeping skilled security professionals.
- According to a Ponemon Institute study, 57% of companies are unable to hire the appropriate staff to deal with cyber attacks. A Global Information Security Workforce (GISW) Study found that two-thirds of its nearly 20,000 respondents said they lack the cybersecurity professionals needed for today’s threat climate.
- Even with salary and budget increases, some estimates state there will be as many as 3.5 million unfilled positions in the industry by 2021.
Eight factors for measuring TCO
To arrive at an estimated total cost of ownership (TCO), CISOs should perform a cost analysis that accounts for SOC:
- Staffing: Salaries for tier-1 talent can be estimated at $75-90,000/yr, tier-2 $80-110,000/yr
- Time-to-Hire: time needed to recruit experienced talent
- Tenure/Retention: average <12-15 months for a security analyst
- Coverage (hours of service per day): 4 to 4.5 analysts required for 24/7 coverage
- Training and Security Certifications: average training costs for tier-1 about $16,000
- Technology: tools including behavior analytics and cloud protections
- Threat intelligence subscription
- Compliance auditing and reporting
When the average SOC requires at least eight employees, it’s not uncommon for SOC costs to quickly rise above $100,000+ each month and be contrasted by service contracts that can start at a few thousand dollars monthly. The savings justification typically comes from the fact that staffing, time-to-hire, training, security certifications, 24/7/365 coverage, and tenured professionals are considered non-issues with the right partner. Plus, technologies, compliance, and threat intelligence are often included in the monthly service.
While many IT executives find it easy to build a financial case, the key is getting the most scalability and the best talent for your dollar. First, focus on flexible solutions that make it easy to activate and integrate only the security technologies you need to strategically fill gaps. Second, take a close look at the tenure of security analysts and professionals your partner brings to the table, as talent remains a large part of the job.
Managed Security? We're here to answer all of your questions.
Call us now to arrange a consultation (866) 588-5885.
Or arrange for a consultation through our request form.
The top 5 cybersecurity threats to watch out for now
The threat landscape is constantly evolving, so awareness is crucial. Every organization should be prepared for these top five security threats.
IoT readiness: 5 network and security necessities
IoT success relies heavily on IT infrastructure. This quick guide offers a list of necessities that ensure scalability, control, and simplified management.
The truths and lies of IoT security: monitoring connected devices
Yesterday’s security techniques and networks don’t always transition well into the new world of IoT. A game of “truth or lie” exposes the certainties and snare traps.
Managed Detection and Response vs. Managed Security services: The difference and how to choose
Managed Detection and Response services are still new to many IT professionals. This quick guide explains the basics and how it expands traditional services.
How to secure IaaS/PaaS effectively: customer responsibilities in the shared security model
Cloud-based IT environments require customers to shift their security focus. Understand the critical changes needed and how to effectively improve security posture.