Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Taking a DIY approach to cybersecurity is a dangerous proposition

Working with an MDR provider gives you the talent, tools and full coverage you need

By Dave Martin
cyber freepik

<a href='https://www.freepik.com/vectors/website'>Website vector created by iuriimotov - www.freepik.com</a>

April 8, 2021

There was a time when corporate IT only worried about computing, networking, and data storage. But today, the list of IT responsibilities includes dozens of categories. At or close to the top is cybersecurity. And for large organizations, cybersecurity is not solely an IT responsibility.  

Rising threats and an ever-growing network of clouds and remote users have elevated cybersecurity from a list of tasks to a top business imperative. For many organizations, cybersecurity is a separate department with C-level executives and board of director visibility.

This evolution makes perfect sense considering the importance of IT technology to business.

Connected technology is now at the heart of business. It enables organizations to work more efficiently and effectivity, both inside (for employees and other internal stakeholders) and out (to serve customers). So, enterprises want to make sure their IT environments – and all the data and devices that they touch – are secure and can function without interruption. 

The ongoing string of high-profile cyberattacks and reports such as the one from Gartner that forecasts that three-quarters of CEOs will be personally liable for cyber-physical security incidents by 2024, have also made business leaders more keenly aware of cybersecurity.

 

Enterprises Must Remain Vigilant and Be Ready to Act Quickly

But cybersecurity is not a one-and-done proposition. Deterring cybersecurity threats and remediating incidents is a complex and never-ending responsibility. Malicious state actors, cybercriminals and corporate espionage are just a few sources of cyberattacks. Each one uses dozens of ever-evolving techniques to overcome security safeguards. 

Adding to the challenge of securing an organization is the ever-extending network edge, 

  • The majority of applications are moving out of the data center and into the cloud.
  • Remote users require direct access to the internet to remain productive.
  • More employees are working outside of the traditional enterprise – especially now, amid the global pandemic – and are difficult to secure. 
  • Networks are expanding across continents and oceans to better service a global economy.

These new dynamics create new vulnerabilities and fresh opportunities for cybercriminals.

 

Your Cyber Defense May Rely on MDR

Many organizations are turning to managed detection and response (MDR) to improve their cybersecurity postures. MDR is provided in part or entirely by a service provider.  

A professional MDR service encompasses nearly all the processes, technologies and techniques used to deter, detect, contain and remediate cybersecurity threats and attacks. This includes remote users, cloud applications, compute clouds, wide area networks, and remote sites.  

Leading MDR providers can replace or augment the traditional security operation center (SOC) with SOC-as-a-Service. Advanced MDR service providers not only instruct customers about how to contain and remediate cyberattacks but, if allowed behind the firewall, can also bring attacks to ground. Customers can be involved in cybersecurity to whatever level they require and desire. 

 

The Alternative Is Running Your Own SOC

You can operate your own SOC and take a do-it-yourself (DIY) approach. But creating, maintaining, and evolving a SOC is one of the most difficult challenges of a DIY strategy.

Having a 24x7x365 SOC is complicated. You need to create a security hardened SOC with all the required tools, monitors, software, systems, network appliances and sensors. Plus, you need to acquire, integrate and manage all the third-party services and licenses. The SOC must have the additional resources required to evaluate and integrate new technologies. It must also continue to evolve to keep pace with the ever-increasing volume and complexity of cyberthreats.

The toughest aspect of developing and maintaining a SOC is hiring and clearing a team of level 3 engineers. These individuals must be cybersecurity experts with enough experience to identify, contain and remediate critical cyberattacks before they severely damage the organization. 

 

But DIY Is Typically Not the Best Approach

Retaining an experienced staff to ensure 24x7x365 coverage is a massive challenge. In many markets, it is nearly impossible to find these experts. And it’s extremely expensive to hire them.  

Leveraging a cloud-native MDR service is, in many cases, a more prudent and cost-efficient strategy when compared to developing and operating an in-house, DIY solution. 

Leaving cybersecurity to the experts also enables IT to focus on more strategic challenges.  

 

KEYWORDS: corporate espionage cyber security managed detection and response (MDR) network security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Martin is senior director of product management for threat response at Open Systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Workplace Violence: From Orlando Office to Taking a Proactive Approach

    See More
  • technology-network-cyber-freepik.jpg

    Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

    See More
  • auditing-freepik1170x658v4.jpg

    Proactive auditing — a key component to an offensive cybersecurity approach

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing