{"id":5930,"date":"2019-06-13T16:03:17","date_gmt":"2019-06-13T15:03:17","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5930"},"modified":"2021-05-06T13:34:37","modified_gmt":"2021-05-06T12:34:37","slug":"threat-monitoring-proactive-security-against-cyberthreats","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats","title":{"rendered":"Threat Monitoring: Proactive Security Against Cyberthreats"},"content":{"rendered":"<p>Too many organizations leave their network security to chance. If everything is running smoothly and you\u2019ve never encountered a security breach, proactive security solutions may seem like a big investment for your customers to make. But have you sat down with them and looked at the list of potential expenditures associated with a data breach? Cybersecurity risk is business risk.<\/p>\n<p>The Ponemon Institute estimates the breach cost of a single record to be $148.\u00a0<a class=\"ext\" href=\"https:\/\/keepersecurity.com\/2017-State-Cybersecurity-Small-Medium-Businesses-SMB.html\" target=\"_blank\" rel=\"noopener noreferrer\">A typical breach affects 3,000 to 101,500 records,<\/a>\u00a0with\u00a040% of companies being down for over eight hours\u00a0after a breach occurred.<\/p>\n<p>This is merely a high-level view of the consequences. The\u00a0<a class=\"ext\" href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">Cost of a Data Breach study by Ponemon<\/a>\u00a0found there are many business expenditures associated with the cost of a data breach, all of which need to be taken into consideration when analyzing the true cost. These include: investigation of the data breach, assessment of auditing services, crisis team management, communication to compromised individuals, cost of business disruption, revenue losses, loss of employee productivity, consultation fees, help desk activities, product discounts and credits, damaged business reputation, and cost of lost customers. The list goes on.<\/p>\n<p>If that weren\u2019t enough, cybercriminals are constantly evolving their methods\u2014and to make matters worse many small and medium-sized business (SMBs) are prime targets for cybercriminals. According to\u00a0Cisco\u2019s 2018 SMB Cybersecurity Report, SMBs normally have less-sophisticated security infrastructure and in-house security experts. This presents a great opportunity for managed services providers (MSPs) to expand their footprint and reinforce brand value.<\/p>\n<p><b>Threats typically targeting SMBs:<\/b><\/p>\n<ul>\n<li>Malware<\/li>\n<li>Phishing attacks<\/li>\n<li>Illegal file transfer<\/li>\n<li>Viruses<\/li>\n<li>Ransomware<\/li>\n<li>Botnets<\/li>\n<li>Web app attacks<\/li>\n<li>Intellectual property leakage<\/li>\n<li>Email spam and malware<\/li>\n<li>DDoS attacks<\/li>\n<\/ul>\n<h3><b>5 ways threat monitoring can help\u00a0<\/b><\/h3>\n<ol>\n<li><b>Fast threat detection\u00a0<\/b>As an MSP, you probably already offer basic security services to your clients, such as patch management, antivirus, email security, firewall, and backup. Though these technologies aim to prevent attacks, they don\u2019t necessarily do a lot when it comes to detecting potential attacks. Implementing threat monitoring with streamlined log collection and correlation helps you quickly identify threats in your managed networks without having to sift through logs for all the devices and systems across your customer base.<\/li>\n<li><b>Security monitoring\u00a0<\/b>Time spent on repetitive security tasks can be a challenge; it can also introduce human error, which could lead to cybersecurity breaches. Security monitoring tools help you increase threat-detection capabilities and reduce time spent on security tasks that are normally performed manually.<\/li>\n<li><b>Get alerted\u00a0<\/b>It\u2019s hard to find a reliable and consistent source of threat intelligence, which can make it difficult to make the right calls regarding whether to investigate an event or let it pass. Having a sophisticated alarm engine with customizable rules and alerts helps you gain greater transparency into multiple security events. It also makes sure you receive only relevant alerts, and minimizes false positives.<\/li>\n<li><b>Simplified compliance efforts\u00a0<\/b>Having insights over incidents in managed networks via reporting can make life much simpler when it comes to regulatory and compliance audits.<\/li>\n<li><b>Remediation\u00a0<\/b>All in all, threat monitoring, and the intelligence it provides, helps you better understand the nature of incidents and threats. It equips you with the ability to create and implement remediation plans, adding value for your end customers.<\/li>\n<\/ol>\n<h3>How can SolarWinds help?<\/h3>\n<p>SolarWinds<sup>\u00ae<\/sup>\u00a0Threat Monitor is a cloud-based security information and event management (SIEM) tool designed to help MSPs detect, respond to, and report on threats on their managed networks.<\/p>\n<p>We realize these advanced security services may be daunting, so we offer you an easy way to add managed security services like Threat Monitoring to your service offering with the SolarWinds Threat Monitoring Service Program. When you sign up, you\u2019ll partner with one of our approved Threat Monitoring Service Providers (TMSPs), who will offer security operations center (SOC) services on your behalf.<\/p>\n<p><b>To learn more about the program today,\u00a0<a class=\"ext\" href=\"https:\/\/hermes.solarwindsmsp.com\/contact?utm_medium=website&amp;utm_source=direct&amp;utm_campaign=tm-glbl-lt-dgp-proactive_security_against_cyberthreats-2019-06-18&amp;OppOverride=TM&amp;message=I%20am%20interested%20in%20learning%20more%20about%20Threat%20Monitor\" target=\"_blank\" rel=\"noopener noreferrer\">click here<\/a>\u00a0to get in touch with our team.\u00a0<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><em>Mia Thompson is product marketing manager, Threat Monitor, at SolarWinds MSP.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Too many organizations leave their network security to chance. If everything is running smoothly and you\u2019ve never encountered a security breach, proactive security solutions may seem like a big investment&#8230;<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5930","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Monitoring: Proactive Security Against Cyberthreats - N-able<\/title>\n<meta name=\"description\" content=\"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Monitoring: Proactive Security Against Cyberthreats - N-able\" \/>\n<meta property=\"og:description\" content=\"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T15:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-06T12:34:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mia Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mia Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\"},\"author\":{\"name\":\"Mia Thompson\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\"},\"headline\":\"Threat Monitoring: Proactive Security Against Cyberthreats\",\"datePublished\":\"2019-06-13T16:03:17+01:00\",\"dateModified\":\"2021-05-06T12:34:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\"},\"wordCount\":665,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\",\"name\":\"Threat Monitoring: Proactive Security Against Cyberthreats - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-06-13T16:03:17+01:00\",\"dateModified\":\"2021-05-06T12:34:37+00:00\",\"description\":\"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Monitoring: Proactive Security Against Cyberthreats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\",\"name\":\"Mia Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"caption\":\"Mia Thompson\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Monitoring: Proactive Security Against Cyberthreats - N-able","description":"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats","og_locale":"de_DE","og_type":"article","og_title":"Threat Monitoring: Proactive Security Against Cyberthreats - N-able","og_description":"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.","og_url":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-06-13T15:03:17+00:00","article_modified_time":"2021-05-06T12:34:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Mia Thompson","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Mia Thompson","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats"},"author":{"name":"Mia Thompson","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce"},"headline":"Threat Monitoring: Proactive Security Against Cyberthreats","datePublished":"2019-06-13T16:03:17+01:00","dateModified":"2021-05-06T12:34:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats"},"wordCount":665,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats","url":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats","name":"Threat Monitoring: Proactive Security Against Cyberthreats - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-06-13T16:03:17+01:00","dateModified":"2021-05-06T12:34:37+00:00","description":"Taking a reactive security stance is no longer enough in the current business climate. MSPs need to be guiding their customers to be more proactive. Mia Thompson looks at some of the options.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/threat-monitoring-proactive-security-against-cyberthreats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Threat Monitoring: Proactive Security Against Cyberthreats"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce","name":"Mia Thompson","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","caption":"Mia Thompson"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5930"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5930\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}