SP Security Service Automation

Double your profit with cross-sell driven margin expansion

Learn how to drive MSP growth with a net-new security service offering. Answers common questions about security service delivery:

  • Why should I offer in-house security service?
  • How does this create so much value for me and my customer?
  • What should I bundle and how do I price my security service?

Read More

SPs Double Profit with Security Services


Intro to CIS CSC 5

Secure Configurations for Hardware and Software 

Establish, implement, and actively manage (track, report on, correct) the security configuration of mobile devices, laptops, servers, and workstations using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.

CIS CSC 5 - Poster


Teambuilding 101

Ingredients of an Effective Security Team

Cyber defense is a team sport with varied roles that need to be filled in a balanced way. Let’s take a high level look at what it takes to successfully orchestrate a security team.

Read More

Security Teams-1

Intro to CIS CSC 3

Continuous Vulnerability Management

Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of opportunity for attackers.

Read More

CIS CSC 3 - Infographic


Intro to CIS CSC 4

Controlled Use of Administrative Privileges

The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications

Read More

Screen Shot 2020-01-24 at 11.21.43 AM


Red vs Blue

The role of attackers and defenders in cyber teams

Strong security efforts combine the efforts of dedicated defenders and those assigned to test defenses. Learn about team colors.

Read More

Red vs Blue

Intro to CIS CSC 2

Inventory and Control of Software Assets

Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that all unauthorized and unmanaged software is found and prevented from installation or execution.

Read More

CIS CSC v7.1 Control 2


Intro to CIS CSC 1

Inventory and Control of Hardware Assets

Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.

Read More

CIS CSC v7.1 Control 1-2