Where MSP and an MSSP Intersect

Where MSP and an MSSP Intersect

Ever wonder if you should be offering cybersecurity services? Are you taking on liability that isn't worth it? I sit down with Scott McCrady CEO of SolCyber to discuss the opportunities and benefits of partnering with an MSSP.

Ever wonder if you should be offering cybersecurity services? Are you taking on liability that isn't worth it? I sit down with Scott McCrady CEO of SolCyber to discuss the opportunities and benefits of partnering with an MSSP.

[00:00:00] Welcome to MSP 1337. I'm your host Chris Johnson, a show dedicated to cybersecurity challenges

[00:00:14] solutions, a journey together, not alone.

[00:00:21] Welcome everybody to another episode of MSP 1337. It is Tuesday and we are releasing a

[00:00:28] unique experience opportunity to hear from someone in the industry. I have asked the CEO

[00:00:37] of SoulCyber to join me Scott McCrady. Welcome to the show.

[00:00:41] Hey Chris, thanks for having me. Pleasure to be here.

[00:00:46] So if you could just tell our listeners a little bit about yourself, kind of give them

[00:00:50] the elevator pitch of who SoulCyber is and then we'll jump into today's topic which

[00:00:56] is the intersection of MSPs and MSSPs.

[00:01:00] Yeah, perfect. So hey everyone, thanks for listening. Thanks for joining Chris's podcast.

[00:01:08] I've been in the MSSP space for almost since its infancy. I'm an engineer by trade and

[00:01:14] way way way back in the day I was rolling out firewalls and IDSs for any of you who

[00:01:18] have been around the block. These are the old Nokia appliances. You need to hit one

[00:01:22] if you want a checkpoint and you hit two if you wanted ISS real secure. We're

[00:01:25] deploying those all over the world. At the time we didn't know what to do with the data.

[00:01:30] So actually started building a sock inside the Knox for EDS again this is way back in

[00:01:36] the day and then ended up getting hired away by into Symantec and Riptek. So Riptek

[00:01:43] was the very first MSSP founded out in DC and again this was focused on sort of

[00:01:50] the Fortune 500 and at the time everybody that had money in the big into town they sort

[00:01:57] of knew that they could use somebody to take a look at the data analyze it and let them

[00:02:01] know when something bad was happening. So the secret sauce was really the Sym in the

[00:02:05] cloud at the time getting large enough servers on prem wasn't really feasible to

[00:02:12] actually build a Sym. So your Sym actually was in the cloud way back in the day.

[00:02:16] And so that was that was what we did was we took data feeds from back then firewalls and

[00:02:22] IDS is we correlate them analyze them and let the customer know when something bad was

[00:02:25] happening. So I helped build their APJ business. So I got sent to Sydney and set up socks

[00:02:31] in Asia, India, Japan, and then I ran the global MSSP business for Symantec for

[00:02:39] quite a few years and then went from there and helped set up fire or I amandians

[00:02:43] business. So those have been around the block fire I so this lends itself beautifully to our

[00:02:52] conversation today because question that comes to mind for me was when you're dealing with

[00:02:56] clients like that what did the responsibility matrix look like you know that the shared

[00:03:01] responsibility matrix that I think about you know yeah so do you watch our stuff like between

[00:03:07] eight and five and if you do more than that like how does the billing work and like don't call me

[00:03:13] when I'm on the golf course like because if you're just telling me bad things are happening

[00:03:18] who's who's remediating. Yeah it's it's I really love that question because that really

[00:03:23] goes to sort of why why Sol cyber after doing this for 20 years why did we need to start

[00:03:27] another MSSP and one of the core reasons is MSSP is in the traditional model which would

[00:03:34] be something like what you talked about Chris which is large global 1000 they set up all their

[00:03:39] security stuff they send the data to an MSSP MSSP sends back alerts and that fortune or global

[00:03:45] 1000 consumes those alerts it's a very arms length relationship there we are really just

[00:03:51] an alerting service for the most part in the legacy model and so the ability to help

[00:03:56] remediate was very limited in the capabilities for most of the traditional MSSP is out there

[00:04:02] and ironically still to this day that model is the primary model you'll see which again is

[00:04:09] relatively limited support for remediation. Yeah it's it's funny last week so I do a monthly

[00:04:17] fireside chat with Matley from Pac-Sate and we've been stepping through the CIS controls

[00:04:23] and last week low and behold was you know control 13 network monitoring and defense

[00:04:29] in the first safeguard in there is centralized security event alerting which is exactly what

[00:04:33] you were describing so so continue on like tell me more about why Sol cyber because I think for

[00:04:40] you know those listening you know hearing from MSSP is a different model than hearing from

[00:04:47] the more traditional vendor space where it's like where your sock where you're

[00:04:50] filling the blank where the Swiss Army knife for your security outsourcing saying MSSP

[00:04:56] really gives me a different kind of comfort than just the smorgasbord or buffet of security

[00:05:02] service offerings and it's like oh no you didn't check that box we don't provide that service

[00:05:06] that's an additional those are all the olacart things or you know the integrations that we

[00:05:11] have but not necessarily you know what makes us the vendor that we are. Yeah so to keep it

[00:05:19] pretty high level the fundamental problem that you see in organizations is their ability

[00:05:24] to operationalize security programs right so they can all go out and buy a great tool great

[00:05:28] endpoint tool they can go out and buy a sim they can go out and buy there's there's great

[00:05:33] technology out there so how does that companies keep getting breached well the ability to

[00:05:37] operationalize those tools into a consistent pattern in a repeatable effort that can

[00:05:44] sort of withstand pressure over time is really a major gap and so Sol cyber we put ourselves into

[00:05:50] the mssp category because honestly it's about the only one out there but we're really more of

[00:05:54] like a drop in security program as a service and so you get your tooling and we use best in class

[00:05:59] tools and we evaluate like every tool we use and we really do try to find like the best in class

[00:06:04] we're not trying to find like the cheapest AV solution again you're not saying like use our

[00:06:08] proprietary Sol cyber firewall you're saying based on you sent a one yeah yeah so uh so you

[00:06:18] guys advertise this on your website like I think it's something to the effect of like the five

[00:06:23] cybersecurity tools that you should be using talk to me a little bit about that and then we'll

[00:06:27] jump into the that the intersection of the two yeah so the we actually viewed as like a spectrum

[00:06:34] right so the very like the basics you should have in place would be obviously something around

[00:06:40] endpoint and something around I mean something around at least the legacy antivirus I mean

[00:06:45] right and so um but really where we see most of our customer start is what we call the trifecta

[00:06:52] and this is essentially advanced email security so not hygiene so one of the problems that we

[00:06:58] have in the industry is when people think email security what they're actually talking about

[00:07:02] is hygiene it's like oh spam got through yeah that's not advanced email security advanced email

[00:07:07] security is business email compromise detection account takeover uh and obviously advanced

[00:07:12] phishing and whaling techniques sure you need advanced email right you need advanced

[00:07:16] endpoint capabilities um and obviously the management detection response around that

[00:07:22] and you're talking about a shift from what an msp is probably already has some of the things that

[00:07:26] you're referring to as they should be doing like the more of the spam filter the those types

[00:07:32] of things and and what you're referring to is is they shift into sort of that security stack

[00:07:37] the trifecta is now what's being layered on top of that correct correct and then you should have

[00:07:43] security awareness uh training and obviously phishing simulation sure and those are like the three

[00:07:49] basics and again anyone can go buy you know a great email security a great endpoint and a great um

[00:07:58] you know tool for security awareness training sure problem is again we see people not operationalizing

[00:08:04] even those three what we call you know the trifecta very well well because you I mean I think one of

[00:08:10] the things that we used to see all the time is we would buy tools because they were shiny

[00:08:14] they allegedly solved the problem based on the line card and then we'd run into the brick wall

[00:08:19] because we weren't experts on how to implement and configure so allegedly we turned them on and

[00:08:24] in many cases we turned them right back off because we're like we're not getting any mail

[00:08:28] that's right no and it's amazing how many people out there have really good tools that aren't

[00:08:33] actually working at all or very well I'll use the edr like sure we use we use crotchbreak and

[00:08:38] sentinel one they're really really really good but they're not your av of old where you just

[00:08:44] right deploy them and let them run I mean they're have to tune them you have to tune them you have

[00:08:48] to use them you have to use them to look at stuff you have to watch adobe acrobat what's

[00:08:53] going on oh yeah that's not an approved application that's right that's right and so

[00:08:57] it's it's you get people are like well you know I need to upgrade my end point so I'm just going

[00:09:01] to buy a good tool and we're like right yeah we saw a lot of that when I was so once upon a time I was

[00:09:08] with an mssp it's getting further and further in my review but one of the things that we'd run into

[00:09:13] is we often came in after something bad had happened so they've gone through a forensics

[00:09:18] the fill-in-the-blank vendor had deployed something like a crowd strike and yep like so

[00:09:22] were we bringing this over to you does it go away and we're like well let's take a look at

[00:09:26] what the configuration was and oftentimes for forensics they just turned on default because

[00:09:31] they're just looking for the big anomalies that's right and then when we look at okay this is you

[00:09:36] know counterintuitive to the product you're using that goes alongside that so you know you don't want

[00:09:41] to run probably crowd strike and set in a one at the same time in the same environment that doesn't

[00:09:45] make sense and we would get a lot of those because you know of what had happened and so to

[00:09:50] your point like you know just getting a product because it's a good product doesn't

[00:09:53] necessarily mean it's the right product for the environment you're deploying it into

[00:09:57] 100 we call it the we call it the overlapping fence syndrome so you're building a fence around

[00:10:01] your property and what do you do is you put three pieces of wood right beside each other on top

[00:10:05] of each other then you leave this big gap and you put these other three pieces of wood

[00:10:09] on top of each other and you have another gap and then they go I don't know why I don't know how

[00:10:12] someone got through you can't talk but you can't knock the whole fence over because like it'll

[00:10:16] stop whatever runs into it it's just it has to run into where those three boards are exactly

[00:10:22] and so we we spend a lot of time with customers trying to optimize because there are things that

[00:10:26] you can do that if you do them well get you a lot of coverage sure classic 80 20 right if you do the

[00:10:31] 20% really really well you can get 80% of your coverage I mean you you literally are just defining

[00:10:36] in the security space the 20% rule is actually a big deal you don't have to do all of it you

[00:10:42] just have to get some of it I mean if we can stop some things it would slow down a lot of things

[00:10:48] right like I think that's one of the things that people miss like well it's going to happen

[00:10:50] to me anyways it's like well what if you could remove three of the 10 things from happening to you

[00:10:56] and those seven of the 10 the probability of them happening today is relatively low over the next

[00:11:02] 20 years relatively high and by the time you move forward you started to remove bits and pieces

[00:11:09] from that remainder that by the time we hit the 10-year marker or 15-year marker in theory

[00:11:15] bad things still haven't happened because you continued to pick away at those things that

[00:11:19] could have happened now we have the technology to to help with that the automation to help with

[00:11:24] that the people with the skill set to help with that you're 100% correct and so I think that's

[00:11:30] really where we spend most of our time is talking about what we call hanging the security stack

[00:11:35] together sure so if you if you hang the right tools that we know work and then they talk

[00:11:40] to each other and they're operationalized against each other and then they're running a

[00:11:43] consistent operational manner you can really get a lot of bang for your buck by doing all

[00:11:48] of that really well and so what we when we talk to customers it's like we have two choices you can

[00:11:54] either try to do all this yourself it's very expensive you got to hire the people the people

[00:11:58] have to have a really broad set of skills because they got to be deployment people they got to be

[00:12:03] like sort of you know there's a difference between someone who likes new tech

[00:12:07] sort of the cto and somebody who is good at day in and day out making sure that

[00:12:12] they're managing the thing well they love using the tools right they're they're trying to

[00:12:16] screwdrivers and adjusting and they're like oh this was too tight and or maybe I have the

[00:12:20] valve open too far those right yeah it's funny because you're tuning just what you're talking

[00:12:26] about with regards to tuning I mean it like literally deja vu we just had this conversation

[00:12:30] with the cis controls and I mean 1311 is to tune the security events and make sure that

[00:12:37] you know whatever the frequency is that you've settled on like you and I were talking

[00:12:40] about before like bad things can happen if the frequency is um yep we're gonna let you

[00:12:45] know once a week what we saw in the logs and we only check them on Friday so hopefully between

[00:12:50] Friday and Friday nothing bad's gonna happen to you because well we're only going to check it once

[00:12:55] a week and in some cases that frequency may be just fine but I think to your point that's

[00:13:00] largely tied to capability an msp probably has a lot of other things that are far more

[00:13:06] critical to the reason why they were hired by their client you know hey my printer doesn't

[00:13:11] work no kidding let's see what we can do about that but hey your your computer is running really

[00:13:16] really slowly well let's solve the printer problem first yeah yeah there's a it's a classic urgent

[00:13:21] versus important right and so we're we're we because we partner with a lot of msp's around the fact that

[00:13:30] doing good security like let's quit selling customers like sort of crappy security right

[00:13:36] just because they're like well the only thing I can afford is a dollar and you say well here's

[00:13:40] the thing for a dollar and then they have this false sense of security or assuming the product is

[00:13:44] the security right I think that's another fallacy that we hear all the time like I have these things

[00:13:48] how come it didn't save me it's like well you missed all the human elements that we were like you

[00:13:53] haven't done any of the phishing training simulations that we put in front of you because

[00:13:57] you said you didn't have time and I'm pretty sure what just happened is tied directly to one

[00:14:01] of those you know we have a phrase we use all time tools don't stop breaches right but at

[00:14:06] the end of the day there's a very big mindset in the industry that tools do stop breaches all right

[00:14:12] because the tools keep getting more expensive there's more tools to choose from they advertise and

[00:14:17] promote more things and in some cases unfortunately there are vendor tools that literally are

[00:14:21] advertised as we stop the following things from happening awesome that's what we need to hear

[00:14:28] and having done this for a long time like you have I've seen the most sophisticated companies

[00:14:34] have the most highly qualified tools still get breached right right and it goes back to the age

[00:14:40] old like just because you have them and you figured out where the on off switch is doesn't mean you

[00:14:45] should be operating that tool in the first place I wouldn't go out and recommend to people that have

[00:14:49] never used a chainsaw like hey so this is how it works here you go good luck or here read

[00:14:53] the manual yeah good luck but I mean it's it's insane how many customers we talk to that are

[00:15:00] still in the mindset of I've got email security it's email hygiene and I've got a relatively mediocre

[00:15:06] endpoint technology and they think they are fine I mean it is absolutely mind boggling how many

[00:15:12] customers are still in that mindset I remember back in the day you could turn on a windows machine

[00:15:17] fresh out of the box connected to the internet and get compromised with some sort of weird

[00:15:21] gobbly kook thing that was novelizing and you haven't even done anything yet so

[00:15:25] yep we know that hasn't gone away that's right well and the other thing is people don't realize

[00:15:31] that getting breached is just a matter of time so on my board is a guy by the name of general

[00:15:36] Keith Alexander he started us cyber command which is the and he's on two boards mine and amazons

[00:15:42] nice and you're like well why is this guy on on scott's board well he really feels strongly

[00:15:46] that the middle part of america needs better security sure and so he um he talked about

[00:15:53] the fact that like it is impossible for customers not to be breached not to be breached because

[00:15:58] it's inevitable he goes really the key piece is how fast can you detect it and how fast can you

[00:16:03] get him back out he goes so can you can you take a breach and just turn it into an incident right

[00:16:08] right so the exfiltration is not happening and the ability to get back to operational is

[00:16:13] reasonable within the time frame that doesn't have you closing your doors because you couldn't

[00:16:17] run payroll or otherwise bingo yeah two or three machines that get sort of have a problem great

[00:16:22] we stopped it we caught it we quarantined them we quarantine process the first whatever

[00:16:27] you've rolling back no harm no foul right that's very different than i've got call my insurance company

[00:16:32] right and i think um part of it is actually when we had this conversation a few weeks back

[00:16:37] um we're doing tabletop exercises and we were talking about words you are not allowed to use

[00:16:42] because of the implications of just using those words that to your point what you're talking

[00:16:48] about is if someone were to say oh my my machine's been compromised well that's very different than

[00:16:54] saying my data on my machine's been exfiltrated and i'm pretty sure we have a breach that we have

[00:16:58] to report to insurance that's right that's right i just said the b word i'm probably gonna get

[00:17:02] bleeped out by explicit content um so you get it and so what we're trying to do is really

[00:17:10] just help educate customers you know our core product we built was something called foundational

[00:17:14] coverage which was really like these are the basics that you put in place and if you do it

[00:17:19] so any of our customers get about a 40 discount on their cyber insurance because the cyber

[00:17:23] insurance industry was like these are the things that we want everybody to do and they're not

[00:17:27] doing it and so if you do it for them we'll reward them with a significant discount on

[00:17:32] cyber insurance and as far as i know we are literally the only company in america that

[00:17:37] you can buy their service and immediately get a massive discount on your cyber insurance

[00:17:41] policy is this across carriers or is this specific to you know carriers that you are already working

[00:17:47] with so it's across brokers so we got it you don't have to yep you don't have to switch out your

[00:17:51] broker the broker can just go to a couple of the underlying carriers that have signed up and

[00:17:55] they can just ask for a quote that's awesome we actually don't even sell it by the way we're

[00:17:59] just like yeah you're letting yeah hey if we know that if you have what we provide and you go talk

[00:18:05] to them and tell them that you have what we provide these are the things contact us say did

[00:18:09] they actually buy it we say yes they say great and then they just give them a quote so you talk about

[00:18:14] we've talked about a few of the the trifecta we talked about you know that obviously edrxtr was

[00:18:21] one of the things that we know needs to be in there you went beyond email spam filtering that

[00:18:27] kind of thing you talked about making sure that it was good phishing simulation training going on

[00:18:31] did we miss any of the trifecta yeah so those are the trifecta in foundational coverage we had a

[00:18:36] few other things so you know this most of the customers don't but most of the threats today

[00:18:43] are around identity sure and so some dns protection end point bingo so we actually in foundational

[00:18:50] coverage you get really good advanced dns security and you get very good user behavioral analysis

[00:18:56] security and that's all integrated and so the idea would be we can track the identities we roll

[00:19:03] everything back to identity and so anytime there's a threat against an organization we're not tracking

[00:19:09] back to the old days of 192.168 which is yeah I think everything's coming from 127.0.0

[00:19:15] for me exactly it's something to track down what that is and who yes um so we track everything

[00:19:20] back to user um and then obviously we track user behavioral analysis across all the tools plus

[00:19:24] some sim and other ueba that we have set up across the industry and so which contextually

[00:19:30] since you know post-covid with everybody working from home the identity piece is really the only way

[00:19:34] going forward we can really be successful and that's why like we get like classified sometimes

[00:19:40] like a modern mssp and the main reason for that is when we set up the service we literally set it

[00:19:46] up from identity going out sure this perimeter coming in which is where obviously most of

[00:19:51] the organizations uh set up their mssp structure well everything we've described gets into to

[00:19:57] your point if we could solve for the three of the 10 bad things that we know happen you know user error

[00:20:04] user um compromise or human compromise is like the number one like even when we look at the you

[00:20:12] know Verizon breach report it's talking about things that ultimately came down how they could

[00:20:16] compromise access so if they don't call it social you know um social engineering now it's

[00:20:22] called like you know system compromise you're like yeah but they social engineer to get to

[00:20:26] the system compromise well so the again it's funny when you talk mid-market and these are

[00:20:32] companies 2000 5000 employees i mean these aren't like you know 50 people they're still pretty unaware

[00:20:37] of the fact that identity is the primary threat vector i mean you still get a lot of like well

[00:20:43] i'm thinking about upgrading from some ab to crowd strike we're like great wonderful that's a great

[00:20:49] idea however you know if somebody logs in as scott and they're roaming around the network as

[00:20:54] scott um you know what are you going to do about and you don't and you don't know that they're not scott

[00:20:59] yeah like well i mean that you're talking about behavior analysis now like well this is the first

[00:21:03] time scott has ever decided to copy everything in the marketing folder and move it to the sales

[00:21:09] or wherever folder we literally caught somebody the other day doing exactly that and it's not

[00:21:14] you have to remember that's not malicious right well it's vicious yeah uh but that this

[00:21:22] happens all the time right like this and we talked about the bad the threat actors the outside

[00:21:26] compromise but internal compromise to ip and and and where data gets exfiltrated to doesn't necessarily

[00:21:33] mean someone dropped you know a payload in the environment we literally someone just said oh i'm

[00:21:37] gonna put this on my flash drive that's right so we we literally contact customer you know like

[00:21:43] just recently and said hey we this this has all the sniffing smells of somebody who's

[00:21:49] getting ready to leave the company or somebody's been breached and they're trying to exfiltrate

[00:21:52] data soon sure but we can't validate it because maybe they just got given an assignment that says

[00:21:56] go to these locations and download that data and we don't know that right and and this kind of goes

[00:22:01] back to legacy or the more traditional uh tools or even just having tools as an msp i think about

[00:22:07] products like netrics for your like yep we know that scott did this yep what do you want me

[00:22:12] to you know like we're alerting on this a no one's on the other end the phone's ringing

[00:22:17] no one's answering yep one in this particular case the customer's like went and checked on it sure

[00:22:22] enough the guy had just submitted uh his tenure uh his uh notice so oh geez yeah like there was a

[00:22:29] direct correlation on this one yep so um a couple of things um you you talk about um one

[00:22:37] of the things that you guys do is the annual ransomware assessment what that's the first

[00:22:43] time i've actually heard that like i can tell you like dude i think you got ransomware here's why

[00:22:49] but to do like a an annual like ransomware assessment what what does what does that look like

[00:22:56] so it's a mini consulting engagement it's included in the service and what we're trying to do

[00:23:01] is um help organizations because it's a generally speaking it's multi uh functional organization

[00:23:11] that has this that has the problem so what happens is you have this the security it team saying well i

[00:23:16] wouldn't got an endpoint product and then you've got the infrastructure team saying well i may or may

[00:23:21] not have you know meetable backups and so what we're trying to do is we're trying to pull together

[00:23:25] saying ransomware generally speaking across most companies there's a multifunction problem like

[00:23:30] here's how it would actually breach that because you don't have the you're missing these pieces

[00:23:35] that's right and so some of this isn't stuff we do we have partners that will do it but

[00:23:38] we'll say let's just walk through all the stuff that you need to be in a pretty good posture

[00:23:44] around ransomware and that includes by the way cyber insurance right so it's like

[00:23:47] if we don't sell cyber insurance this is like a subset of like a security risk assessment

[00:23:51] or a gap analysis you're you're saying let's these are great things to do but let's let's go even

[00:23:57] more granular and say hey look we know that cyber threats are probably the 80 percent of what

[00:24:02] is probably going to happen the most environments because of the issue between you know the

[00:24:07] fingertips and the keyboard yep compromise this happened can we get your data like what are the

[00:24:14] things that need to be in place to get your data back or to at least get back to we're not going

[00:24:19] out of business because yeah okay that's awesome i i've never heard that said that way that is a

[00:24:26] great for those of you listening you should be doing those you haven't figured out what those

[00:24:30] are um well then that means that you probably need an mssp to partner with it's it's a great

[00:24:36] little tool because well we spend a lot of time on just trying to help customers just get better

[00:24:41] i mean obviously we're selling a service but at the end of the day we've been doing this for 20

[00:24:45] 25 years and we're just like there's a lot of basics that um probably the example i use all the

[00:24:50] time which is it's like okay let's just say i really like a clean house and i've now set a goal

[00:24:55] for myself to make sure that every friday from four to seven i clean my house right and i'm

[00:25:01] going to go well guess what happens something happened on friday i get busy hey my family calls

[00:25:06] me hey you need to go run the store and then lo and behold i handle the front i do 30 minutes so maybe

[00:25:11] i clean the counter if i don't sweep and i don't mop right and then or i do an hour or i don't do

[00:25:17] any of it this is what every company is out there doing when it comes to security in like

[00:25:21] ransom and what we're saying is so what's the option well i can either hire like like try to

[00:25:27] force myself to do it or i can literally just hire a cleaning service who's literally the expert at

[00:25:32] cleaning and they're going to show up and they're going to clean it they're going to make sure nothing's

[00:25:35] missed well that's a common thing right and but then now you're getting into this so i'm going to

[00:25:40] ask this question because i think that's a great analogy and i think it's so true but not everybody

[00:25:45] can afford a cleaning service you're correct but as a company if if you don't do the cleaning

[00:25:51] service and then you're you go out of business it's a it's a reason to have it right obviously

[00:25:56] from a personal standpoint yeah but but i i guess my point is i think that it goes back to how this

[00:26:03] conversation started you know what are the tools what are the products and services that we need

[00:26:07] i can buy the best in class tools and i'm still not secure because all i've done is turn them on

[00:26:12] to your point i can i could hire a cleaning service and tell them to clean the following

[00:26:18] areas but i didn't have them clean the whole house because i didn't want to pay for it or i forgot

[00:26:22] about like oh yeah that room my bad that's on me it's like landscaping go oh yeah you didn't do the whole

[00:26:29] yard yeah we did the backyard the whole thing well i think of my yard is what has grass that needs to

[00:26:35] be mowed whether it's in the front of the house or the back of the house so so to your point like

[00:26:40] just because you can't afford it doesn't mean you can't bake it into what you need to be paying

[00:26:47] for as you start to scale and plan for i need to partner and odds are and correct me if i'm wrong

[00:26:53] here if i were to go out and buy a lot of these products and services myself directly and buy

[00:26:59] them from the vendors and taking into consideration fte time to get them stood up and the alerting

[00:27:04] and the apis to get stuff correlated i probably would have spent a whole lot less effort if

[00:27:09] not less money engaging in mssp correct i mean we've run the numbers backwards and forwards

[00:27:16] you're always going to spend less money using us than than doing yourself well i knew it was going

[00:27:20] to be that but i mean like generally speaking one would argue that the fte is if that was the only

[00:27:26] thing we were measuring there's no way msp who's not built a security stack and been doing it

[00:27:32] themselves for some time are going to have that and like you said you're going to miss

[00:27:36] something with one of your clients because getting to that consistent repetitive process is

[00:27:40] not easy unless you're adding them on a very frequent basis that's right and i think

[00:27:44] just to circle back on the other point about the cleaning service we obviously have inter-level

[00:27:48] services we have entry levels so foundational coverage is sort of like i can't believe most

[00:27:52] of our customers sort of end up there but we have ways of saying okay if if if budget is tight this

[00:27:57] year for whatever reason you just need to get going on the journey great yeah this is probably

[00:28:01] the most likely place it's going to get you a lot of bang for your buck the minimums right or

[00:28:06] as i like to say maturity starts with step one we don't mature to you know best in class

[00:28:13] in a perfect environment whether you're an msp or the client or even an mssp it's a journey that says

[00:28:18] you know you got to take the first step and as long as you go in the right direction

[00:28:23] each step is still an improvement just make sure that your journey isn't going

[00:28:28] the wrong direction because then all steps going forward as i heard

[00:28:32] someone say today then each step after that will also be wrong

[00:28:36] that's true so i mean you get it when it comes to the msp's we just we we spend a lot of time with msp's

[00:28:44] and we it's a very candid conversation which is where we do not want to get in their business

[00:28:49] so we very work very hard like we don't do vc so services we get asked to do all kinds of stuff

[00:28:54] that like 80 percent of the msp's do and so we just like listen you know we're not going to go

[00:28:59] deploy firewalls because you guys do that we can well obviously we know how to but that's a great

[00:29:04] service for you guys to go do go do it but do you really want to be taking the data from those

[00:29:08] and looking at that 24 by 7 365 and running a bunch of advanced analytics against it probably not

[00:29:14] i don't know many msp's that want to do that or that are good at it so we're like hand that off

[00:29:20] we'll do that heavy lifting and you guys do that and it's a great partnership so we have some

[00:29:23] really really great msp's but we're always looking for more because we get lots of customers

[00:29:27] that are like hey we need other stuff that we don't do yeah i appreciate it um i think this

[00:29:32] was a great uh insights into msp's what they do well where msp's can augment or definitely

[00:29:38] facilitate a maturity growth in the cybersecurity space ironically we got to talk about you know

[00:29:45] cis control number 13 that monitoring piece and i think it was funny because what we said in the

[00:29:51] in that um in that episode was that uh you probably as an msp are going to partner with

[00:29:58] somebody in order to do this successfully because the number one reason is the financial barrier

[00:30:04] um there's at least three or four safeguards in there that talk about what you're doing with things

[00:30:08] like kids and nids and nips and etc and and that data collection that data aggregation it's not

[00:30:15] cheap and then you got to put eyes on glass and i think that who's hiring the eyes on glass for

[00:30:20] something that if you were doing it on a scale you can watch a lot of that data flow with one

[00:30:25] set of eyes and smaller msp's do not have to watch all of their clients in real time 24-7 it goes back

[00:30:32] to what you said once a week is not enough that's right any last things to share with uh our audience

[00:30:39] where can they find you scott easy uh mine's easy scott at soul cyber it's sol spanish for sun

[00:30:46] soul sol cyber dot com uh soul cyber dot com obviously website and we're always looking

[00:30:52] for new partners we'd love to work with some of your msp partners and if customers ever have questions

[00:30:57] or anybody listening has questions around like how do you get started on the journey happy to

[00:31:01] have that conversation cool i appreciate it thanks for your time for those of you listening

[00:31:05] this has been msp 1337 thanks and have a great week