Tech Data and OPAQ Sign U.S. Distribution Agreement to Provide Network Security-as-a-Service

Tech Data was selected by OPAQ to offer its cloud-based platform that protects the entire IT footprint

CLEARWATER, Fla.–(BUSINESS WIRE)–Tech Data (Nasdaq: TECD) today announced an agreement with OPAQ to offer the company’s cloud platform, delivering network security-as-a-service and hyperscale performance to U.S. service providers. OPAQ’s Security-as-a-Service from the cloud is a rapidly emerging area of security, and OPAQ’s platform protects an organization’s entire IT footprint, including on- and off-premises endpoints, mobile devices, IoT, dynamic multi-cloud architectures, branch offices and legacy platforms.

The OPAQ cloud platform enables service providers to deliver robust network security services in a simple, cost-effective and flexible way to their customers from a single cloud console. With OPAQ, service providers can monitor, secure and manage client networks and deliver comprehensive enterprise-grade security. This offering from Tech Data allows customers to avoid having to buy the often-expensive security products necessary today, as well as procure the hard-to-find resources to manage them.

Read the full press release here.

Quick Fix for Those Still Not in Compliance with NIST 800-171

Software-defined network segmentation puts you in compliance and is fast, simple to implement


For many federal agencies December 31, 2017 was the deadline to have their contractors who store, process, or transmit Controlled Unclassified Information (CUI) align with the NIST 800-171’s security requirements.

With more than 100 information security requirements, no doubt many contractors, burdened by the complexity and costs associated with meeting these requirements are still looking for answers.

They don’t want to be deficient and may dread the next audit – that may put real business opportunities as well as risk to their business reputation. So what can you do?

Software-Defined Network Segmentation: Shrink Scope. Strengthen Security.

One of the quickest and simplest things government contractors can do is to segment the network so that network devices that are processing or storing controlled unclassified information (CUI) are isolated from the Internet. But before you spend time and money  configuring VLANs, routers, and switches to achieve this, you need to know there’s a simple way to do this.

OPAQ’s software-defined network segmentation is a groundbreaking approach that provides unparalleled visibility and control over workstations and servers. It enables organizations to provide users with access to the resources they need while reducing attack surface, locking down attack vectors, and reducing NIST 800-171 compliance scope.

This capability is just part of the Endpoint Protection capabilities that are integrated into the OPAQ security-as-a-service cloud, which you can receive on-demand for a per user cost. This enables you to deploy OPAQ endpoint agents on network workstations and devices and you can simply manage and enforce security policy from a single cloud console. In addition to reducing compliance scope, OPAQ’s Endpoint Protection gives you the ability to:

  • Continually inventory all devices communicating on your network
  • Gain visibility into east-west traffic and investigate incidents
  • Limit attack surface by segmenting the network and preventing threat propagation
  • Quarantine suspicious hosts

See how easy OPAQ’s security-as-a-service cloudcan help you be compliant with NIST 800-171 while extending best-of-breed security throughout your entire enterprise, including your remote offices and mobile workforce without the need to invest in on-premise security infrastructure – let’s talk, or request a demo.

CRN Lists OPAQ’s Wayne Johnson as a Person to Know in 2018

Wayne Johnson is OPAQ’s Regional Vice President of Channel Sales for the Midwest. He was recently named to CRN’s 2018 100 People You Don’t Know But Should list.  Here’s why…


Q: You joined OPAQ about a year ago. Tell us a little about your background.

I’ve been in information security over 20 years and in the managed security service space for over 10 years. I’ve been able to earn the trust of my solution provider customers what they need, when they need it. I have hundreds of trusted friends in the industry.  Service providers answer the phone when I call them, so I know what I am doing works.


Q: What attracted you to OPAQ?

The leadership. Chief Strategy Officer Ken Ammon and CEO Glenn Hazard are thought leaders. Leadership makes a company successful.  Most companies have great products, few have the management team to be successful.


Q: What are the biggest changes you’ve noticed in the security space in the past five years?

The need for automation and making quality security affordable to the Mid-Market all the way down to the endpoint.  Did I say Automation? It’s key because in today’s world it’s all about monitoring and response, not building and patching which unfortunately is what most information security engineers still like spending their time on today. Time is not on the good guys side.  Good security programs support the business and CISO’s are seeing how they can do that now through automation of their security products and services.


Q: You founded the Chicago CISO Dinner Peer Group and Chicago Area CISO of the Year Award Program. Tell us a little about those initiatives and why you started them.

Back in 2002, I saw a need for Chief Information Security Officers to peer because the position was new, and many were looking for help. I created the Chicago CISO Dinner Group, a peer group for CISO’s to seek answers from CISO’s in a vendor free environment. In 2007 when they spoke about the lack of recognition from the C Level community I took it upon myself to change that. It took me three year’s, but with the support of five local IT associations vendors in the Chicago area I was able to create the Chicago CISO of the Year Award Program. We are now in our 6th year, helping CISOs be recognized for their hard work.


Q: What challenges do CISOs most often cite in your monthly meetings?

There is so much noise out there now, with so many vendors and products. Deploying, managing and training staff on so many different point products is not sustainable. They want more automation, not more tools than create more for their under resourced teams.


Q: What advice would you give to a first time CISOs?

Surround yourself with a great team and join CISO groups to meet peers you respect and trust who can be mentors and provide advice when you need it.   Seasoned CISO’s have been there and done that, it’s hard if not impossible to do it alone in today’s ever-changing security world.


Q: Chicago is known for deep-dish pizza, the classic Chicago-style hot dog and the Italian Beef. What are your favorites?

All three, but a good Chicago all beef hot dog with everything and extra sport peppers I can eat every day, along with a good ‘wet’ beef with sweet or hot peppers.  Of course, I love deep dish pizza too.

Together, OPAQ & Palo Alto Networks are raising the bar for small and medium-sized businesses

Small and medium-sized businesses face a unique set of challenges protecting their networks from attack. Beyond the constraints of budget and the availability of talented people, many of the best security tools & technologies are designed with large enterprises in mind. They are often architected for large footprint deployments and packaged in way that places them out of reach for smaller organizations. This makes small and medium-sized businesses a particularly attractive target for computer criminals, who know they can get access to valuable information in environments that may be struggling to implement effective controls and countermeasures.

Through our partnership, OPAQ & Palo Alto Networks are working hard to address these challenges. We’re proud to have been invited to participate as a Platinum Sponsor of Palo Alto Network’s 2019 Sales Kickoff event this month in Toronto. We’ll be there exhibiting solutions that we think will change the game in a major way.

Enabling a Network of Service Providers

A keystone of our strategy is to engage with security service providers. Small and medium-sized businesses need trusted advisors who understand their business and can help them mature their security programs in the right way. We recognize the essential role that service providers play, and our mission is to enable them with tools that have the right fit for their customers. This is why OPAQ announced in January of this year a pivot to a 100% channel based sales model.

Every technology that we build at OPAQ has been designed from the ground up to meet the needs of service providers. A few examples include our unique policy management interface, which makes it easy to set customer security policies across multiple control technologies from a single place. Our zero-trust endpoint technology, which provides visibility and control deep within client networks without having to go on-site. And, our reporting engine, which is specifically designed to enable service providers to illustrate the value of the work they’re performing on behalf of their clients, and facilitate conversations with clients about specific gaps in their security programs.

The Firewall-as-a-Service Model

The way to make network security technologies more accessible while achieving economies of scale is to provide them from the cloud as a service. Clients who are serious about security should accept no substitutes in terms of the protection capabilities they are deploying. We start with best-of-breed next generation firewalls from Palo Alto Networks. The intrusion prevention capabilities, threat intelligence, and Wildfire 0-day malware and exploit analysis engines that are built into the Palo Alto Networks platform are second to none.

We deploy Palo Alto Networks firewalls in OPAQ’s high performance cloud infrastructure at multiple points of presence throughout the world, and allocate fractions to serve each individual customer. The service can scale down to handle small offices with a handful of employees, it can scale up to facilities with thousands of end-users, and it can grow elastically as each client’s needs change. New customer networks can be rapidly connected with a hardware edge device or virtual appliance from OPAQ, in a variety of standalone as well as high availability configurations. The result is that service providers can quickly deploy security capabilities that their customers know and trust, which are scaled to fit demand.

Zero-Trust Software Defined Network Segmentation

Security professionals increasingly realize that we need to operate networks on a Zero-Trust footing to contain sophisticated threats. Moving network security devices from the edge into the cloud provides flexibility and economies of scale, but it is also important to segment internal networks properly to prevent the propagation of malware within them, and service providers need the ability to do this remotely.

This is where OPAQ’s ground breaking endpoint segmentation software comes into play. OPAQ’s software dynamically controls the firewall policy on each endpoint in real-time, providing service providers with full visibility into east/west traffic within client networks and the ability to control that traffic. Incident responders can use this capability to quickly investigate security incidents on the internal network and take action to remotely quarantine infected hosts. OPAQ’s policy management interface also allows granular internal policies to be defined, based on user and host identities as well as IP address ranges, which are automatically synchronized by the OPAQ platform between endpoint and network firewalls.

OPAQ and Palo Alto Networks are Raising the Bar

OPAQ’s Zero-Trust endpoint technology and Palo Alto Networks’ Next-Generation Firewalls work in concert through the OPAQ platform to enable security service providers to deliver an unprecedented level of protection to their small and medium-sized clients. These advanced security capabilities were previously inaccessible in a cost effective manner, but now they can be deployed rapidly at a scale that is right-sized for these clients, with a platform that is elastic enough to grow with them.

Gartner Hype Cycles: Why You Should Believe this Hype

Can there be any more security buzz flying around in the market today? With an estimated 1,600 security vendors each espousing their own rhetoric as to why you just can’t survive unless you have their latest doohickey, it’s no wonder that executives are confused about what’s a smart security investment.

Industry analysts are doing what they can to help executives navigate the complexities of the security market. The sheer number of security categories, sub-categories, and sub-sub-categories is simply astounding, and can further complicate things. And just when you think you have a handle on the latest security trends and you’re confident you know exactly what it is you need, a new threat, new trend, or new technology emerges and makes you re-think everything yet again.

451 Research keeps a close eye on the security market, producing a variety of insightful research including Impact Reports, which feature different companies and independent perspectives on the strengths, weaknesses, opportunities, and threats (SWOT) of those companies. In fact, you can see an Impact Report on OPAQ here.

Gartner also produces a variety of research reports. Some of the most popular reports are the Gartner Hype Cycles, which can be useful as visual guides in helping executives assess different types of security technologies. Two Gartner Hype Cycles that were released earlier this month were the Hype Cycle for Threat-Facing Technologies and Hype Cycle for Enterprise Networking and Communications (these reports are accessible only to Gartner subscribers). The former Hype Cycle features security technologies that aim to “prevent and protect IT systems and applications from attack, enabling fast and effective response.” The latter Hype Cycle features technologies that can help executives to “evolve their networks to support functional and strategic business requirements” and “support digital business initiatives and new business models while also providing flexible, resilient, and scalable connectivity.”

As different as these two Hype Cycles are, there is a common thread – Firewall-as-a-Service is a category represented in both, which features the need for tight integration of networking and security, as well as for automation and orchestration. It’s the first time that Firewall-as-a-Service (FWaaS) is represented in the Hype Cycle for Enterprise Networking and Communications. In both Hype Cycles, it’s defined as “a multifunction security gateway delivered as a cloud-based service or hybrid solution. The promise of FWaaS is to provide simpler and more flexible architecture by leveraging centralized policy management, multiple enterprise firewall features and traffic tunneling to partially or fully move security inspections to a cloud infrastructure.”

With a benefit rating of “High” the business impact of FWaaS “offers a significantly different architecture for branches or even single-site organizations. It also offers greater visibility through centralized policy, increased flexibility and potentially reduced cost by using a fully or partially hosted security workload.” OPAQ is referenced in both Gartner Hype Cycles as a sample vendor providing FWaaS, with serious enterprise-grade Next-Generation Firewall protection powered by Palo Alto Networks.

The as-a-service business model in security is not going away – it’s more than hype; it’s a mainstay. Integrating networking and security into a single cloud service that is simple to deploy and maintain eliminates cost, complexity, and much of the feature-focused security noise that plagues executives pondering smart security investments.

Why Gartner Named OPAQ a 2018 Cool Vendor

On June 1, after an in-depth evaluation, leading technology research firm Gartner named OPAQ one of only three Cool Vendors in Security for Midsize Enterprises (MSE) for 2018.

According to the report, “These vendors offer a compelling combination of innovation and midsize enterprise suitability. Midsize enterprise IT leaders responsible for security and risk management should familiarize themselves with these impactful approaches to improving security posture with finite resources.”

What makes a hot company a cool vendor? Gartner’s definition of a Cool Vendor is a small company offering a technology or service that is:

Innovative — Enables users to do things they couldn’t do before

Impactful — Has or will have a business impact, not just technology for its own sake

Intriguing — Has caught Gartner’s interest during the past six months

Gartner analysts stated: “Security-as-a-service vendor OPAQ is cool because it can provide MSE IT leaders with a caliber of managed network visibility and control — at a predictable operating expenditure price — that is typically out of their reach. MSEs that lack staff expertise to manage and monitor multiple network security appliances and consoles can benefit from the OPAQ Cloud.”

Gartner released the Cool Vendors report just prior to the start of its 2018 Security and Risk Management Summit. Several of us from OPAQ attended the event, which drew an increasingly larger audience of midsize enterprises who value Gartner’s insights on the technology landscape and emerging trends.

We were delighted to see OPAQ referenced in analyst sessions and in presentations. Moreover, we were excited to hear that OPAQ was being discussed by executive attendees to analysts during their one-on-one analyst meetings.

There is no doubt that the security-as-a-service solution OPAQ delivers will be a mainstay in a market that is embracing simplified, cost-effective enterprise-grade security from the cloud.

We’re extremely proud of this recognition from one of the most highly respected analyst firms.

MSSP Metrics: Key Risk Indicators (KRIs)

Key risk indicators (KRIs) are used to measure future adverse impacts of events and activities. They are widely used in areas such as healthcare, operations, and disaster risk management. KRIs use existing system and security sensor data to calculate residual risk due to IT operations.

The inputs are similar to a combination of SIEM, GRC, and threat intelligence systems; the output is continuous, objective, actionable metrics. With easy-to-understand and security-posture relevant metrics, technology leaders can design measurable goals and communicate the status and health of security operations to business leaders for decision making purposes.

A platform that supplies KRIs approaches risk measurement differently from traditional systems:

  • Observed Behaviors Across the Enterprise. The platform collects information on actual events observed in the enterprise – not theoretical “possibilities” based on predictive analytics. The concept of false positives does not exist because only real, live events reported by sensors are observed and go into the calculation of a risk indicator.
  • Residual Risk. Even with all cyber defenses in optimal configuration, risk factors ebb and flow throughout enterprise systems. The platform collects evidence and calculates risk factors, tracking and reporting on residual risk. This is the risk that really matters, and not, for example, theoretical risk due to “intelligence” of activity on the internet.
  • Normalization, Quantification, and Context. The platform applies machine learning and advanced statistical analysis to determine what is normal, what is important, and provides context around both of those in the form of calculations or reports.
  • Continuous, Objective. Audit results tell a story of compliance around a point in time. Manually compiled reports are unreliable. KRIs measure risk and activities in real-time directly from sensor outputs, offering a continuous and consistent view of activities independent of interpretations, audit schedules or quarterly reports.

KRIs can “roll up” the stream – which is more like a fire-hose – of sensor data into easy-to-understand metrics:


What vulnerabilities are you susceptible to, and what steps do you need to take to resolve those issues?

The key here is not to bludgeon or overwhelm your customers with problems. There might be dozens of new vulnerabilities being discovered on a daily basis, but only one or two of them are actually relevant to the customer’s critical IT environment. (On the other hand, if all of them really are noteworthy, then you have bigger issues to deal with.)

Threat Intelligence

What threats in the wild are you susceptible to, and what steps do you need to take to resolve those issues?

Your approach to threat intelligence should be very similar to how you approach vulnerabilities. Customers should be able to easily answer questions such as:

  • Is there any evidence that I have been breached by one of the well-known threats?
  • Does my MSSP regularly conduct threat-hunting missions in my environment? How many of these missions have occurred in the past week or month?
  • Is my MSSP finding evidence of data breaches or attacks against my industry peers?

New Threats

What are the most recent threats to appear in the cyber security landscape?

One extremely important IT security metric is the number of new threats that the customer has faced recently. If this figure is steadily increasing or has seen a rapid spike from normal levels, it is a strong indication that the customer is on the receiving end of a targeted attack, or will be in the near future.

New threats are often more dangerous because clients and MSSPs likely do not have a prescription ready to handle them.

Defense Effectiveness

Are attempts to shut down a threat or eliminate a vulnerability effective?

When you try to patch a security flaw, you need to know that you have resolved the problem and that it will not continue to resurface every few days or weeks. Just like treating an illness, successfully handling cyber security issues means that you identify the root cause of the matter, instead of just addressing the symptoms, then remove it.

Severity and Velocity

Is your environment getting better or worse in terms of the pace and intensity of threats?

Of course, any company above a certain size will be the target of probes and attempted attacks from malicious actors, and many of them will already have fallen victim to a breach. However, an increase in the leading indicators of attack activity, such as the pace or severity of events, is a clear sign of a targeted attack or client industry-wide focused campaign.

Metrics that show severity and velocity will allow you to easily pinpoint the concentration of this kind of attack, allowing you to react quickly.

Surface Area

Is there a dramatic increase or decrease in the number of hosts showing activity on your network? Are there any major critical or high events against my critical monitored assets?

A significant spike in the number of hosts showing defense activity, such as a tenfold increase from 100 to 1,000, could indicate that attackers are broadening their scope. Of course, it could also be due to a benign event, such as the acquisition of a new company and the merger of the two networks. Whatever the reason, such an anomaly needs to be identified and examined by security experts.

Another consideration for surface area is the location of your critical assets. You would expect that parts of the network such as the DMZ are more susceptible to would-be attackers trying to expose issues and create holes. These events are definitely important, but far more important would be something like a sudden increase in the number of high and critical events against your customer’s financial data. In this case, you should look into the problem immediately and find out what’s going on.

Architectural Maturity

Are your tools working to identify, detect, protect, respond and recover as you need them to?

MSSPs might fill out an OWASP Cyber Defense Matrix on their clients, to keep track of how well each customer’s security architecture is performing and compliance framework is being covered. This will give you a clear picture of where you are, what you are missing and how you will resolve it along the way.

Why FourV and OPAQ Joined Forces

I’m pleased to be writing this post as a member of OPAQ Networks, following the announcement today that FourV Systems has become part of the OPAQ family. Our two companies share a common focus — empowering MSPs and MSSPs with security automation to help them gain greater visibility and control while substantially simplifying the management of their customers’ network and security architecture.

FourV’s patented GreySpark solution provides continuous security metrics, compliance monitoring and reporting. And the OPAQ security-as-a-service platform integrates comprehensive enterprise-grade security capabilities with a private software-defined network backbone. Together, we’re delivering the single most effective and efficient tool that MSPs and MSSPs can use to:

  • Identify what security controls should be prioritized;
  • Manage and enforce best-of-breed network security controls; and
  • Demonstrate and communicate the value of security services to technical and non-technical decision makers

Beyond this natural technology “fit”, several other factors convinced FourV’s management that we could achieve goals more quickly as part of OPAQ.

OPAQ’s platform is built to address a market that we at FourV also believed is both underserved and critically important – the midsize enterprise. These companies often find challenges in applying the personnel and financial resources needed to acquire, deploy, and manage the type of security infrastructure required to properly fend off today’s advanced threats. OPAQ’s cloud platform levels the playing field, packaging their best-of-breed security platform in a way that is accessible for midsize enterprises while also making it simple for service providers to manage.

OPAQ’s leadership team and support teams are also extremely experienced in our space. Glenn Hazard and Ken Ammon certainly ‘get it’ when it comes to the intersection of business and technology needs of service providers and the midsize enterprises they support.

The FourV solution serves as a complementary addition to the OPAQ cloud platform. An assessment of the security operations performance and compliance maturity is often the first step MSPs and MSSPs need to take with their clients in order to provide trusted recommendations to reduce risk and exposure. We could not be happier that we are now a part of an organization whose platform enables those MSPs and MSSPs to meet the needs of their clients by giving them the ability to instantly deploy and manage enterprise grade security.

Want to learn more? See how simple it is to get started with OPAQ.

Game-Changer: What OPAQ’s Selection of Palo Alto Networks Really Means

We’re thrilled to have announced our partnership with Palo Alto Networks, which opens up tremendous opportunities for our MSP, MSSP, and VAR partners to deliver enterprise-grade security-as-a-service from the OPAQ Cloud.

This is a huge deal. This agreement furthers OPAQ’s mission to provide fully integrated networking and enterprise-grade security as a simple, cloud-based service. It means that OPAQ partners are empowered with:

  • A subscription model designed to make enterprise-grade security affordable and accessible to midsize enterprises. The traditional approach to security has put enterprise-grade security that midsize enterprises need out of their reach because it’s too costly and complex to manage. The OPAQ Cloud is a game changer – it makes enterprise-grade security accessible and affordable to midsize enterprises. This means new, lucrative revenue opportunities for partners.
  • Fortune 100-grade network security that’s known and trusted. The OPAQ Cloud integrates best-of-breed security capabilities that are powered by known, trusted security technologies, such as Palo Alto Networks, and other industry leaders and unique OPAQ intellectual property.
  • Cloud network engineered for speed, strength, and flexibility. OPAQ owns and operates its own private network backbone. In addition to integrating best-of-breed security capabilities into the fabric of the platform, OPAQ optimizes the speed and performance of network traffic by leveraging transit and peering relationships with world-class providers.
  • Single interface designed for simplified management, compliance, and reporting. The OPAQ 360 portal provides a single pane of glass where all customer security policies and network traffic can be centrally managed and enforced — all without the cost and complexity associated with managing dozens of security products from multiple vendors.

We chose Palo Alto Networks because they are a proven technology leader in next-generation security technologies. Bringing Palo Alto Networks into the OPAQ Cloud makes enterprise-grade network security much more accessible for midsize enterprises and manageable for solution providers supporting midsize enterprises.

For more information on OPAQ’s partnership with Palo Alto Networks, read the press release here.

Business Risk Management: How MSSPs can Create a Risk Dashboard for Clients

Many Managed Security Services Providers (MSSPs) provide risk dashboards to their clients. Not only do these dashboards provide an overview of enterprise IT risk, they should (in theory) enable conversations around what actions need to be taken with respect to risk exposure, as well as requests for services from the MSSP or increased budgets.

Regular communications will help you gain buy-in from other executives — agreement on the client’s risk appetite, and what risks they can accept, must mitigate, can transfer, or should systematically avoid. Done correctly, this dashboard makes the decisions about IT risk management accessible to all executive team members — no matter their level of technical expertise — and facilitates the communication between service provider and client in a way that fosters longer term relationships.

But how do you create a risk dashboard that empowers you to communicate an accurate picture of IT security health in a way that resonates with the business leaders in your client’s organization without breaking the bank with analyst labor?

Unfortunately, building a risk dashboard from the raw data can be difficult: you need to pull together data from a wide range of security logs, analyze it and build a risk model that gives a clear and comprehensive overview of risk in your client’s organization. In order to have the credibility required for effective and objective communication, the model has to transform complex technical data into understandable and contextual metrics, while retaining links and transparency to the underlying data sources.

Consistent Metrics — Not Hype

When you create a risk dashboard, avoid sensational latest threats or the hottest trends in favor of consistent and well-understood metrics.  While the latest hot topic will get some attention in the short run, it is a poor measure of risk to the organization or your service performance.  The client will quickly tire of the never-ending onslaught of possible breaches that have no context to their business operations.

You could adapt the dashboards you use as time progresses, in order to reflect the ever-changing cyber security landscape.  However, you should balance this with consistency in metrics and reporting. CEOs and other business leaders want dashboards that allow them to measure security performance over time, so your dashboard should display a consistent handful of metrics that tell that evolving story of your client’s IT security health and what it means to their business operations.

Avoid Making Your Dashboard Too Technical

Remember that a risk dashboard is a tool that facilitates communication between your highly technical staff and nontechnical executives within your client’s organization. Therefore, you need to ensure that your dashboard can be understood by a nontechnical audience. Even though the data that goes into creating your dashboard is likely going to be highly technical, you need to avoid inserting too many technical details into the final product.

For example, you might have one or two vulnerability metrics that you create from the number, severity and age of vulnerabilities.  Another might measure defensive activity, calculated from the volume and severity of events reported by security systems (firewall, anti-virus, etc.), and if you have a SIEM, you can show metrics that tracks alerts from correlated events.

Regardless of the metrics you decide on, you should always overlay business importance of the affected systems.  That will allow you and your client to prioritize resources and make operational decisions.

Additionally you may consider reporting on threat intelligence that is specific to the context of your client’s environment.  But, please, translate the tech-speak of that threat intelligence into business terms that make sense.

Final Thought

Many MSSPs are still experimenting with different ways of communicating data in a dashboard format, since the concept is still somewhat in its infancy. To stay ahead of the curve, focus on creating dashboards that present metrics in a business-focused context, so that people who are not security experts can use them to learn more about risk in your organization.  On the back-end, however, make sure your analysts have the tools they need to explain the metrics, should the need arise.

By taking the time to design a clear and relevant dashboard now, you can continue using the same dashboard for many years to come, improving the consistency of your reporting.