StorageCraft Technology Corporation

As long as there bad guys that are intent on wreaking havoc across corporate networks and personal computers, the IT security arena will be rife with opportunity for MSPs. According to Allied Market Research, the managed security services industry is projected to hit $40.97 billion in revenue by 2022. North America is expected to dominate the global market in terms of value, but the Asia-Pacific region could see the biggest returns as the region is slated to register a 20.3 percent CAGR during the forecast period.

Security Beyond Prevention

Executives in organizations big and small recognize the importance of securing confidential data. Unfortunately, the lack of IT skills and financial resources often makes adequate data security an insurmountable challenge. MSSPs provides these organizations with access to cost effective solutions that can significantly reduce their exposure to security threats while simplifying administration and putting requirements such as regulatory compliance in reach.

Managed security encompasses a broad range of applications designed to protect client networks. Many of these applications are based on the fact that prevention is the best form of protection. The typical intrusion prevention system (IPS) helps strengthen existing defenses by monitoring network traffic for potential threats. If trouble is suspicious activity is detected, the system blocks the threat to prevent it from compromising the network. While the prevent-defense theory certainly has its merits, it might be in the best of interest of MSPs to take their managed security aspirations beyond prevention.

IT research firm Gartner expects the focus on the managed security front to shift away from prevention and more towards detection and response as firms pour money into cybersecurity. That enhanced focus has led to the development of an emerging market segment called managed detection and response (MDR). It is built around the simple premise that prevention alone can’t thwart security attacks as the threat landscape continues to evolve. Further, in order to provide protection against sophisticated exploits, a security solution needs advanced detection capabilities and the ability to quickly respond when prevention fails.

Managed detection and response is founded on core principles such as continuous network monitoring, threat validation, and rapid response to confirmed exploits. The moment a legitimate threat is detected, the system sends an alert to security personnel, allowing them to focus on mitigation rather than wasting precious time trying to determine if a threat truly exists. MDR solutions aim to help organizations bolster their defenses by simply improving visibility into threats and placing a greater emphasis on responding to security incidents.

Competition and Challenges

The MDR market is currently comprised of two segments. Some vendors specialize exclusively in managed detection and response, while established MSSPs move to the MDR model. While exponential growth has been forecast, the seemingly slow transition could bode well for MSPs. Mike Buratowski of IT security firm Fidelis Cybersecurity estimated that only 15 percent of enterprise and mid-sized organizations will have implemented MDR by 2020. This means there is ample opportunity for MSPs to take advantage by catering to the SMB crowd.

One of the biggest challenges MSPs face in MDR adoption is the transition itself. Integrating new and improved security capabilities that align with existing services and IT systems requires a strategic coordination between people, processes, and technology. There’s also need for a substantial capital investment. While competition exists between pure-play vendors and traditional MSSPs, partnership opportunities may provide a smoother entry into the market. For example, eSentire, which Gartner recognized as a major industry player, appears willing to help MSPs that want to capitalize on the MDR trend.

Understandably, increasingly complex regulations and the ever-looming threat of a disastrous security breach has organizations on edge. By taking the initiative to combine risk management, advanced threat detection, and remediation into flexible managed solutions MSPs now can carve out a cozy spot in the IT security arena for many years to come.

View Comments

    • Hi John,

      I'm glad you asked! I believe your company is in New Zealand, is that correct? You'll probably want to contact our sales team in Australia at sales[at] or call +61 2 8061 4444. If you are interested in signing up in the United States or Canada, you can either submit an inquiry here: or contact our sales team directly at 801.545.4700 or via email at sales[at]

  • This is good news that Shadowprotect will be supporting Linux OS. What if we use the current iso to take backup of linux OS, can it work for backup and restore? Let me know.

    • Hello Vinod,

      Yes, we believe this is great news that StorageCraft will be releasing a CrossPlatform version of ShadowProtect which supports both the Windows and Linux platforms. We're very excited about this news.

      The current release of the ShadowProtect Recovery Environment - CrossPlatform is a positive step towards supporting the Linux OS. Currently this CrossPlatform Recovery Environment is intended only for backing up and recovering Windows OS systems (including Windows 8 and Server 2012). Another release will have the complete tools for backing up and recovering both Linux and Windows systems. I can tell you that this later release will be out before the end of the year. Until then, thank you for your kind comments and we we're looking forward to providing you with more information about this exciting update in the near future. Check back with us again soon.

  • Thanks, Casey. This was a really interesting take on the NSA's new local data center. Despite the privacy concerns, I'm excited to see what this means for the state. Silicon Slopes is definitely filling up with some great names!

  • Rather than placing it somewhere that looks nice or aesthetically pleasing, make sure that it is located at a place that allows proper circulation of air.

  • Wow is this for real? You cover how easily a host can get a virus and how the tech runs at the base level?

    Has a vmware host ever gotten hacked or got a virus?

    Has a windows computer ever gotten hacked or got a virus?

    I almost spit out my water when I read the part about Hyper V and stability. We have both Hyper V (2008 R2/2012) and VMware. Some REAL facts.

    * We have gone over a year on some of our vmware clusters with out patching or rebooting a host. NONE of our Hyper V hosts have reached 90 days.

    * Install and setup of a clustered Hyper V host takes about 10 times longer than a clustered VMware host.

    * Upgrading a Hyper V cluster....IS NOT POSSIBLE. You cant have two versions in the same cluster so you must build a new cluster and migrate the VM's over. The migration requires downtime for all VM's on a SAN volume. Ugrading a typical 8 node VMware cluster takes about 90min as upgrade the hosts one at a time and reboot them. (VMware supports mixed versions on a cluster.)

    * Many functions in Hyper V are POWERSHELL only. For instance you cant mass upgrade the "VM additions" in SCVMM unless a guest is off. In VMware you can highlight 50 (or more) running VM's and update the vm tools. It requires a reboot but the effort is 10x easier to complete.

    * We have NEVER had a VMware host go down, at all, not once. We have had MANY hyper v hosts drop all of their VM's for many different reasons. 99% of the time its YET ANOTHER hotfix you cant get from Windows update, to fix a storeport driver, or a MPIO issue, or a failover cluster issue. There is NO WAY we would run our production servers on Hyper V.

    * Drivers....for Hyper V you can get them from your hardware vendor (Dell, HP, etc) or Microsoft, or right from say Intel or Broadcom. Often MS Premiere support will tell us to go to the NIC drivers sight and get the driver vs the Microsoft driver or the Dell driver when we have a problem. you the ONLY drivers you need. Yes they re-package the vendor drivers but you get them from one source, they are tested and supported.

    A real comparison is not a technical white paper, its in the trench usage of these products.

  • Casey, congratulations on this blog post -- I could not agree more. I am the editor of the Varnex Insider magazine, and would like to talk with you about the possibility of publishing this blog in our next issue (with full credit to you and StorageCraft, of course). Please email me at the address I provided so we can talk about this. Thanks very much. -- John

  • Great post, thanks Casey Morgan for writing such an informative post. Every body knows the importance of backup but no one takes care of it. Thanks fro reminding and guiding for backups.

  • Another win-win with image-based backups which ShadowProtect delivers is the ability to take a full "base image" backup and then "incremental" backups which only capture the changes that have occurred -- greatly reducing the storage requirements for image-based backups.

    Then with ImageManager, you can consolidate the image chain over time, set retention policies and even take advantage of the new rolling consolidation feature in ImageManager 6.

  • 1 2 3 4 5 11