CONTACT US
We discuss a managed security services provider (MSSP) case of a private equity firm through its IT asset discovery using technology standards.

Managed Security Services Provider - Use Cases

   

In our fourth episode of the Managed Security Services podcast, Jerry and Kevin highlight some of their most significant before and after cases of clients using MSSP. From a large healthcare company who needed visibility over their IT assets to a small private equity firm that wanted to better understand the risk posture of their portfolio companies, learn from these real life case studies.


Transcript

Kelly Critelli: Hello and welcome back to EisnerAmper and Cloud Access podcast series where we're talking about managed security services providers (MSSPs). I'm your host, Kelly Critelli, and with us today is Jerry Ravi, EisnerAmper's Partner-in-Charge of Process Risk and Technology Solutions, and Kevin Nikkhoo, CEO of Cloud Access. In case you missed it, our last podcast dealt with the kind of reports a client should expect to receive and what they should do with that information once they obtain it. Jerry and Kevin, welcome and thanks for being here.
Jerry Ravi: Thank you, Kelly.
Kevin Nikkhoo: Thank you.


More Podcasts in This Series
Managed Security Services Provider - Best Practices

EisnerAmper’s Managed Security Services Provider Podcast addresses the best practices in security management, covering preventative and detective controls, risk assessment, data loss, and the importance of integrating all of those applications for management and audit.


Managed Security Services Provider - Reports

This podcast on Managed Security Services addresses the static report from your managed security services providers (MSSP). A report shouldn't be static and should show you all incident management events while also making the audit process and security monitoring easier.


Managed Security Services Provider - How to Prepare

When preparing to engage with a Managed Security Services Provider (MSSP), security monitoring of regular vulnerabilities ensure that all asset risks are monitored for vulnerabilities from hackers in an IT audit. The MSSP should be able to actually detect that.



* Required