Interviews - News - Analysis: For successful growth with Managed Security Services

No service runs without central monitoring

A key topic in the interview with Olaf Pelzer from comp4you is efficiency in the management and monitoring of the solutions on offer. "No product works for us without central monitoring," he emphasizes. The company therefore opted for SOPHOS as a provider that could adapt the monitoring capabilities to their specific needs. This enabled problems to be identified and resolved quickly, increasing customer satisfaction.

Early change as a success factor

Olaf Pelzer emphasizes that one of the key success factors for his company was the early move away from the traditional hardware and project business towards services. By focusing on services, they were able to free themselves from pressure from manufacturers and offer their customers tailor-made security solutions. This strategic change enabled them to react flexibly to the constantly changing requirements in the field of IT security.

Comprehensive security solutions

The company started with basic security products such as firewalls and endpoint monitoring to ensure operational security. Olaf explains that the continuous expansion of the portfolio to include mobile device management, backup solutions and email archiving was essential. New products are integrated on a regular basis, which allows them to stay at the cutting edge of technology and provide comprehensive security solutions to their customers.

Efficiency and centralization

Another key to success lies in the efficient management and monitoring of security solutions. Here, Olaf emphasizes the importance of central monitoring to quickly identify and resolve problems. By integrating technical monitoring systems, they can ensure that all aspects of the security solutions function smoothly. Close cooperation with the manufacturers is key to achieving optimum results.

Challenges in customer service

The complexity of security services is a challenge for both customers and IT service providers. Olaf explains that it is important not to overburden the customer and to make clear performance promises. Standard solutions for secure operation and guaranteeing functionality are essential in order to meet customer requirements without overshooting the mark.

Cooperation with manufacturers and responsiveness

In times of increasing threats, the company relies on cooperation with manufacturers to ensure round-the-clock monitoring and fast response times. They rely on manufacturer solutions that are the first to react in the event of an emergency and then inform the company. This approach ensures that problems are detected and rectified immediately without affecting the customer.

Customized options and risk management

Another important aspect is the provision of detailed service descriptions for the products offered. Customers can choose from various options as to how intensively they would like to use the services. This makes it clear that a certain amount of initiative on the part of the customer is necessary in order to minimize security risks. Customers who are not prepared to actively contribute to risk minimization are considered unsuitable for cooperation.

'In addition to the technical factor, what does the solution now do in relation to the actual focus - e.g. how good is a data backup solution technically - it is very important to us: How can we as an MSP manage the solutions efficiently? How can we roll them out efficiently? How can we monitor them efficiently? No product works for us without central monitoring.'

MSP Journey · Managed Security Services · Sophos & Olaf Kaiser · Portraitbild Olaf Pelzer
Olaf Pelzer
Comp4U EDV-Anlagen GmbH
Olaf Kaiser:

What are your most important success factors for Managed Security Services?

Olaf Pelzer:

We started to move away from the traditional hardware and project business very early on and focused on services. This approach displeased some manufacturers who couldn’t land us with their hardware bundles or similar offerings. However, it proved very successful for us as it allowed us to free ourselves from the pressure from these manufacturers. We have always been characterized by this service concept, both contractually and technically, and have maintained this focus.

Olaf Kaiser:

You have focused on the area of manufacturers and still offer a wide range of security services.
What is your focus?

Olaf Pelzer:

When we started, there were virtually no security gaps. Over time, the focus shifted more towards endpoints. Thus, the first products we integrated were firewalls, endpoint monitoring, and operational security. Data backup was also of fundamental importance, and we managed these areas very intensively.

Previously, the classic maintenance contract included many aspects: monitoring, management, etc. However, the products themselves were still treated as separate entities. In other words, there was a distinction between purchasing a solution and operating it. But for the customer, this distinction is irrelevant—they simply want things to work seamlessly.

Customers are increasingly realizing that they are overwhelmed by the current IT security situation. They come to understand that internal resources alone can no longer provide the necessary intensity and quality of security. We started with classic endpoint and cyber protection, and have since expanded to mobile device management, firewalls, backups, and email archiving. We continue to add one or two products every quarter.

Olaf Kaiser:

You said that it would be too much for the customer to actually manage all the services.
I think that might not be so easy for a system house either.
How do you deal with this facet?

Olaf Pelzer:

In addition to the purely technical aspects—such as how effective a data backup solution is or how well an endpoint protects against malware—it is crucial for us to manage the solutions efficiently. This includes efficient rollout, monitoring, and centralized management.

No product works for us without centralized monitoring. One of our key selection criteria is management within a central platform. We didn't opt for one of the major RMM providers; instead, we chose a solution that could adapt its queries and monitoring capabilities to our needs. For example, our firewall monitoring, which we use extensively, is actually recommended by the manufacturer itself.

Through this technical integration, we've achieved our goal of detecting problems very quickly. We ensure that the solution operates effectively in all aspects. Importantly, we strive not to exploit the customer. We offer secure operation as a standard solution and guarantee its functionality.

We don’t advertise an "all you can eat" flat rate, as that would be prohibitively expensive. Instead, we explain to the customer that we will manage their firewall to ensure they have secure Internet access at all times. This includes monitoring services, line availability, and VPN updates. Should a piece of hardware fail, we have a process in place to provide a replacement quickly and restore functioning Internet access. This concept has been very well received!

Olaf Kaiser:

I would like to stay with complexity and the service concept that you described.
What is your strategy here?

Olaf Pelzer:

At some point, we found ourselves in a situation where we had to rely on the manufacturer’s own response solutions and made this very clear to the customer. We can handle normal operations without issue. During regular working hours, we can be fairly certain that nothing malicious is occurring. However, when it comes to detecting unknown attackers around the clock, we are at a disadvantage.

Given the speed of current attacks, most customers really have no choice but to develop capabilities in this direction. Over the last 12 to 18 months, we've observed that customers are very open to fully automated 24/7 monitoring systems and the handling of potential attacks. We were even surprised by how quickly customers acted on this. This trend spans from small businesses with 5 to 10 users to larger ones with up to 500 users.

Olaf Kaiser:

Then a reaction chain comes into effect in which you play a role again. How does this work in the event of a discovery?

Olaf Pelzer:

The provider we have chosen offers several action options when an incident is detected, meaning when an event is identified that potentially threatens the network. To ensure speed and efficiency, we have selected the option where the manufacturer acts first and then informs us. This approach helps us avoid situations where a customer is left vulnerable because one of us is unavailable and the manufacturer has attempted to contact us.

Olaf Kaiser:

Do I understand correctly that the operation of the services is included as a performance commitment? And if something does happen, there is also another action plan. And there is then a regulation on how to deal with these additional expenses, right?

Olaf Pelzer:

Yes. We have a detailed service description for our products. You can choose different options for each product, depending on how intensively you want to use it—whether it's just for basic operation or if it includes additional features like enhanced availability and response times. Fortunately, apart from one case in the last ten years, we've never had to actually restore a system.

When a customer requests extensive coverage, it's usually because they want all risks covered but are often unwilling to take steps to minimize those risks themselves. We recognize this relatively quickly. If a customer insists on a basic level of protection and doesn't align with our proactive approach, we unfortunately have to conclude that they might not be the right fit for us. In the past, some customers believed that purchasing a solution meant they didn't need to worry about the rest. Today, that approach is outdated, as the potential loss of reputation and production cannot be covered by insurance alone.

MSP Journey · Managed Security Services · Sophos & Olaf Kaiser · Portraitbild Olaf Pelzer

Profile

We are passionate service providers and love what we do. We are specialists and proud of our expertise and experience. And you are the focus of our attention. Guaranteed.
Olaf Pelzer
Managing Director
Comp4U EDV-Anlagen GmbH
Robert-Bosch-Strasse 5
63225 Langen

Related articles

MDR is not a technology, but a service

From the customer's point of view, it is about how Managed Detection and Response (MDR) is used to test and introduce stronger security performance and, from the MSP's point of view, how a central MDR service is linked to important systems via APIs through to the establishment of alarm chains.

Managed firewall in focus – from service definition to reporting

What services - both planned and unplanned - are included in your managed firewall packages? How can the customer purchase the whole bundle of hardware, software and services? All as one fixed monthly price? Are there really helpful reports for customers from the firewall? Which services are not included and are provided on demand or on request at the firewall? How do you deal with customers who already have another firewall in use?

Ongoing development as a model for success with managed security services

Everything you need to know about setting up Managed Security Services: How is the security model structured? How do customers decide between the three modules for endpoint protection and what tips the scales in favor of the higher variants? What is the customer response to your managed approach? Does the monthly notice period play an important role for you? Which automations are most important to you?