{"id":776,"date":"2011-08-30T11:39:56","date_gmt":"2011-08-30T15:39:56","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=776"},"modified":"2015-07-26T12:04:27","modified_gmt":"2015-07-26T12:04:27","slug":"exploring-ways-to-reduce-information-security-cost","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/","title":{"rendered":"Exploring Ways To Reduce Information Security Cost"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/wad-of-money.jpg\"><img decoding=\"async\" class=\"alignright size-thumbnail wp-image-796\" title=\"wad-of-money\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/wad-of-money-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Businesses today have myriad information security demands. From personally identifiable information to payment card data to intellectual property, businesses need to secure many types of data to meet compliance regulations, protect their brand and safeguard their customers\u2019 information. But cost, staff resources and know-how can hinder many businesses\u2014particularly small to medium-sized organizations\u2014when it comes to data security.<\/p>\n<p style=\"text-align: justify;\">Engaging with a Managed Security Services Provider (MSSP) to support such\u00a0\u00a0 information security needs can offer many benefits:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Cost savings: Costs for managed security services (MSS) are generally lower than hiring in-house full-time experts. MSSPs are able to spread their investment in infrastructure and people across hundreds and thousands of clients.<\/li>\n<li>Staffing: shortage of qualified security personnel puts big pressure on businesses of all sizes to recruit, train and retain their security staff.<\/li>\n<li>Skills and security awareness: MSSPs have better insight into evolving security threats directly and indirectly because of their focus and wider installed customer base.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">MSSPs provide objectivity, independence, dedicated facilities, and round-the-clock service. Whether the challenge is meeting PCI DSS requirements or managing multiple security technologies across many locations, MSSPs can help overcome the challenges of the three C\u2019s: cost, compliance and consolidation.<\/p>\n<h2 style=\"text-align: justify;\"><strong> Cost of a Information Security Budget<\/strong><\/h2>\n<p style=\"text-align: justify;\">Whether it\u2019s the cost of a device, or the cost of staffing the IT department to manage it, network and data security can be expensive. For many businesses, the price tag of a log management appliance or Web application firewall may be too large an investment for limited IT budgets. And, really, isn\u2019t a network firewall solution enough?<\/p>\n<p style=\"text-align: justify;\">Unfortunately, a firewall isn\u2019t enough. When a business only relies on the most basic of security measures; it\u2019s like locking the front door but not locking the back door or windows of a house. Customer data is as easily stolen as the flat screen in the living room. Beyond the loss of data, companies can also experience loss of reputation and brand trust\u2014perceptions that take years to build and only minutes to lose.<\/p>\n<p style=\"text-align: justify;\">As a business grows, it also becomes more costly to manage an expanding network with additional complexity. A recent survey of IT and security professionals by Information Week magazine revealed that managing the complexity of security is far and away the greatest challenge midsize IT organizations in particular face.<\/p>\n<p style=\"text-align: justify;\">Maintaining staff resources to manage data security initiatives can also be cost-prohibitive, especially in the face of tight budgets and insufficient funding. The sheer amount of data available through logs and across systems can be difficult to manage, even for an experienced IT professional. Few small to medium-sized businesses have an adequate pool of IT security experts to manage security hardware and infrastructure.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Lowering Costs with Managed Security Services<\/strong><\/h2>\n<p style=\"text-align: justify;\">The act of protecting sensitive information and proprietary data doesn\u2019t have to be costly. With a reputable, experienced MSSP, a business can obtain high-quality and scalable technology for a lower cost, typically through monthly fees that are more easily absorbed by the business. In many cases, MSS technology can be delivered via the cloud or over a single device, as is the case with Unified Threat Management (UTM) appliances. This can eliminate the costs of managing individual security point solutions, along with ripping, replacing and maintaining expensive hardware in the server room.<\/p>\n<p style=\"text-align: justify;\">An MSSP is also in a better position to hire and maintain IT professionals with both wide-ranging and in-depth security expertise. With managed security services, businesses get all of the benefits of a highly skilled information security team without the cost of staffing and maintaining a full, in-house team. An MSSP can increase monitoring support and network reliability due to more uniform coverage\u2014all at a reduced cost.<\/p>\n<p style=\"text-align: justify;\">Overall, cost-savings estimates realized from engaging a MSSP range from 17 to 20% for 8\u00d75 support to as much as 65 to 75% or more for 24\u00d77 support. [2] In addition, more cost savings may be possible for businesses that maintain multi-site data networks as a result of the consistent, uniform support a MSSP provides.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Compliance Demands<\/strong><\/h2>\n<p style=\"text-align: justify;\">Industry and government regulations frequently drive data security initiatives. Businesses with only a small IT staff, or without the on-staff expertise required for a compliance project, may be overwhelmed by the process and scope of efforts to comply with the ever increasing number of regulations and requirements, including:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Health Insurance Portability and Accountability Act (HIPAA) or Health Information Technology for Economic and Clinical Health (HITECH) Act<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Graham-Leach-Bliley Act (GLBA) Safeguards Rule<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Sarbanes Oxley (SOX) Act<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Federal Information Security Management Act (FISMA)<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>National Institute of Standards and Technology (NIST)<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Canadian Personal Information Protection and Electronic Documents Act (PIPEDA)<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>European Union Policy Directive<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Data privacy laws<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Additionally, non-compliance with industry regulations can prove detrimental to business. For example, the PCI DSS mandates that organizations that process credit and debit cards must maintain a firewall. But in 2010 incident response investigations, Trustwave\u2019s SpiderLabs found that 97.5% of breached organizations did not have a firewall policy that properly protected the payment environment at the network border.[3] Of those organizations, 84% lacked a firewall completely. This can lead to the theft of valuable payment card data.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Compliance Benefits of Managed Security Services<\/strong><\/h2>\n<p style=\"text-align: justify;\">MSS solutions help simplify the reporting process for regulatory compliance and audits. Technology required by regulatory requirements is more easily obtained and implemented through a MSSP, often with preset reports that map to specific compliance requirements. Log management services, such as a Security Information and Event Management (SIEM) solution, many times offer pre-defined reports for PCI DSS, GLBA, FISMA, SOX, NIST and HIPAA requirements.<\/p>\n<p style=\"text-align: justify;\">A MSSP can typically implement a compliance solution across a business\u2019s computing environment much more quickly to meet an aggressive compliance deadline or mandate than the business would be able to do on its own. Further, a MSSP can help to ensure that the proper and correct configuration of security controls required by industry regulations is maintained at all times, such as the PCI DSS mandate to maintain a firewall.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Consolidation: Is it Possible?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Finely tuned and advanced technology solutions exist for all layers of your information technology network. But how many security controls and devices do you need to implement a security infrastructure that meets your business\u2019 information security needs? Managing and monitoring numerous devices and security controls can be overwhelming for an unprepared business.<\/p>\n<p style=\"text-align: justify;\">We also frequently find, in working with our clients, that older devices and systems with dated technology are neglected and not decommissioned properly by businesses with large inventories of network assets. Many of these older devices have major vulnerabilities associated with them. While performing and maintaining a complete asset inventory can help reduce the risks of such vulnerabilities, businesses can take efforts a step further by using the hardware and services of a MSSP, where vulnerability checks and bug updates are performed on a regular basis. Also, hardware and software refresh support are typically built into the service plans of a MSSP.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Consolidate for Visibility and Management Oversight<\/strong><\/h2>\n<p style=\"text-align: justify;\">Consolidation of security devices and services is a maturing trend, enabling businesses to deploy many technologies on a single device. A UTM device, for example, can consolidate firewall, VPN, intrusion prevention, anti-virus, Web filtering and extended services, such as rogue device detection and vulnerability scanning, in a single security gateway. This allows businesses to aggregate both existing and future security services on one device for simplified deployment and administration, while saving on space and power usage. MSSPs, as new security services become necessary and available, can easily extend the capabilities of UTM devices, further improving ROI.<\/p>\n<p style=\"text-align: justify;\">MSSPs also offer services that normalize, correlate and analyze information from a broad range of devices and systems, using SIEM technology. This provides more effective threat detection over and above what a single business can manage to detect in isolation. Simply put, MSSPs provide consolidated management support that can be observed and tracked all in one place, typically via dashboard-style reporting, by the customer.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Risk Management and Data Security ARE Achievable \u2013 And You Don\u2019t Have to Blow the Budget<\/strong><\/h2>\n<p>Affordable managed solutions are available for any organization struggling to implement and maintain a strong information security program \u2013 you just have to know what to look for. In meeting the challenges of cost, compliance and consolidation, key features of a good MSSP should include:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Low-cost fees and subscriptions<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Flexible options that don\u2019t require outright purchase of hardware<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Security experts available 24x7x365<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li>Easy, comprehensive reporting for compliance and audit support<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Visibility into security event activity and the performance of MSS solutions<br \/>\nThe complexity of building a strong information security infrastructure can be a challenging factor, whether a business has a fluctuating budget, or needs to meet various industry regulations for data security, or has many disparate systems and devices.<\/p>\n<p style=\"text-align: justify;\">With a MSSP, complexity becomes, well, less complex. Lower costs, dynamic reports for compliance and audits, and fewer devices to manage are all benefits of using managed security services. And reducing complexity frees up the business to focus on what really matters, from helping customers to meeting revenue goals and everything in between.<\/p>\n<address style=\"text-align: justify;\"><span style=\"color: #3366ff;\">Sources:<\/span><\/address>\n<ol style=\"text-align: justify;\">\n<li>\n<address><span style=\"color: #3366ff;\">Strategic Security Survey: Midmarket \u2013 Five Big Problems and Five Ways to Cope. InformationWeek Analytics. April 2011.<\/span><\/address>\n<\/li>\n<li>\n<address><span style=\"color: #3366ff;\">Various Industry Sources<\/span><\/address>\n<\/li>\n<li>\n<address><span style=\"color: #3366ff;\"><a href=\"https:\/\/www.trustwave.com\/GSR\" target=\"_blank\">Trustwave\u2019s 2011 Global Security Report<\/a>\u00a0<\/span><\/address>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Engaging with a Managed Security Services Provider (MSSP) to support such information security needs can offer many benefits:<\/p>\n","protected":false},"author":2,"featured_media":791,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,14,3,6,1137],"tags":[53,64,86,87,89],"class_list":["post-776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-cloud","category-data-security","category-information-security-tips","category-software","tag-it-budget","tag-managed-security-providers","tag-regulatory-compliance","tag-risk-management","tag-s"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security<\/title>\n<meta name=\"description\" content=\"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security\" \/>\n<meta property=\"og:description\" content=\"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-30T15:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-26T12:04:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"343\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Exploring Ways To Reduce Information Security Cost\",\"datePublished\":\"2011-08-30T15:39:56+00:00\",\"dateModified\":\"2015-07-26T12:04:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\"},\"wordCount\":1539,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg\",\"keywords\":[\"IT Budget\",\"Managed Security Providers\",\"Regulatory Compliance\",\"Risk Management\",\"s\"],\"articleSection\":[\"CipherTrust\",\"Cloud\",\"Data Security\",\"Information Security Tips\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\",\"name\":\"Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg\",\"datePublished\":\"2011-08-30T15:39:56+00:00\",\"dateModified\":\"2015-07-26T12:04:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg\",\"width\":343,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploring Ways To Reduce Information Security Cost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security","description":"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/","og_locale":"en_US","og_type":"article","og_title":"Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security","og_description":"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/","og_site_name":"TechTonic Times","article_published_time":"2011-08-30T15:39:56+00:00","article_modified_time":"2015-07-26T12:04:27+00:00","og_image":[{"width":343,"height":350,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Exploring Ways To Reduce Information Security Cost","datePublished":"2011-08-30T15:39:56+00:00","dateModified":"2015-07-26T12:04:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/"},"wordCount":1539,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg","keywords":["IT Budget","Managed Security Providers","Regulatory Compliance","Risk Management","s"],"articleSection":["CipherTrust","Cloud","Data Security","Information Security Tips","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/","name":"Cost, Compliance, Consolidation: Conquering the Three C\u2019s of Information Security","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg","datePublished":"2011-08-30T15:39:56+00:00","dateModified":"2015-07-26T12:04:27+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Benefits of a Managed Security Provider can be integral to cost reduction and efficiency optimization in Information Security.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/08\/Save-some-money-on-solar.jpg","width":343,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/exploring-ways-to-reduce-information-security-cost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Exploring Ways To Reduce Information Security Cost"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=776"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/776\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/791"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}