Protiviti helps transform data security cost center into a service operation with a significant revenue potential
Protiviti helps transform data security cost
center into a service operation with
a significant revenue potential
Security Operations Center –Telecommunications
An information technology (IT) security monitoring solution Protiviti created for a client’s internal purposes
showed promise as a licensed third-party service. The client, a major telecommunications provider in the Asia-
Pacific region, faced the challenge of building out and monetizing the technology, which was still untested
internally and for which it needed to assemble a client base.
Protiviti’s Security Intelligence and Operations Services practice was engaged to develop a plan for ensuring
that the security monitoring service functioned properly internally, with sufficient surplus capacity to serve
Our services included:
• Defining the security monitoring service, its operation, and key responsibilities for the service, to provide
the client with a clear understanding of the product it would be marketing to potential customers.
• Creating a rollout plan for the new service, focusing on these key issues/concerns:
–– Design and Implementation – Determining risks and requirements; developing a roadmap to
achieving objectives; assisting with the design and implementation of technology solutions.
–– Technology Optimization – Helping our client to understand and derive best value from tech-
nology configuration and reporting capabilities; assessing capabilities to determine adequacy for
the intended purpose.
–– Effectiveness Testing – Conducting maturity assessments to determine effectiveness of security
protocols; developing recommendations to address gaps; conducting assurance reviews at third-
party providers to assess the design and operating effectiveness of monitoring and response.
–– Asset Logging Strategy – Ensuring that the system design can accommodate the security needs of
future assets, not just those logged at deployment.
–– Event Management – Providing ongoing assistance with baseline tuning, anomaly detection, statis-
tical analysis and reporting.
–– Training – Assisting our client with staffing, training and best practices to support the rollout
and ongoing maturity of the security operations, with the goal of ensuring a sustainable security
environment for the organization.
• Ensuring maximum flexibility in the technology that supports the new service to accommodate as
many customer customization requests as possible with no need for additional redevelopment efforts.