The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story.

Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what about smaller enterprises? Is Watson too big, too complex or simply too expensive for an organization of that size? For a small business, a managed security services provider (MSSP) can make all the difference.

Living the Dream

Many small business owners start out with a dream of independence and success. They want to sell their goods and provide great consumer services. They know they need to protect their businesses, but their dreams did not include hiring security specialists to worry about compliance with data protection laws, let alone a highly volatile threat landscape. Many small businesses suffer six-figure losses as the result of a data breach, and a 2011 survey showed that 60 percent of them were forced out of business within six months of an attack.

Some owners may not immediately see how cognitive security can help them protect their business. Although Watson will make security analysts more productive, it will not replace them. Small or even midsized business owners might see the lack of a dedicated security staff as a barrier to getting any benefit out of Watson, despite the outstanding results other companies have enjoyed.

But this is not a new story. The same proviso has applied to many security tools for years. For business owners, the answer is an old story, too: That’s why they often outsource noncore business functions to specialists, rather than trying to specialize in everything.

Enter Managed Security Services

A cannier business might approach a trusted specialist security company in its local market for advice. Some businesses outsource security operations to a partner who can provide the best combination of people, process and technology. This arrangement works very well in most cases, but there are at least two caveats that arise in almost every relationship:

  1. The client business wants the service to be provided at the most competitive cost.
  2. The client more or less wants a guarantee against being breached.

Experienced cybersecurity professionals know that good security isn’t free. They also know that it is impossible to guarantee absolute immunity from data breaches. The truth is, many security specialists strive conscientiously to provide the most comprehensive service they can within the constraints of the client’s budget and the cost of providing the service themselves.

The Value of Cognitive Security

A good MSSP tries to meet the challenge to include the right technology and expertise while staying within budget. At first glance, a new cognitive system such as Watson can appear to be just another cost. In the long run, however, cognitive security saves money and improves the organization’s incident response capabilities, which makes for a valuable addition to any small business’s security suite.

A Good Investment

Throughout the history of IT, business owners have invested in technology with the hopes that their companies would either grow to recoup the cost or save money on existing processes. In this respect, Watson is like any other technology. The main thrust of cognitive security is that it provides context for faster, easier problem identification and resolution. Ultimately, this is about saving money as well as time. Business owners should look at the total cost of ownership rather than the book price when investing in new capabilities.

Reduce the Threat Surface

You can never completely avoid being breached, but you have some control over how quickly you discover a breach and how you respond to it. Watson can help businesses discover and respond to threats much faster and more comprehensively. It also has the potential to help companies reduce the threat landscape in their own infrastructures as well as their clients’. It will supplement and extend analysts’ awareness of where threats lie. This planning is critical to reduce the attack surface of your infrastructure.

Watson Is a Game Changer

You may be surprised at how relatively inexpensive Watson is. All circumstances differ, but it’s worth talking to your IBM sales team to find out how affordable Watson is for you. With the right trusted advisers to help small and medium businesses, Watson should be as much of a game changer for those companies as it is already proving to be for others.

Learn More About Watson for Cyber Security

More from Artificial Intelligence

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Are successful deepfake scams more common than we realize?

4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of fraud.Earlier this year, a finance worker found themselves talking on a video meeting with someone who looked and sounded just like their CFO. After the…

How to calculate your AI-powered cybersecurity’s ROI

4 min read - Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence (AI) that closely mimic the company's internal communications. The emails contain malicious links designed to steal employee credentials, which the attackers could use to gain access to company assets and data for unknown purposes.The organization's AI-powered cybersecurity solution, which continuously monitors network traffic and user behavior, detects several anomalies associated with the attack, blocks access to the suspicious domains…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today