How to Deploy The Security Bulldog- SaaS or Through Your MSP

Deploying The Security Bulldog boils down to two options:

  1. SaaS Deployment: Your team manages everything in our cloud environment, offering full control without infrastructure overhead.
  2. MSP-Facilitated Deployment: A Managed Service Provider (MSP) integrates and supports the platform while your team focuses on remediation.

Each option is powered by the same advanced natural language processing (NLP) engine, which processes millions of documents daily. While the core technology stays the same, the differences lie in who manages the SaaS platform and how much of the operational workload your team handles.

Let’s break down the three models to see how they align with your needs.

The 2 Deployment Options for The Security Bulldog

The Security Bulldog

The Security Bulldog provides two deployment models, designed to match your team’s management abilities and the level of external support you may need. These options let you fine-tune how threat intelligence automation fits into your operations. The decision comes down to how much hands-on control your team wants and whether you’d like to tap into external expertise.

Each option is powered by the same advanced natural language processing (NLP) engine, which processes millions of documents daily. While the core technology stays the same, the differences lie in who manages the platform and how much of the operational workload your team handles. Let’s break down the three models to see how they align with your needs.

SaaS Deployment

This option puts your team in the driver’s seat. You’ll handle platform configurations, manage tenant settings, and integrate custom feeds yourself in our cloud-hosted environment. With an onboarding process that takes less than a minute, this model is perfect for organizations with a dedicated cybersecurity team that wants full control over their threat intelligence workflows while avoiding on-premises infrastructure.

MSP-Facilitated Deployment

Here, a Managed Service Provider (MSP) takes on the initial threat screening, leaving your internal team to focus on remediation tasks based on the tickets the MSP generates. The MSP also ensures The Security Bulldog integrates seamlessly into your existing security tools and routes alerts directly into your PSA ticketing systems. This approach blends external expertise with your team’s efforts, streamlining threat intelligence and operational support.

How to Deploy The Security Bulldog via SaaS

Deploying The Security Bulldog as a SaaS service gives you full control over its configuration and workflows without the need to stand up or maintain your own servers. You can choose between two integration levels: a rapid, no-integration setup that works out of the box, or a deeper, customized setup that connects to your existing security and IT operations tools.

Prerequisites and Planning

Before you begin, decide which level of integration you want to start with:

  • Level 1 – Rapid, standalone setup:

    • No direct integrations with your SIEM, asset managers, or ticketing systems are required.

    • Users access The Security Bulldog via the web UI, manage curated feeds, and manually copy findings into existing workflows as needed.

    • Set up and manage email alerts based on AI Recommendations, Watchlist, and document updates.
    • This mode can be set up in seconds once your subscription is active.

  • Level 2 – Custom-integrated setup:

    • An identity provider that supports SSO and modern authentication (such as SAML or OpenID Connect).

    • Connectivity from your security tools (for example, SIEM, asset managers, threat intelligence platforms) and ticketing systems (such as ServiceNow or Jira) to The Security Bulldog SaaS APIs and webhooks.

    • Appropriate permissions to configure SIEM, SOAR, PSA, and vulnerability management integrations, and to create or update tickets in systems like ServiceNow or Jira.

For the custom-integrated setup, your team should have strong skills in SaaS security configuration, API integration, and network egress controls (for example, proxy, DNS, and firewall egress allowlists).

Configuration Steps

Once your subscription is active, you’ll receive access to your tenant and admin console. Configuration differs slightly by integration level:

  • Level 1 – Rapid, standalone setup (seconds):

    • Create or assign user accounts and passwords.

    • Set up custom OSINT content feeds (for example, CVEs, KEV, news, podcasts, IOCs, remediation, etc.) based on your IT Environment and Cybersecurity toolset

  • Level 2 – Custom-integrated setup:

    • Configure SSO and user access control.

    • Connect data sources and security tools through built-in integrations or API keys (for example, SIEM, asset inventory, threat intelligence feeds).

    • Configure outbound actions so The Security Bulldog can create, comment on, or update tickets in ServiceNow, Jira, or your PSA.

    • Define custom feeds and alerting rules tailored to your environment and mapped to your ticketing and incident workflows.

As your tenant initializes, the NLP engine begins building a curated OSINT knowledge base tailored to your environment. The platform processes and filters millions of documents daily to identify threats that are specifically relevant to your industry and IT setup.

Post-Deployment Configuration

After your SaaS tenant is configured, you can refine custom feeds tailored to your team’s roles and integrate them with existing cybersecurity workflows at either integration level. Even in standalone mode, this can help automate threat detection and significantly reduce manual research efforts – by as much as 80%. In the custom-integrated setup, intelligence can automatically enrich or open tickets in ServiceNow or Jira and link to assets from your SIEM or asset manager, further streamlining remediation.

Use the intelligence gathered to prioritize vulnerabilities that pose the greatest risk to your system. During the first few hours and days of operation, monitor the platform’s alerts and performance closely and fine-tune feed configurations based on your team’s feedback. This will help ensure the system operates effectively. Once your chosen integration level is stable, you can always move from the rapid, no-integration setup to the deeper, custom-integrated approach as your maturity and automation needs grow.

How to Deploy The Security Bulldog Through an MSP

Using a Managed Service Provider (MSP) to deploy The Security Bulldog strikes a balance between control and convenience. You maintain oversight of your security operations while the MSP takes care of installation, setup, and ongoing maintenance. This is a great option for teams that may not have in-house technical expertise but still want visibility into their security processes.

Choosing an MSP Partner

Start by assessing MSPs based on their technical expertise in your industry. An MSP familiar with your sector – be it healthcare, finance, or manufacturing – can tailor The Security Bulldog to meet compliance requirements from the start. Look at case studies, client reviews, and any industry awards to evaluate their experience.

Financial stability is also essential to ensure long-term support. When vetting potential partners, attend demos that address your specific operational needs rather than generic sales presentations. The MSP should also integrate seamlessly with your existing storage and security systems to avoid disruptions.

Ask about their support services – do they offer proactive assistance, dedicated onboarding teams, and extended-hour support? Confirm that they use Role-Based Access Control (RBAC) to minimize access to sensitive data and enforce least-privilege access during deployment.

Once you’ve chosen the right MSP, the next step is a structured onboarding process.

Onboarding and Integration Process

Onboarding typically takes 4–6 weeks and begins with a comprehensive questionnaire. This covers your IT environment, cybersecurity tools, hardware inventory, user roles, and compliance requirements. MSPs generally dedicate 40 to 80 hours to onboarding a new client, though automation tools can cut this time by 30% to 40%.

The process kicks off with a formal meeting where the MSP introduces their technical team, defines roles and responsibilities, sets up communication protocols, and aligns on project milestones. A detailed infrastructure audit follows to uncover vulnerabilities or legacy issues before deploying The Security Bulldog. This audit is critical, as 35.5% of data breaches in 2024 were linked to third-party vulnerabilities.

“When MSPs don’t fully understand a client’s requirements and systems upfront, it often leads to misunderstandings and underestimated complexities.” – Lilia Tovbin, CEO & Founder, BigMailer.io

During integration, the MSP connects The Security Bulldog to your existing tools, such as Remote Monitoring and Management (RMM) and Professional Services Automation (PSA) platforms. They will deploy software agents across your devices – servers, workstations, and mobile devices – to enable proactive monitoring.

Before going live, the system undergoes rigorous stress or penetration testing. The MSP will also train your team on using The Security Bulldog and handling emergencies. A 30-day review post-launch ensures everything runs smoothly and addresses any early issues.

Working with Your MSP

To maintain security, clearly define access boundaries and responsibilities. Specify which systems the MSP can access and ensure they use secure jump hosts and multi-factor authentication (MFA) for administrative tasks. Provide only the minimum access required for their work, and ensure all actions are traceable through individual credentials or service tickets for quick resolution of any issues.

For urgent security matters, set up a protocol for phone communication instead of relying on email or ticketing systems to ensure immediate response. Both parties should collaborate on an incident response plan with secure, independent communication channels. The MSP should log all activity, while your organization – or an independent reviewer – regularly examines these logs for suspicious behavior. It’s recommended to retain event logs for at least 18 months for thorough investigations.

While the MSP monitors for issues like unusual login patterns or privilege escalation attempts, your internal security practices must remain strong. Automation can reduce the MSP’s workload by up to 40%, allowing them to focus on proactive security improvements rather than reactive fixes. Choose an MSP that values feedback and has clear protocols for open, two-way communication.

When evaluating your options, consider your team’s bandwidth and focus on what delivers the most impact. As Brenda Buckman from Huntress wisely states:

“Clients don’t care about features – they care about staying safe and stress-free.”

To truly understand how each deployment method can improve your operations, take advantage of The Security Bulldog’s free trial or demo. This hands-on experience will help you determine which approach aligns best with your organization’s needs.

Choosing the right deployment method isn’t just about implementation – it’s about solving one of cybersecurity’s biggest challenges: the constant battle against time.

Related Blog Posts