SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Mastering the Secrets to Success in Managed Security




              Mastering the Secrets to Success
                   in Managed Security
                             Special Guest: David Castro, Kaseya
                    Host: Michael Siggins, Publisher ChannelPro Magazine




                                                       1
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      How to Participate: Audio Options
     1. Turn on the volume on your computer.
        To join the audio broadcast during an event, choose “Join
        Audio Broadcasting” on the Communicate menu.

     2. Dial in to our teleconference line.
        Phone: 1-408-792-6300
        Meeting Number: 660 618 127

     If you are having difficulty with WebEx, please contact technical
     support: 866-229-3239.


                                                       2
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      How to Participate: Ask Questions
     1. To ask questions of the panelists:
        Submit your questions via the Q&A area in the bottom right
        area of your screen.

     2. To ask about technical issues:
        Use the Chat area in the middle right area of your screen.
        Submit your questions to the Host, EH Publishing.

     If you are having difficulty with WebEx, please contact technical
     support: 866-229-3239.


                                                       3
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      Agenda
     •    Four keys to safe computing
     •    Common managed security challenges
     •    Five proven managed security best practices
     •    Choosing the right RMM tool
     •    Four examples of best practices in action
     •    Benefits of following best practices


                                                       4
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




    The Managed Security Opportunity
     • Security is still a major issue for SMBs
                   • Kaspersky Lab identified > 1 billion threats and ~89.5 million
                     malicious URLs in 2Q 2012 alone

     • SMBs spend heavily on security
                   • IDC says U.S. SMB security spending will top $5.6 billion in
                     2015 and grow twice as fast as overall IT spending

     • Spending on managed security services is
       growing fast
                   • Infonetics says global managed security service revenue
                     grew 12% in 2011 to $11.7 billion and will reach nearly $18
                     billion by 2016

                                                       5
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



     What SMBs and MSPs Want from
     Managed Security Services
     SMBs:
            – End-to-end protection
            – Guaranteed service levels
            – Minimal disruption to user productivity and core
              business processes
     MSPs:
            –    High customer satisfaction rates
            –    Low administrative expenses
            –    Strong profits
            –    A scalable foundation for long-term growth
                                                       6
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




   The Four Keys to Secure Computing
     • Properly install reputable security software on
       every end point
     • Keep the software up to date with the latest
       revisions and containments
     • Ensure that the software performs system
       scans regularly
     • Verify that the software successfully patches
       OS’s and applications
                                                       7
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Why MSPs Struggle with Managed Security
   • Inconsistent execution due to lack of
     centralized oversight and control
                 Multiple security products with different interfaces
                 complicate management

   • Reactive technical processes
                 Security software or vendor must notify MSP of problems
                 and new updates and patches

   • Labor-intensive processes
                 Manual updating, installation, and patching—often in
                 person and device-by-device.
                                                       8
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




   Managed Security Best Practices
     How best-in-class managed security providers do
     business

     1. Sell security, not security products
                   • Business owners care about security, not tools
                   • Emphasize the end result—comprehensive security—
                     rather than the tools used to achieve it

     2. Choose the security tools your customers use
                   • Build it into you SLA

                                                       9
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



    Managed Security Best Practices
     3. Employ centralized, proactive security processes
            – Manage all products through one console
            – Actively confirm installations, updates, scans, and
              patching

     4. Automate your security processes wherever
     possible

     5. Deliver thorough, regular reports
            – Demonstrate value you add by listing updates,
              patching, and scans
                                                       10
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Features to Look For in an RMM Tool
     • Extensive built-in automation
                   System should search websites for updates and patches,
                   determine which devices need them, then install
                   automatically as instructed

     • Robust scripting
                  System should be capable of automating anything you
                  can do at the command line



                                                       11
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Features to Look For in an RMM Tool
     • Proactive security features
                  System should actively confirm installs, updates, scans,
                  and patches rather than react to input from security
                  software

     • Tight integration with leading security
       products
                  Close, two-way communication, not just a click-through

     • Strong reporting functionality
                  Ability to compile detailed data easily
                                                       12
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




 Example 1: Patching a PC Running Msft Windows
   1. Use RMM software to specify in advance:
                 • Which patches to install on which PCs
                 • Installation dates and times
                 • How to handle issue like rebooting

   2. Patch Windows devices automatically

   Results:
          – Patch nearly unlimited Windows devices with
            minimal human intervention
          – No WSUS required
                                                       13
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Example 2: Applying an Anti-Virus Update
   1. Use RMM software to find security updates
      automatically
   2. Install them automatically through one
      console at the click of a button

   Results:
          – No need to check websites yourself
          – No need for manual installation
          – More effectively keep clients current on latest
            updates
                                                       14
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Example 3: Deploying a Malware Containment

     1. Use RMM software to acquire new
        containments automatically as they appear
     2. Install them automatically where and as you
        specify

     Results:
            – Faster response times to new threats
            – No need for manual searches or installation


                                                       15
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




Example 4: Deploying Non-Microsoft, Non-Malware Update

    1. Use RMM software to find updates for
       common technologies like Java, Flash, Zip,
       etc.
    2. Install them automatically based on highly
       configurable policies

    Results:
           – More comprehensive security
           – Minimal incremental effort

                                                       16
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



 Benefits of Using Managed Security Best Practices
    • Lower overhead
                  Centralization + automation = major savings of time and
                  effort

    • Higher profits
                  Lower overhead translates to a bigger bottom line

    • Better security
                  Automated, proactive processes reduce human error, keep
                  customers safer

    • Reduced risk of SLA failure
                   Better security means fewer SLA violations
                                                       17
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Benefits of Using Managed Security Best Practices
   • More time for strategic consulting and project
     work
                Because you’re spending less time on routine security
                maintenance

   • Enhanced customer satisfaction
                 Clients appreciate vendors who keep them secure and
                 provide strategic guidance

   • Greater ability to scale your business
                 Grow customer base faster than payroll thanks to
                 automated processes
                                                       18
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



   Summary
    • Managed security is a significant opportunity if
      you deliver it efficiently and effectively
    • Best-in-class MSPs use state-of-the-art RMM
      software to:
           – Build their managed security practice around
             automated, centralized, and proactive security
             processes
           – Sell security as an end result rather than a set of
             products
           – Secure and satisfy their clients more completely
           – Earn consistently high profits

                                                       19
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



    About Kaseya
    • Enterprise-class IT systems
      management for everybody

    • Key Facts
            – Founded 2000
            – Privately held, no debt, no external capital
              requirements
            – 33 offices worldwide in 20 countries with
              450+ employees
                   • 12,000+ customers
                   • Millions of assets managed
            – Patented IT service delivery process & remote
              IT management process
                   • 24 patents pending
            – Common Criteria (EAL2+) certified and FIPS
              140-2 security compliant
            – ITIL v2 and v3 compatible

                                                       20
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  The Kaseya Topology
  1 agent > 1 server > 1 web console




         On premise OR SaaS




                                                       21
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  One web console
  Core
  • Agent Monitoring
  • Agent Procedures
  • Audit and Inventory
  • Backup
  • Info Center
  • Live Connect
  • Mobile Device Management
  • Network Discovery
  • Network Monitor
  • Patch Management
  • Policy Management
  • PSA Integration                                    Add On
  • Remote Control                                     Directory Services, Desktop Policy Management,
                                                       Desktop Migration, Service Desk, Data Backup,
  • Ticketing                                          Antivirus, Antimalware, Imaging and Deployment,
  • Time Tracking                                      Software Deployment & Update, Endpoint Security
  • Service Billing

                                                                    22
Success Series of Webinars
Mastering the Secrets to Success in Managed Security

  3
  r




  Kaseya’s Security Solution
  d
  O
  p
  P
  e
  a
  r
  a
  y
   S
   c
  re
   M
   h
   K
   o
   e
  tA
   a
  tK
   n
   d
    S
    e
    r
    v
     K
     a
     s

     y
    ia
     g

  Blended Protection/Unified Platform/Remediation/Partners
  is
   na
    c
   ie
   u
  ne
   As
  *tE
   ln
  gr
   n
   yA
    e
   in
   o t
  Ss
   an
   td
    D
    yP
   r
   n
  o
  Sit
    e
    ap
   iP
   g
  y-t
  fio
   A
   /s r
   n r
  tc
   n
  st
   M
   g
   &
    k
    -
    Ai
     o
   R
   a
  tV
  wtn
    nh
     c
  a
  ee
   lt
   i&ie
     t
   &
   M e
   M
   m
   w
  rd
  m r
    in
   a
  ee
   aR
    u
    vg
     Ss
  MM
   n u
   d
   ls
   re
    ie
  So
   a r
  Dir
   e
   wpc
   b
   g e
  eao
    u
  Oiu
   e s
  pt
   rs
   lr
   m
  ft
  lii
   e
   e
  fi
   o
  o  t
  in
   n
  yty
  c g
  m
  e
  e
  n
  t




                                                       23
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Why MSPs Choose Kaseya


                    A single Kaseya user can proactively manage 1,000s of automated
                    IT systems and network tasks in the same amount of time required
                    by a team of technicians using other techniques

                    It’s the industry’s only patented server-agent architecture; MSPs
                    get enterprise-class capability that is easy to use and easy to afford

                    With 60+% of top MSPs worldwide using Kaseya, they get access to
                    the most robust community available

                    And with so many ISVs plugging in to Kaseya via a seamless
                    integration process, they get an easy way to leverage their existing
                    strategic technology partnerships



                                                       24
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



More Machines per Technician



                                                                60% of Kaseya
                                                            customers double the
                                                             productivity of their
                                                                 technicians




                                                       25
Success Series of Webinars
   25
Mastering the Secrets to Success in Managed Security



 Attendees – Q3 ’12 Get started with Kaseya
  •  Custom demo
    – Eligible for free hosted POC (Kaseya EJS)
  • Special Pricing
    – Foundation $1995/Admin/yr
    – Essentials starting @ $5.75/device/mo
  • Promos*
    – KSDU starting @ $5/device/mo
    – KAV or KAM starting @ $6/device/yr
    26
                  /KaseyaFan             /company/kaseya   @kaseyacorp      community.kaseya.com


                                                                         *Other terms apply
                                                           26
Success Series of Webinars

Weitere ähnliche Inhalte

Was ist angesagt?

Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
USPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementJim Piechocki
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsMichael Kaishar, MSIA | CISSP
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management ProgramDennis Chaupis
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...IBM Security
 

Was ist angesagt? (20)

Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
USPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability Management
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management Program
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
 

Andere mochten auch

Scripting and Automation within the MAX Platform Ernest Byrd
Scripting and Automation within the MAX Platform   Ernest ByrdScripting and Automation within the MAX Platform   Ernest Byrd
Scripting and Automation within the MAX Platform Ernest ByrdMAXfocus
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderCSI Solutions
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcingScott Suhy
 

Andere mochten auch (9)

Scripting and Automation within the MAX Platform Ernest Byrd
Scripting and Automation within the MAX Platform   Ernest ByrdScripting and Automation within the MAX Platform   Ernest Byrd
Scripting and Automation within the MAX Platform Ernest Byrd
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Abdullahi chowdhury presentation slides
Abdullahi chowdhury presentation slidesAbdullahi chowdhury presentation slides
Abdullahi chowdhury presentation slides
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
Consilien Managed IT Services
Consilien Managed IT ServicesConsilien Managed IT Services
Consilien Managed IT Services
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcing
 

Ähnlich wie Mastering Managed Security Success

Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeSecurity Innovation
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSoftServe
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...Amazon Web Services
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedownZaynah Zameer
 

Ähnlich wie Mastering Managed Security Success (20)

Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 

Mehr von David Castro

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarDavid Castro
 
SI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials KitSI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials KitDavid Castro
 
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding ToolLead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding ToolDavid Castro
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolDavid Castro
 
For VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell KaseyaFor VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell KaseyaDavid Castro
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesDavid Castro
 
MSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and ResultsDavid Castro
 
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsMSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsDavid Castro
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsDavid Castro
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesDavid Castro
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...David Castro
 
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...David Castro
 
MSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New ContractsMSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New ContractsDavid Castro
 
MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...David Castro
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesDavid Castro
 
MSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and ResultsDavid Castro
 
MSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to UseMSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to UseDavid Castro
 
Elevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solutionElevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solutionDavid Castro
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsDavid Castro
 
Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...David Castro
 

Mehr von David Castro (20)

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
 
SI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials KitSI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials Kit
 
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding ToolLead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
 
For VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell KaseyaFor VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell Kaseya
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
 
MSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
 
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsMSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing Messages
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
 
MSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New ContractsMSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
 
MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
MSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
 
MSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to UseMSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to Use
 
Elevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solutionElevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solution
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
 
Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Mastering Managed Security Success

  • 1. Mastering the Secrets to Success in Managed Security Mastering the Secrets to Success in Managed Security Special Guest: David Castro, Kaseya Host: Michael Siggins, Publisher ChannelPro Magazine 1 Success Series of Webinars
  • 2. Mastering the Secrets to Success in Managed Security How to Participate: Audio Options 1. Turn on the volume on your computer. To join the audio broadcast during an event, choose “Join Audio Broadcasting” on the Communicate menu. 2. Dial in to our teleconference line. Phone: 1-408-792-6300 Meeting Number: 660 618 127 If you are having difficulty with WebEx, please contact technical support: 866-229-3239. 2 Success Series of Webinars
  • 3. Mastering the Secrets to Success in Managed Security How to Participate: Ask Questions 1. To ask questions of the panelists: Submit your questions via the Q&A area in the bottom right area of your screen. 2. To ask about technical issues: Use the Chat area in the middle right area of your screen. Submit your questions to the Host, EH Publishing. If you are having difficulty with WebEx, please contact technical support: 866-229-3239. 3 Success Series of Webinars
  • 4. Mastering the Secrets to Success in Managed Security Agenda • Four keys to safe computing • Common managed security challenges • Five proven managed security best practices • Choosing the right RMM tool • Four examples of best practices in action • Benefits of following best practices 4 Success Series of Webinars
  • 5. Mastering the Secrets to Success in Managed Security The Managed Security Opportunity • Security is still a major issue for SMBs • Kaspersky Lab identified > 1 billion threats and ~89.5 million malicious URLs in 2Q 2012 alone • SMBs spend heavily on security • IDC says U.S. SMB security spending will top $5.6 billion in 2015 and grow twice as fast as overall IT spending • Spending on managed security services is growing fast • Infonetics says global managed security service revenue grew 12% in 2011 to $11.7 billion and will reach nearly $18 billion by 2016 5 Success Series of Webinars
  • 6. Mastering the Secrets to Success in Managed Security What SMBs and MSPs Want from Managed Security Services SMBs: – End-to-end protection – Guaranteed service levels – Minimal disruption to user productivity and core business processes MSPs: – High customer satisfaction rates – Low administrative expenses – Strong profits – A scalable foundation for long-term growth 6 Success Series of Webinars
  • 7. Mastering the Secrets to Success in Managed Security The Four Keys to Secure Computing • Properly install reputable security software on every end point • Keep the software up to date with the latest revisions and containments • Ensure that the software performs system scans regularly • Verify that the software successfully patches OS’s and applications 7 Success Series of Webinars
  • 8. Mastering the Secrets to Success in Managed Security Why MSPs Struggle with Managed Security • Inconsistent execution due to lack of centralized oversight and control Multiple security products with different interfaces complicate management • Reactive technical processes Security software or vendor must notify MSP of problems and new updates and patches • Labor-intensive processes Manual updating, installation, and patching—often in person and device-by-device. 8 Success Series of Webinars
  • 9. Mastering the Secrets to Success in Managed Security Managed Security Best Practices How best-in-class managed security providers do business 1. Sell security, not security products • Business owners care about security, not tools • Emphasize the end result—comprehensive security— rather than the tools used to achieve it 2. Choose the security tools your customers use • Build it into you SLA 9 Success Series of Webinars
  • 10. Mastering the Secrets to Success in Managed Security Managed Security Best Practices 3. Employ centralized, proactive security processes – Manage all products through one console – Actively confirm installations, updates, scans, and patching 4. Automate your security processes wherever possible 5. Deliver thorough, regular reports – Demonstrate value you add by listing updates, patching, and scans 10 Success Series of Webinars
  • 11. Mastering the Secrets to Success in Managed Security Features to Look For in an RMM Tool • Extensive built-in automation System should search websites for updates and patches, determine which devices need them, then install automatically as instructed • Robust scripting System should be capable of automating anything you can do at the command line 11 Success Series of Webinars
  • 12. Mastering the Secrets to Success in Managed Security Features to Look For in an RMM Tool • Proactive security features System should actively confirm installs, updates, scans, and patches rather than react to input from security software • Tight integration with leading security products Close, two-way communication, not just a click-through • Strong reporting functionality Ability to compile detailed data easily 12 Success Series of Webinars
  • 13. Mastering the Secrets to Success in Managed Security Example 1: Patching a PC Running Msft Windows 1. Use RMM software to specify in advance: • Which patches to install on which PCs • Installation dates and times • How to handle issue like rebooting 2. Patch Windows devices automatically Results: – Patch nearly unlimited Windows devices with minimal human intervention – No WSUS required 13 Success Series of Webinars
  • 14. Mastering the Secrets to Success in Managed Security Example 2: Applying an Anti-Virus Update 1. Use RMM software to find security updates automatically 2. Install them automatically through one console at the click of a button Results: – No need to check websites yourself – No need for manual installation – More effectively keep clients current on latest updates 14 Success Series of Webinars
  • 15. Mastering the Secrets to Success in Managed Security Example 3: Deploying a Malware Containment 1. Use RMM software to acquire new containments automatically as they appear 2. Install them automatically where and as you specify Results: – Faster response times to new threats – No need for manual searches or installation 15 Success Series of Webinars
  • 16. Mastering the Secrets to Success in Managed Security Example 4: Deploying Non-Microsoft, Non-Malware Update 1. Use RMM software to find updates for common technologies like Java, Flash, Zip, etc. 2. Install them automatically based on highly configurable policies Results: – More comprehensive security – Minimal incremental effort 16 Success Series of Webinars
  • 17. Mastering the Secrets to Success in Managed Security Benefits of Using Managed Security Best Practices • Lower overhead Centralization + automation = major savings of time and effort • Higher profits Lower overhead translates to a bigger bottom line • Better security Automated, proactive processes reduce human error, keep customers safer • Reduced risk of SLA failure Better security means fewer SLA violations 17 Success Series of Webinars
  • 18. Mastering the Secrets to Success in Managed Security Benefits of Using Managed Security Best Practices • More time for strategic consulting and project work Because you’re spending less time on routine security maintenance • Enhanced customer satisfaction Clients appreciate vendors who keep them secure and provide strategic guidance • Greater ability to scale your business Grow customer base faster than payroll thanks to automated processes 18 Success Series of Webinars
  • 19. Mastering the Secrets to Success in Managed Security Summary • Managed security is a significant opportunity if you deliver it efficiently and effectively • Best-in-class MSPs use state-of-the-art RMM software to: – Build their managed security practice around automated, centralized, and proactive security processes – Sell security as an end result rather than a set of products – Secure and satisfy their clients more completely – Earn consistently high profits 19 Success Series of Webinars
  • 20. Mastering the Secrets to Success in Managed Security About Kaseya • Enterprise-class IT systems management for everybody • Key Facts – Founded 2000 – Privately held, no debt, no external capital requirements – 33 offices worldwide in 20 countries with 450+ employees • 12,000+ customers • Millions of assets managed – Patented IT service delivery process & remote IT management process • 24 patents pending – Common Criteria (EAL2+) certified and FIPS 140-2 security compliant – ITIL v2 and v3 compatible 20 Success Series of Webinars
  • 21. Mastering the Secrets to Success in Managed Security The Kaseya Topology 1 agent > 1 server > 1 web console On premise OR SaaS 21 Success Series of Webinars
  • 22. Mastering the Secrets to Success in Managed Security One web console Core • Agent Monitoring • Agent Procedures • Audit and Inventory • Backup • Info Center • Live Connect • Mobile Device Management • Network Discovery • Network Monitor • Patch Management • Policy Management • PSA Integration Add On • Remote Control Directory Services, Desktop Policy Management, Desktop Migration, Service Desk, Data Backup, • Ticketing Antivirus, Antimalware, Imaging and Deployment, • Time Tracking Software Deployment & Update, Endpoint Security • Service Billing 22 Success Series of Webinars
  • 23. Mastering the Secrets to Success in Managed Security 3 r Kaseya’s Security Solution d O p P e a r a y S c re M h K o e tA a tK n d S e r v K a s y ia g Blended Protection/Unified Platform/Remediation/Partners is na c ie u ne As *tE ln gr n yA e in o t Ss an td D yP r n o Sit e ap iP g y-t fio A /s r n r tc n st M g & k - Ai o R a tV wtn nh c a ee lt i&ie t & M e M m w rd m r in a ee aR u vg Ss MM n u d ls re ie So a r Dir e wpc b g e eao u Oiu e s pt rs lr m ft lii e e fi o o t in n yty c g m e e n t 23 Success Series of Webinars
  • 24. Mastering the Secrets to Success in Managed Security Why MSPs Choose Kaseya A single Kaseya user can proactively manage 1,000s of automated IT systems and network tasks in the same amount of time required by a team of technicians using other techniques It’s the industry’s only patented server-agent architecture; MSPs get enterprise-class capability that is easy to use and easy to afford With 60+% of top MSPs worldwide using Kaseya, they get access to the most robust community available And with so many ISVs plugging in to Kaseya via a seamless integration process, they get an easy way to leverage their existing strategic technology partnerships 24 Success Series of Webinars
  • 25. Mastering the Secrets to Success in Managed Security More Machines per Technician 60% of Kaseya customers double the productivity of their technicians 25 Success Series of Webinars 25
  • 26. Mastering the Secrets to Success in Managed Security Attendees – Q3 ’12 Get started with Kaseya • Custom demo – Eligible for free hosted POC (Kaseya EJS) • Special Pricing – Foundation $1995/Admin/yr – Essentials starting @ $5.75/device/mo • Promos* – KSDU starting @ $5/device/mo – KAV or KAM starting @ $6/device/yr 26 /KaseyaFan /company/kaseya @kaseyacorp community.kaseya.com *Other terms apply 26 Success Series of Webinars