SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Insight Managed Services
2009 – Software as a Service Offerings
Insight – A World of Technology Resources




                   • 5,300+ teammates worldwide
                   • Operations in 22 countries
                   • Clients in 170 countries
                   • Serve 80 percent of the Global Fortune 500
                   • $4.8 billion in revenues in 2007
                   • Ranked No. 477 on 2008 ‘Fortune 500’ list
                   • Partnered with the world’s technology leaders
Insight’s Global Reach

 Located in 22 countries, supporting clients in 170 countries, 17 languages, 13 currencies
Insight’s vision is to be the trusted advisor, helping clients enhance business
performance through innovative technology solutions.
Clients across the world are looking for ways to …




• Consolidate resources
• Reduce rising costs
• Simplify complexity
Maturity Model:
A Starting Point
                                                                                                                          Level 6
   The Maturity Model is based on industry best
  practice models (e.g., CMM, CoBit, ITIL, Gartner)                                                  Level 5
             and Calence experience.                                                                                 Value Driven
                                                                              Level 4
                                                                                             Service Driven
                                                                                                                   • Strong linkages to
                                                                           Managed
                                                        Level 3                                                      enterprise IT
                                                                                               • Well defined        architecture
                                                                        • Compliance with        services/catalogue• Network and
                                Level 2                                                                                                      Capability
                                                                          processes
                                                      Proactive                                • Formal service      Business metric
                                                                          measured               level agreements    linkage
                                                                                                                                              Maturity
                                                                        • Service level goals • Detailed service
           Level 1                                                                                                 • IT/network
                                               •   Standardized
                              Reactive                                                                                                        Levels
                                                                          established            level reporting     improves business
                                                   Procedures
                                                                        • Basic service        • Differentiated    • Real-time
                                                 • Process training       reporting
                          • Best effort                                                          services classes    infrastructure
         Chaotic                                 • Enterprise           • Key productivity       and pricing
                          • Firefighting                                                                           • Integrated
                                                   monitoring             and quality metrics • Business focused     business and
                          • Tied to              • Thresholds set         measured
     • No discernable                                                                            Capacity            IT/network
                             Individuals
                                                 • Trends analyzed
       process                                                          • Workflow               forecasting         planning
                          • Minimal
                                                                          automation
                                                 • Problems managed
     • Roles/Resp’s not                                                                        • Flexible sourcing
                             documentation
       defined                                                          • Continuous             arrangements
                                                 • Mature                                                              Business/IT Linkage
                          • Tribal knowledge
                                                                          improvement
     • No                                          configuration
                                                                                                             Business Management
                          • Monitor Events &
       documentation                               management and       • Capacity planning
                            Availability           change
     • Configs not                                                                              Service Level Agreements (SLA’s)
                                                                        • Usage based
                            (up/down)              management
       backed up
                                                                                                                                             Capability
                                                                          charge
                          • Configs backed                                          Service Delivery Process Engineering
                                                 • Event correlation
     • No tools                                                           -back
                                                                                                                                              Building
                             up/basic address      and automated
     • Unpredictable                                                     Service and Account Management
                             management            notification
                                                                                                                                              Blocks
       results
                          • Few Effective                    Automation and Workflow Management
                             Tools
                                     Operational Process Engineering

             Tools Leverage
Decision Making Criteria

     “How important are the following factors when selecting your services vendor?”*
                                                 Product quality                                                             67%


                          Post-sales service and support                                                      46%


                                                                Price                                       44%


                                            Product availability                                          41%

                        First-hand experience using that
                                                                                                         40%
                         vendors' (SMB only) products

                                               Product features                                         38%


                                             Vendor reputation                                       34%

               Recommendation from peer or trusted
                                                                                                 28%
                           advisor




      Base: 384 IT services decision-makers at North American and European SMBs that currently outsource or have plans to outsource in the
                                                                next 12 months.
                        *Percentage of respondents who answered 4 on a scale of 1 (not at all important) to 4 (very important).
                              Source: Enterprise And SMB Hardware Survey, North America And Europe, Q3 2007
“Which of the following outsourced IT services does your company currently purchase or
     use? Which does your company plan to purchase over the next 12 months?”


Server management and support                                        35%
(monitoring, software update, and
                                                         24%
      patch management)

                                                                     34%
Network management and support
   (VPN, firewall, monitoring)                           24%

                                                               29%
           PC and laptop support
                                                        23%
                                                                           Planned over the next 12 months
  Installation and configuration of                                        Currently purchased or using
                                                        22%
    hardware (servers, storage,
                                                  17%
         networking, or PCs)

                                                  17%
            Backup and recovery
                                              13%

                                               14%
            IT help desk services
                                               14%




              Base: 554 IT services decision-makers at North American and European SMBs
Managed Services Value

No major environment changes required
    • Works with almost any environment
    • No hardware or software purchase

Rapid activation and protection
    • Works immediately with little configuration or setup

Only pay for what is being used
    • Invoiced monthly
    • Operating expense and not a capital expense

Fully managed solution
     • Managed / run by a team of experts
     • Free up IT staff to focus on more productive functions

Reduces bandwidth and storage costs
    • Filters email and web outside your network perimeter
    • Quarantined messages remain securely outside your network
Managed Messaging Solutions
   How to Engage
                                  • Email Security
Team Alias:
                                  • Email Continuity
Contact your SSE / SSR or
                                  • Email Archiving
ManagedServices@Insight.com
                                  • Hosted Exchange
       Team
                                  • Hosted Blackberry (BES)
Sr. Manager, Managed Services
Carlos Roman
croman@insight.com
                                Managed Security Solutions
800-467-4448 ext. 1294
                                  • Web Security
480-235-0331 Direct

                                  • Email Security
                                  • Managed Firewall
Manager, Business Development
Tobey Amy
                                  • Intrusion Detection/Intrusion Prevention
tamy@insight.com
800-467-4448 ext. 5248
                                  • Vulnerability Management
480-567-5619 Direct


                                Data Protection/Data Management Solutions
Manager, Business Development
                                  • Online/Remote Backup
Jamie Gasior
jgasior@insight.com
                                  • Remote Storage Management
800-467-4448 ext. 1075
480-363-3000 Direct
                                  • Desktop Management
                                  • Managed Co-location/Hosting




                    Managed Services / Software as a Service
Managed Messaging Services –
Hosted Exchange
Clients’ Messaging / Email IT Infrastructure




      Internet                                       Blackberry
                                                  Enterprise Server
                                                       (BES)




                  Email Filter
                 (Spam / Virus)
  Firewall                         Email Server
                                  (MS Exchange)
                                                        Email
                                                      Archiving
Insight SaaS Overview - Cloud Computing
Managed Messaging


Through 2009, organizations are planning to deploy a greater proportion of their messaging
   capabilities using hosted services, as shown in the following table. While some hosted
   services will see only flat to modest growth, other segments will see significant growth,
   including email retention/archiving, business continuity and email policy compliance.




             *1 in 3 clients will be using a managed messaging solution in 2009
          Primary market for hosted messaging organizations with 20 to 500 users
Exchange Availability: Despite backups, Exchange is not 
       always available, but users need access 24‐7.


       Exchange Storage: Email storage exploding; e‐discovery 
       and compliance needs; PST and quota nightmares.

       Exchange Management: Email is mission‐critical for many 
       businesses, yet it is not the core competency of most.




                    X
PSTs    End User                              Storage             Backup
Overview: Rapid Deployment
     Step                 The On‐Premise Way                   The LiveOffice Way

     Sizing      Software, services, storage, servers, DR       Automatic scaling

   Budgeting                 All‐or‐nothing                   Deployed as‐needed

  Cost Center               Capital Expense                    Operating Expense

  Procurement    Software, services, hardware, DR, etc.       One throat to choke

  Installation       Software, storage, servers, DR                 No install

   Deployed                 Weeks or months                 5 days or less, guaranteed

  Legacy Data               Months or years                      Days or weeks
Managed Messaging Services-
Email / Web Security
Yankee Group – “SMB’s Are Not Keeping Pace with a Rapidly Evolving Security Threat Landscape”. Exhibit 2.
Email and Web Threats have Converged
5 years ago – 99% of malware in email was attached
Today – 95% of malware in email is delivered by URL
 85% of unwanted email contains links to websites

                          75 percent of Web sites with malicious code are
                          compromised legitimate sites
                          60 percent of the top 100 most popular Web sites
                          have either hosted or been involved in malicious
                          activity
                          29 percent of malicious Web attacks included
                          data-stealing code.




        Websense provides faster and more effective protection against
         today’s threats



     The Changing Threat Landscape
                                                                         19
Multiple Layers of Email Filtering
                                                                          SPAM FILTERS
                                                                           IP Reputation Connection Manager
                                                                           Premium Anti-Spam Multi-Language Filter
                                EMAIL ATTACK PROTECTION                    Statistical Filtering
                                 Denial of Service (DoS) Attack            Sender Policy Framework (SPF)/Sender ID
                                 Protection                                Proprietary Heuristics
                                 Directory Harvest Attack (DHA)            Reputation Analysis
                                 Protection                                URL filtering
                                                                           Reputation-based RBL filtering


Incoming Email
                                                                                                                 TLS   Clean
             TLS
                                                                                                                       Email




                                            VIRUS AND WORM FILTERING         CONTENT AND ATTACHMENT
        PRIMARY FILTERS
                                              MX Logic’s proprietary          FILTERING
         Domain level black-and-white
                                              WormTraqTM worm detection       Keyword filtering
         lists
                                              technology                      Attachment filtering
         Distributed black lists
                                              McAfee® Anti-virus              Archive file integrity filtering
         Recipient deny lists
                                              Sophos® Anti-virus              HTML content protection
         User-level black-and-white lists
                                              Authentium® Anti-virus          Fraud protection
                                                                              Spam beacon and web bug
                                                                              detection and blocking
Global Technical Support                                                                                                                    = Hosted
                                                                 Data Security
• Standard Service
                                                                                                                                            = On-Premise
• Premium Service
• Mission Critical Support                                             WEBSENSE
                                                                                                                                            = Client
                                                                  Data Security
                                                                Data Security
                                                                       Suite                Endpoint
                                                            Discover
                                                                                  Protect
                                                                       Monitor
                                        Integrated
                                                                                                       Shared
                                        Policy
                                                                                                       Content
                                        Controls
                             Shared                                                                    Awareness
                             Content
                             Gateway
                                                                                                                                Messaging
   Web
                                                                                                                                Security
   Security                      WEBSENSE
                                 Web Security                                                                       WEBSENSE
                                                                                                                    Email Security
                                 Gateway
                   WEBSENSE
                                                                                                       Messaging Security
                                                                                                                  Antivirus
                      Security WEBSENSE
                   WebWeb Security
                                            Express                                                      Antispam
                                                                                                                               Encryption
                                                                                                                    Content
                                                                                                                    Filter
                                                 WEBSENSE
                      WEBSENSE
                      Remote                     Hosted Web                                              WEBSENSE
                      Filtering                                                                          Hosted Email
                                                 Security
                                                                                                         Security
                                    WEBSENSE
                                    Web Filter
                                                                                  Unified
                                                            Integrated
                                                                                  Hosted
                                                            Threat
                                                                                  Services
                                                            Detection




                              Websense Integrated Solutions
Websense
                                                                                                                   Hosted
                                                                                                                   Customers
                                                     50 million real-time
                                                     data collecting systems



      Websense Email Security




                                                                                                       10+ million
                                                                                                       emails per hour




                       100+ million web sites
                       per day
URL & Security
     Database



                                                                                                        Websense Hosted Security
                                                                          Threat detection / probes
                                     ThreatSeeker®                                Security updates
                                     TECHNOLOGY
                                                                         Shared analytics / feedback
  Websense Security Labs




                                The ThreatSeeker™ Network
Managed Hosting Services
Managed Services - Market Defined Segments
Enterprise
Co-location
Network monitoring
Desktop support
WEB hosting
Exchange mailboxes
DR Services (limited)
Data center infrastructure hosting
Remote device monitoring and management
Hosted Managed Services Layers

                           Applications
                             Database
                             Help Desk
                              Storage
             Help Desk




                                            Help Desk
                         Operating System
                              Servers
                            Networking
                            Data Center

      Standard Offering
      Optional Offering (SQL and Oracle Databases Only)
      Limited
Avnet Full Managed Hosting

   Highly Secure, Robust & Redundant facility
   24 x 7 x 365 environment
   Secure Network infrastructure & network
   management provided
   Monitoring of and management of servers
   Operating Systems patching and imaging
   (Windows, Linux, Unix, i5/OS)
   Back-up and restore
   Service Level Agreements (SLA)
Co-location vs. Avnet managed hosting

• Network infrastructure costs

• Network management costs

• System Admin & Monitoring costs

• Physical Security costs

• Data Storage infrastructure costs

• Data Storage management costs

• Maintenance costs
Avnet provides                              Benefits

                                      •   Stable & secure platform to host
•   An extremely reliable & robust        client applications
    environment
                                      •   Scalable to client’s needs
•   Tier 4 Datacenter
•   Manage Servers, OS, Network &     •   Reduce admin overhead; focus on
    Storage
                                          application
•   Utilize Avnet Shared resources:
                                      •   Save Money
      • Network
      • Storage: SAN/NAS
                                            • Utilize ‘$1M’ network at no
      • Tape Back-up
                                              additional cost

                                            • Eliminate ‘out of pocket’ storage
                                              expense & Dynamic allocation
Information and Network Security Solutions
Information and Network Security Services

           SecureWorks Security Services                                 SecureWorks Security Advantage

                                                           Aggregation, correlation, and analysis of log data from network
 SIM (Security Information Management) On-Demand                  devices, security devices and other key assets
                                                           24x7 real-time analysis of logs and alerts from security devices
                    Log Monitoring                                     and critical IT assets by certified experts.
Intrusion Prevention Systems (IPS) / Intrusion Detection   Intrusion Prevention/Intrusion Detection at the network perimeter
                     Systems (IDS)                                             or interior to the network

                  Threat Intelligence                      Reporting from SecureWorks Counter Threat Unit research team

                        Firewall                                       Control over network access and egress

                       Host IPS                                     Targeted intrusion prevention on key systems

                Vulnerability Scanning                              Evaluation and inventorying of network assets

                    Log Retention                                      Comprehensive archiving of device logs

                   Encrypted Email                                     Protection for email messages in transit

                 Professional Services                                   Consulting, assessment and testing
Security Information Management (SIM)
Managed Intrusion Prevention and Detection Service
Vulnerability Scanning Service
IT Lifecycle Managed Services
TriActive - IT Lifecycle Management made simple
                    TriActive focuses on the 4 Corners of IT Lifecycle
                    Management:

                         Hardware and Software Asset Management
                         System Configuration and Tools
                         Security Management
                         IT Service Desk Management

                    Help customers manage their environment with
                    real-time accuracy:

                         Know what is in the environment
                         Eliminate overbuying
                         Strengthen contract negotiations
                         Ensure security
                         Cost effective – scalable solution
The Questions Everyone Deals With…


Is it time for your EA true-up?

Are you prepared for software audits?

Are you ready for SIIA?

Are your security patches current?

Is there a hardware refresh in your future?

Does that user really need that software?

Do you have the tools you need…right now?

Can you recover lost or stolen PC’s?

                     “Managing software licensing can be a nightmare.  Not to mention hardware assets and working to implement 
                     refresh cycles.  With TriActive's On Demand solution, I can begin to wake up from my nightmare!  The ease and 
                     management of TriActive's utility is worth its weight in gold.” ~IT Director
TriActive OnDemand Solutions for IT
                                Pay for what you need!

                        •   TriActive OnDemand Solutions for
                            IT are organized into logical
                            bundles based on specific needs
                        •   Upgrade from one solution to
                            another without any additional
                            overhead or complexity
                        •   A fully integrated suite of products
                            with an intuitive interface
                        •   Fast to deploy – get a baseline in
                            days!!!
The Logical Solution
A solution that easily installs in
                                             •   A solution that fits any budget
   distributed environments


                                             •   A solution you can start using
A solution that provides accurate, up to
   date customizable reports                     today
A solution that protects you from
   untimely audits and fines

A solution that integrates patch
   management, remote control,
   software distribution, and service
   desk
TriActive for Intel vPro Support - Functionality
Remote configuration – configure systems remotely without having to touch the PC

Platform inventory – regularly scan the network to discover PC platforms regardless of
    their power state, and report their power level status

HW inventory – read HW inventory OOB as written by the BIOS to the 3PDS and report
  out; HDD, CPU, memory, etc.

Remote diagnostics and repair – use Serial Over LAN (SOL) to remotely boot and
  debug a PC; view POST, boot to BIOS and Boot to Safe Mode (F8 boot)

Remote power control – securely, remotely reboot, power on and off a PC using AMT
  API

Fast Call For Help - The ability for an user to request help from the IT console by
   pressing a key sequence on the PC

Remote Scheduled Maintenance - The ability for a PC (even if it’s turned off) to call into
  the IT console at a scheduled time interval for proactive maintenance
TriActive for Intel vPro Support – 2009 Roadmap
Q1/Q2 - 2009
Hardware Inventory – Real-time inventory even when the PC is powered off
Remote Power Control – Schedule tasks (patch, software delivery) off hours even
  when the PC is powered off
Configure Systems – Access the BIOS without having to touch the PC
System Recovery – Recover frozen/halted systems without having to touch the PC

Q3/Q4 - 2009
Expanded Lost/Stolen Laptop Recovery – Locate the Laptop even when the
   OS/disk is wiped
Fast Call for Help – End-user can open a help desk ticket even when the PC is hung
Expanded System Recovery – Single-click PC re-image and end-user personal files
   recovery
Resources


                Team Alias: ManagedServices@Insight.com
                            SaaS@insight.com


                                    Carlos Román
                            Sr. Manager, Managed Services
                                 croman@insight.com
                                         x1294

           Jamie Gasior                                       Tobey Amy
  Business Development Manager                       Business Development Manager
       jgasior@insight.com                                 tamy@insight.com
              x1075                                              x5248



             External Page: www.Insight.com/ManagedServices
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentationvishalnvora1
 
Bridging the gap between manufacturing and engineering
Bridging the gap between manufacturing and engineeringBridging the gap between manufacturing and engineering
Bridging the gap between manufacturing and engineeringJordan Berkley, MBA,PMP,CSM
 
09 q7-itil 2011-overview-diagram-english_1111071
09 q7-itil 2011-overview-diagram-english_111107109 q7-itil 2011-overview-diagram-english_1111071
09 q7-itil 2011-overview-diagram-english_1111071bigwalker
 
Business Process Improvement
Business Process ImprovementBusiness Process Improvement
Business Process ImprovementSimon Gough
 
Aras PLM Software Integration Basics
Aras PLM Software Integration BasicsAras PLM Software Integration Basics
Aras PLM Software Integration BasicsAras
 
Pp Cmp Global Services Governance Session 0206
Pp Cmp Global Services Governance Session 0206Pp Cmp Global Services Governance Session 0206
Pp Cmp Global Services Governance Session 0206chasmullins
 
Framework 7-1 ltk
Framework 7-1 ltkFramework 7-1 ltk
Framework 7-1 ltkLindseyKouf
 
Sla Model 2002 Jvk
Sla Model 2002 JvkSla Model 2002 Jvk
Sla Model 2002 JvkDrJVK
 
Allied Reliability Phase II EMP Development Overview (March 2009)
Allied Reliability Phase II EMP Development Overview (March 2009)Allied Reliability Phase II EMP Development Overview (March 2009)
Allied Reliability Phase II EMP Development Overview (March 2009)Chris Colson
 
IAPsolutions Corporate Presentation
IAPsolutions Corporate PresentationIAPsolutions Corporate Presentation
IAPsolutions Corporate PresentationIAPsolutions
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieDavid O'Dowd
 
IFS Marget Segment Overview
IFS Marget Segment OverviewIFS Marget Segment Overview
IFS Marget Segment Overviewdaeager
 
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...thavo001
 
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...QAI
 

Was ist angesagt? (17)

Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentation
 
Bridging the gap between manufacturing and engineering
Bridging the gap between manufacturing and engineeringBridging the gap between manufacturing and engineering
Bridging the gap between manufacturing and engineering
 
09 q7-itil 2011-overview-diagram-english_1111071
09 q7-itil 2011-overview-diagram-english_111107109 q7-itil 2011-overview-diagram-english_1111071
09 q7-itil 2011-overview-diagram-english_1111071
 
2 effra roadmap-decubber
2 effra roadmap-decubber2 effra roadmap-decubber
2 effra roadmap-decubber
 
Business Process Improvement
Business Process ImprovementBusiness Process Improvement
Business Process Improvement
 
Aras PLM Software Integration Basics
Aras PLM Software Integration BasicsAras PLM Software Integration Basics
Aras PLM Software Integration Basics
 
Pp Cmp Global Services Governance Session 0206
Pp Cmp Global Services Governance Session 0206Pp Cmp Global Services Governance Session 0206
Pp Cmp Global Services Governance Session 0206
 
Framework 7-1 ltk
Framework 7-1 ltkFramework 7-1 ltk
Framework 7-1 ltk
 
Sla Model 2002 Jvk
Sla Model 2002 JvkSla Model 2002 Jvk
Sla Model 2002 Jvk
 
Allied Reliability Phase II EMP Development Overview (March 2009)
Allied Reliability Phase II EMP Development Overview (March 2009)Allied Reliability Phase II EMP Development Overview (March 2009)
Allied Reliability Phase II EMP Development Overview (March 2009)
 
IAPsolutions Corporate Presentation
IAPsolutions Corporate PresentationIAPsolutions Corporate Presentation
IAPsolutions Corporate Presentation
 
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ieGordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
 
IFS Marget Segment Overview
IFS Marget Segment OverviewIFS Marget Segment Overview
IFS Marget Segment Overview
 
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...
Blending Methods To Succeed Comparing Prince2 S Agility With Scrum Within The...
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
Dallas Mpug
Dallas MpugDallas Mpug
Dallas Mpug
 
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...
CMMI High Maturity Best Practices HMBP 2010: CMMI® FOR SERVICES: INSIGHTS AND...
 

Andere mochten auch

What does good look like? Lessons learnt from assessing the ITAM maturity of ...
What does good look like? Lessons learnt from assessing the ITAM maturity of ...What does good look like? Lessons learnt from assessing the ITAM maturity of ...
What does good look like? Lessons learnt from assessing the ITAM maturity of ...Martin Thompson
 
Cobit 5 used in an information security review
Cobit 5 used in an information security reviewCobit 5 used in an information security review
Cobit 5 used in an information security reviewJohnbarchie
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyTheAnfieldGroup
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User ComputingDATAVERSITY
 
Enterprise DevOps Adoption LinkedIn
Enterprise DevOps Adoption LinkedInEnterprise DevOps Adoption LinkedIn
Enterprise DevOps Adoption LinkedInGary Stafford
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity ModelEliot Arnold
 
Test Your Cloud Maturity Level: A Practical Guide to Self Assessment
Test Your Cloud Maturity Level: A Practical Guide to Self AssessmentTest Your Cloud Maturity Level: A Practical Guide to Self Assessment
Test Your Cloud Maturity Level: A Practical Guide to Self AssessmentDavid Resnic
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015Martin Thompson
 
The business value of cloud maturity
The business value of cloud maturityThe business value of cloud maturity
The business value of cloud maturityTieto Corporation
 
Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Gary Stafford
 
RightScale 2017 State of the Cloud
RightScale 2017 State of the CloudRightScale 2017 State of the Cloud
RightScale 2017 State of the CloudRightScale
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 

Andere mochten auch (12)

What does good look like? Lessons learnt from assessing the ITAM maturity of ...
What does good look like? Lessons learnt from assessing the ITAM maturity of ...What does good look like? Lessons learnt from assessing the ITAM maturity of ...
What does good look like? Lessons learnt from assessing the ITAM maturity of ...
 
Cobit 5 used in an information security review
Cobit 5 used in an information security reviewCobit 5 used in an information security review
Cobit 5 used in an information security review
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
 
Enterprise DevOps Adoption LinkedIn
Enterprise DevOps Adoption LinkedInEnterprise DevOps Adoption LinkedIn
Enterprise DevOps Adoption LinkedIn
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity Model
 
Test Your Cloud Maturity Level: A Practical Guide to Self Assessment
Test Your Cloud Maturity Level: A Practical Guide to Self AssessmentTest Your Cloud Maturity Level: A Practical Guide to Self Assessment
Test Your Cloud Maturity Level: A Practical Guide to Self Assessment
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
 
The business value of cloud maturity
The business value of cloud maturityThe business value of cloud maturity
The business value of cloud maturity
 
Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1
 
RightScale 2017 State of the Cloud
RightScale 2017 State of the CloudRightScale 2017 State of the Cloud
RightScale 2017 State of the Cloud
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 

Ähnlich wie Insight SaaS Overview - Cloud Computing

Hr Transformation Overview
Hr Transformation OverviewHr Transformation Overview
Hr Transformation OverviewMark Gavora
 
Madrona Solutions Group - CRM Introduction
Madrona Solutions Group - CRM IntroductionMadrona Solutions Group - CRM Introduction
Madrona Solutions Group - CRM Introductionmike_davidson
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise Itjponnoly
 
MOF 4 Overviewv - ITSM Academy Webinar
MOF 4 Overviewv - ITSM Academy WebinarMOF 4 Overviewv - ITSM Academy Webinar
MOF 4 Overviewv - ITSM Academy WebinarITSM Academy, Inc.
 
Fomatech Introduction
Fomatech IntroductionFomatech Introduction
Fomatech Introductiontchuta
 
Q3 2009 Small Business Specialist Pal Meeting February 2009 Final
Q3 2009 Small Business Specialist Pal Meeting February 2009 FinalQ3 2009 Small Business Specialist Pal Meeting February 2009 Final
Q3 2009 Small Business Specialist Pal Meeting February 2009 Finalvriyait
 
Growing a BPM Center of Excellence
Growing a BPM Center of ExcellenceGrowing a BPM Center of Excellence
Growing a BPM Center of ExcellenceMichael zur Muehlen
 
Product Portfolio Usp June 2009
Product Portfolio Usp June 2009Product Portfolio Usp June 2009
Product Portfolio Usp June 2009TrendIC
 
ReformIS Capability Statement
ReformIS Capability StatementReformIS Capability Statement
ReformIS Capability Statementjpmoynihan
 
1KEY BI for MIS from Tally
1KEY BI for MIS from Tally1KEY BI for MIS from Tally
1KEY BI for MIS from TallyDhiren Gala
 
IT Cost Reduction Overview
IT Cost Reduction OverviewIT Cost Reduction Overview
IT Cost Reduction OverviewMark Peacock
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011forrestsmall
 
sonic automotive newsah
sonic automotive newsahsonic automotive newsah
sonic automotive newsahfinance43
 
Benefiting from a Quality Problem Management Program v2
Benefiting from a Quality Problem Management Program v2Benefiting from a Quality Problem Management Program v2
Benefiting from a Quality Problem Management Program v2McGarahan & Associates, Inc.
 
Removing silos
Removing silosRemoving silos
Removing silosYves Zieba
 

Ähnlich wie Insight SaaS Overview - Cloud Computing (20)

Hr Transformation Overview
Hr Transformation OverviewHr Transformation Overview
Hr Transformation Overview
 
BPM in Telecoms
BPM in TelecomsBPM in Telecoms
BPM in Telecoms
 
Madrona Solutions Group - CRM Introduction
Madrona Solutions Group - CRM IntroductionMadrona Solutions Group - CRM Introduction
Madrona Solutions Group - CRM Introduction
 
Business Governance Of Enterprise It
Business Governance Of Enterprise ItBusiness Governance Of Enterprise It
Business Governance Of Enterprise It
 
Distribution Telecom
Distribution   TelecomDistribution   Telecom
Distribution Telecom
 
MOF 4 Overviewv - ITSM Academy Webinar
MOF 4 Overviewv - ITSM Academy WebinarMOF 4 Overviewv - ITSM Academy Webinar
MOF 4 Overviewv - ITSM Academy Webinar
 
Fomatech Introduction
Fomatech IntroductionFomatech Introduction
Fomatech Introduction
 
Q3 2009 Small Business Specialist Pal Meeting February 2009 Final
Q3 2009 Small Business Specialist Pal Meeting February 2009 FinalQ3 2009 Small Business Specialist Pal Meeting February 2009 Final
Q3 2009 Small Business Specialist Pal Meeting February 2009 Final
 
Growing a BPM Center of Excellence
Growing a BPM Center of ExcellenceGrowing a BPM Center of Excellence
Growing a BPM Center of Excellence
 
Product Portfolio Usp June 2009
Product Portfolio Usp June 2009Product Portfolio Usp June 2009
Product Portfolio Usp June 2009
 
ReformIS Capability Statement
ReformIS Capability StatementReformIS Capability Statement
ReformIS Capability Statement
 
1KEY BI for MIS from Tally
1KEY BI for MIS from Tally1KEY BI for MIS from Tally
1KEY BI for MIS from Tally
 
Presentacion Cognos Controller
Presentacion Cognos ControllerPresentacion Cognos Controller
Presentacion Cognos Controller
 
IT Cost Reduction Overview
IT Cost Reduction OverviewIT Cost Reduction Overview
IT Cost Reduction Overview
 
Delivering Benefits With A Smarter Grid September 2011
Delivering Benefits With A Smarter Grid   September 2011Delivering Benefits With A Smarter Grid   September 2011
Delivering Benefits With A Smarter Grid September 2011
 
Next Generation BPM
Next Generation BPMNext Generation BPM
Next Generation BPM
 
sonic automotive newsah
sonic automotive newsahsonic automotive newsah
sonic automotive newsah
 
Benefiting from a Quality Problem Management Program v2
Benefiting from a Quality Problem Management Program v2Benefiting from a Quality Problem Management Program v2
Benefiting from a Quality Problem Management Program v2
 
Removing silos
Removing silosRemoving silos
Removing silos
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
 

Kürzlich hochgeladen

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 

Kürzlich hochgeladen (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 

Insight SaaS Overview - Cloud Computing

  • 1. Insight Managed Services 2009 – Software as a Service Offerings
  • 2. Insight – A World of Technology Resources • 5,300+ teammates worldwide • Operations in 22 countries • Clients in 170 countries • Serve 80 percent of the Global Fortune 500 • $4.8 billion in revenues in 2007 • Ranked No. 477 on 2008 ‘Fortune 500’ list • Partnered with the world’s technology leaders
  • 3. Insight’s Global Reach Located in 22 countries, supporting clients in 170 countries, 17 languages, 13 currencies
  • 4. Insight’s vision is to be the trusted advisor, helping clients enhance business performance through innovative technology solutions.
  • 5. Clients across the world are looking for ways to … • Consolidate resources • Reduce rising costs • Simplify complexity
  • 6. Maturity Model: A Starting Point Level 6 The Maturity Model is based on industry best practice models (e.g., CMM, CoBit, ITIL, Gartner) Level 5 and Calence experience. Value Driven Level 4 Service Driven • Strong linkages to Managed Level 3 enterprise IT • Well defined architecture • Compliance with services/catalogue• Network and Level 2 Capability processes Proactive • Formal service Business metric measured level agreements linkage Maturity • Service level goals • Detailed service Level 1 • IT/network • Standardized Reactive Levels established level reporting improves business Procedures • Basic service • Differentiated • Real-time • Process training reporting • Best effort services classes infrastructure Chaotic • Enterprise • Key productivity and pricing • Firefighting • Integrated monitoring and quality metrics • Business focused business and • Tied to • Thresholds set measured • No discernable Capacity IT/network Individuals • Trends analyzed process • Workflow forecasting planning • Minimal automation • Problems managed • Roles/Resp’s not • Flexible sourcing documentation defined • Continuous arrangements • Mature Business/IT Linkage • Tribal knowledge improvement • No configuration Business Management • Monitor Events & documentation management and • Capacity planning Availability change • Configs not Service Level Agreements (SLA’s) • Usage based (up/down) management backed up Capability charge • Configs backed Service Delivery Process Engineering • Event correlation • No tools -back Building up/basic address and automated • Unpredictable Service and Account Management management notification Blocks results • Few Effective Automation and Workflow Management Tools Operational Process Engineering Tools Leverage
  • 7. Decision Making Criteria “How important are the following factors when selecting your services vendor?”* Product quality 67% Post-sales service and support 46% Price 44% Product availability 41% First-hand experience using that 40% vendors' (SMB only) products Product features 38% Vendor reputation 34% Recommendation from peer or trusted 28% advisor Base: 384 IT services decision-makers at North American and European SMBs that currently outsource or have plans to outsource in the next 12 months. *Percentage of respondents who answered 4 on a scale of 1 (not at all important) to 4 (very important). Source: Enterprise And SMB Hardware Survey, North America And Europe, Q3 2007
  • 8. “Which of the following outsourced IT services does your company currently purchase or use? Which does your company plan to purchase over the next 12 months?” Server management and support 35% (monitoring, software update, and 24% patch management) 34% Network management and support (VPN, firewall, monitoring) 24% 29% PC and laptop support 23% Planned over the next 12 months Installation and configuration of Currently purchased or using 22% hardware (servers, storage, 17% networking, or PCs) 17% Backup and recovery 13% 14% IT help desk services 14% Base: 554 IT services decision-makers at North American and European SMBs
  • 9. Managed Services Value No major environment changes required • Works with almost any environment • No hardware or software purchase Rapid activation and protection • Works immediately with little configuration or setup Only pay for what is being used • Invoiced monthly • Operating expense and not a capital expense Fully managed solution • Managed / run by a team of experts • Free up IT staff to focus on more productive functions Reduces bandwidth and storage costs • Filters email and web outside your network perimeter • Quarantined messages remain securely outside your network
  • 10. Managed Messaging Solutions How to Engage • Email Security Team Alias: • Email Continuity Contact your SSE / SSR or • Email Archiving ManagedServices@Insight.com • Hosted Exchange Team • Hosted Blackberry (BES) Sr. Manager, Managed Services Carlos Roman croman@insight.com Managed Security Solutions 800-467-4448 ext. 1294 • Web Security 480-235-0331 Direct • Email Security • Managed Firewall Manager, Business Development Tobey Amy • Intrusion Detection/Intrusion Prevention tamy@insight.com 800-467-4448 ext. 5248 • Vulnerability Management 480-567-5619 Direct Data Protection/Data Management Solutions Manager, Business Development • Online/Remote Backup Jamie Gasior jgasior@insight.com • Remote Storage Management 800-467-4448 ext. 1075 480-363-3000 Direct • Desktop Management • Managed Co-location/Hosting Managed Services / Software as a Service
  • 11. Managed Messaging Services – Hosted Exchange
  • 12. Clients’ Messaging / Email IT Infrastructure Internet Blackberry Enterprise Server (BES) Email Filter (Spam / Virus) Firewall Email Server (MS Exchange) Email Archiving
  • 14. Managed Messaging Through 2009, organizations are planning to deploy a greater proportion of their messaging capabilities using hosted services, as shown in the following table. While some hosted services will see only flat to modest growth, other segments will see significant growth, including email retention/archiving, business continuity and email policy compliance. *1 in 3 clients will be using a managed messaging solution in 2009 Primary market for hosted messaging organizations with 20 to 500 users
  • 15. Exchange Availability: Despite backups, Exchange is not  always available, but users need access 24‐7. Exchange Storage: Email storage exploding; e‐discovery  and compliance needs; PST and quota nightmares. Exchange Management: Email is mission‐critical for many  businesses, yet it is not the core competency of most. X PSTs End User Storage Backup
  • 16. Overview: Rapid Deployment Step The On‐Premise Way The LiveOffice Way Sizing Software, services, storage, servers, DR Automatic scaling Budgeting All‐or‐nothing Deployed as‐needed Cost Center Capital Expense Operating Expense Procurement Software, services, hardware, DR, etc. One throat to choke Installation Software, storage, servers, DR No install Deployed Weeks or months 5 days or less, guaranteed Legacy Data Months or years Days or weeks
  • 18. Yankee Group – “SMB’s Are Not Keeping Pace with a Rapidly Evolving Security Threat Landscape”. Exhibit 2.
  • 19. Email and Web Threats have Converged 5 years ago – 99% of malware in email was attached Today – 95% of malware in email is delivered by URL 85% of unwanted email contains links to websites 75 percent of Web sites with malicious code are compromised legitimate sites 60 percent of the top 100 most popular Web sites have either hosted or been involved in malicious activity 29 percent of malicious Web attacks included data-stealing code. Websense provides faster and more effective protection against today’s threats The Changing Threat Landscape 19
  • 20. Multiple Layers of Email Filtering SPAM FILTERS IP Reputation Connection Manager Premium Anti-Spam Multi-Language Filter EMAIL ATTACK PROTECTION Statistical Filtering Denial of Service (DoS) Attack Sender Policy Framework (SPF)/Sender ID Protection Proprietary Heuristics Directory Harvest Attack (DHA) Reputation Analysis Protection URL filtering Reputation-based RBL filtering Incoming Email TLS Clean TLS Email VIRUS AND WORM FILTERING CONTENT AND ATTACHMENT PRIMARY FILTERS MX Logic’s proprietary FILTERING Domain level black-and-white WormTraqTM worm detection Keyword filtering lists technology Attachment filtering Distributed black lists McAfee® Anti-virus Archive file integrity filtering Recipient deny lists Sophos® Anti-virus HTML content protection User-level black-and-white lists Authentium® Anti-virus Fraud protection Spam beacon and web bug detection and blocking
  • 21. Global Technical Support = Hosted Data Security • Standard Service = On-Premise • Premium Service • Mission Critical Support WEBSENSE = Client Data Security Data Security Suite Endpoint Discover Protect Monitor Integrated Shared Policy Content Controls Shared Awareness Content Gateway Messaging Web Security Security WEBSENSE Web Security WEBSENSE Email Security Gateway WEBSENSE Messaging Security Antivirus Security WEBSENSE WebWeb Security Express Antispam Encryption Content Filter WEBSENSE WEBSENSE Remote Hosted Web WEBSENSE Filtering Hosted Email Security Security WEBSENSE Web Filter Unified Integrated Hosted Threat Services Detection Websense Integrated Solutions
  • 22. Websense Hosted Customers 50 million real-time data collecting systems Websense Email Security 10+ million emails per hour 100+ million web sites per day URL & Security Database Websense Hosted Security Threat detection / probes ThreatSeeker® Security updates TECHNOLOGY Shared analytics / feedback Websense Security Labs The ThreatSeeker™ Network
  • 24. Managed Services - Market Defined Segments Enterprise Co-location Network monitoring Desktop support WEB hosting Exchange mailboxes DR Services (limited) Data center infrastructure hosting Remote device monitoring and management
  • 25. Hosted Managed Services Layers Applications Database Help Desk Storage Help Desk Help Desk Operating System Servers Networking Data Center Standard Offering Optional Offering (SQL and Oracle Databases Only) Limited
  • 26. Avnet Full Managed Hosting Highly Secure, Robust & Redundant facility 24 x 7 x 365 environment Secure Network infrastructure & network management provided Monitoring of and management of servers Operating Systems patching and imaging (Windows, Linux, Unix, i5/OS) Back-up and restore Service Level Agreements (SLA)
  • 27. Co-location vs. Avnet managed hosting • Network infrastructure costs • Network management costs • System Admin & Monitoring costs • Physical Security costs • Data Storage infrastructure costs • Data Storage management costs • Maintenance costs
  • 28. Avnet provides Benefits • Stable & secure platform to host • An extremely reliable & robust client applications environment • Scalable to client’s needs • Tier 4 Datacenter • Manage Servers, OS, Network & • Reduce admin overhead; focus on Storage application • Utilize Avnet Shared resources: • Save Money • Network • Storage: SAN/NAS • Utilize ‘$1M’ network at no • Tape Back-up additional cost • Eliminate ‘out of pocket’ storage expense & Dynamic allocation
  • 29. Information and Network Security Solutions
  • 30. Information and Network Security Services SecureWorks Security Services SecureWorks Security Advantage Aggregation, correlation, and analysis of log data from network SIM (Security Information Management) On-Demand devices, security devices and other key assets 24x7 real-time analysis of logs and alerts from security devices Log Monitoring and critical IT assets by certified experts. Intrusion Prevention Systems (IPS) / Intrusion Detection Intrusion Prevention/Intrusion Detection at the network perimeter Systems (IDS) or interior to the network Threat Intelligence Reporting from SecureWorks Counter Threat Unit research team Firewall Control over network access and egress Host IPS Targeted intrusion prevention on key systems Vulnerability Scanning Evaluation and inventorying of network assets Log Retention Comprehensive archiving of device logs Encrypted Email Protection for email messages in transit Professional Services Consulting, assessment and testing
  • 32. Managed Intrusion Prevention and Detection Service
  • 35. TriActive - IT Lifecycle Management made simple TriActive focuses on the 4 Corners of IT Lifecycle Management: Hardware and Software Asset Management System Configuration and Tools Security Management IT Service Desk Management Help customers manage their environment with real-time accuracy: Know what is in the environment Eliminate overbuying Strengthen contract negotiations Ensure security Cost effective – scalable solution
  • 36. The Questions Everyone Deals With… Is it time for your EA true-up? Are you prepared for software audits? Are you ready for SIIA? Are your security patches current? Is there a hardware refresh in your future? Does that user really need that software? Do you have the tools you need…right now? Can you recover lost or stolen PC’s? “Managing software licensing can be a nightmare.  Not to mention hardware assets and working to implement  refresh cycles.  With TriActive's On Demand solution, I can begin to wake up from my nightmare!  The ease and  management of TriActive's utility is worth its weight in gold.” ~IT Director
  • 37. TriActive OnDemand Solutions for IT Pay for what you need! • TriActive OnDemand Solutions for IT are organized into logical bundles based on specific needs • Upgrade from one solution to another without any additional overhead or complexity • A fully integrated suite of products with an intuitive interface • Fast to deploy – get a baseline in days!!!
  • 38. The Logical Solution A solution that easily installs in • A solution that fits any budget distributed environments • A solution you can start using A solution that provides accurate, up to date customizable reports today A solution that protects you from untimely audits and fines A solution that integrates patch management, remote control, software distribution, and service desk
  • 39. TriActive for Intel vPro Support - Functionality Remote configuration – configure systems remotely without having to touch the PC Platform inventory – regularly scan the network to discover PC platforms regardless of their power state, and report their power level status HW inventory – read HW inventory OOB as written by the BIOS to the 3PDS and report out; HDD, CPU, memory, etc. Remote diagnostics and repair – use Serial Over LAN (SOL) to remotely boot and debug a PC; view POST, boot to BIOS and Boot to Safe Mode (F8 boot) Remote power control – securely, remotely reboot, power on and off a PC using AMT API Fast Call For Help - The ability for an user to request help from the IT console by pressing a key sequence on the PC Remote Scheduled Maintenance - The ability for a PC (even if it’s turned off) to call into the IT console at a scheduled time interval for proactive maintenance
  • 40. TriActive for Intel vPro Support – 2009 Roadmap Q1/Q2 - 2009 Hardware Inventory – Real-time inventory even when the PC is powered off Remote Power Control – Schedule tasks (patch, software delivery) off hours even when the PC is powered off Configure Systems – Access the BIOS without having to touch the PC System Recovery – Recover frozen/halted systems without having to touch the PC Q3/Q4 - 2009 Expanded Lost/Stolen Laptop Recovery – Locate the Laptop even when the OS/disk is wiped Fast Call for Help – End-user can open a help desk ticket even when the PC is hung Expanded System Recovery – Single-click PC re-image and end-user personal files recovery
  • 41. Resources Team Alias: ManagedServices@Insight.com SaaS@insight.com Carlos Román Sr. Manager, Managed Services croman@insight.com x1294 Jamie Gasior Tobey Amy Business Development Manager Business Development Manager jgasior@insight.com tamy@insight.com x1075 x5248 External Page: www.Insight.com/ManagedServices