SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Coronavirus:
Enabling a Remote
Workforce & Staying
Productive
Today’s Goals
• Lessen the fear of the technology
and what you need or may
already have
• Equip you with the questions and
ideas for what do next
• Give you the knowledge of the
tools that can address your
needs
• Empower you to enable a
productive remote workforce
Things your business will need to be a
productive WFH (Work From Home) business
• Portable devices with access to
the Internet.
• Access to hardware for remote
work
• Productivity tools (Video
Conferencing, Word
Processing, Email, File Sharing,
Access to Apps)
• Mobile Management of devices
• Remote tools
• Identity Management and
Security
Portable devices
(What you need)
• Laptops, tablets, smart phones with
Internet capabilities are a must
• Most remote access is
achieved through a remote
tool of some type
• VPN, Remote Desktop,
Windows Virtual Device
or Direct Access
• Portable Devices can either
have or do not have hard
drives
Can I get the mobile
devices and if not, what?
• Most manufacturers are out of
stock or backlogged.
• We can still get hardware, but it
may need new tools to access
our work data
• We may not have our traditional
work phones at home so we
may need a soft phone
(deskless)
How do I stay productive?
• Hubs for File Sharing, Team
Communication
• Real-time communication with
Video Conferencing, Instant
Messaging
• Document Sharing/Co authoring
• Electronic email or other
messaging tools
• Voice
• Document Management/Data
Management
Mobile Management of Mobile Users and
Data
• Mobile Management simply
means having the ability to
push and pull data and
information so my users can be
more productive.
1. Pushing access to
applications on premise or
in the cloud
2. Security Policies
3. Remote Access and
Support
Identity Management and Security
• Identity Management is what
we call the “source of truth” -
this tells us:
• Which employees have
access to which files
• What applications they
can access
• What groups,
departments, etc. they can
communicate with
Identity Management Security
• Identity Protection w/Passwords
• Rights Management
• Data Loss Prevention
• Intrusion Prevention
• Data Management and centralized
storage
Identity Management Continued
• Increased load and usage from so
many people working remotely
creates potential vulnerabilities in
your network/systems.
• Hotspots or Wifi at your
home/Remote Facility
• It’s important your employees’
identities are secure and your
people and their devices are
managed.
So where do I go?
Step 2: Review your current remote access setup.
Step 1: Get all remote hardware you and your organization will need
to perform remote work
Step 3: Make sure all policies and applications are
accessible to your team and data can be accessed by
your WFH/Remote Workforce.
Step 4: Get a HUB for Collaboration and tools in place
so meetings, calls, documents storage, document
authoring, file sharing, etc. can be done easily.
Step 5: Get Mobile Devices (Laptops, Desktops, Smart
Phones, Tablets, etc.) in a place that they are secure
and data/policies can be pushed and pulled from your
remote workforce.
Creating a Remote Hub for your Workforce
Microsoft Office 365 w/Teams for
$12.50/user gives you everything you
need to work anywhere, anytime and
from any device.
Tools we can provide in a hurry
• Access to hardware from various sources.
• $50-75/user unlimited helpdesk based in San
Diego, CA.
• Microsoft Software Tools (Office 365 or Microsoft
365 for $12.50 for companies under 300 users.
• CIO Consulting (Hourly)
• Setup/Migration Services (Hourly)
Questions to Consider for Remote Support/Helpdesk
• What happens if your IT person can't get to you, WFH, can't access
your device remotely?
• How limited in skillset is one IT person versus a whole team?
• Make sure you can log information into tickets so what happened
and is happening can be captured.
• Can you call 24/7?
MANAGE &
MONITOR
Starting @ $10/user
24/7/365
Starting @ $50/user
THANK YOU
888.563.9132
Managedsolution.com
sales@managedsolution.com

Weitere ähnliche Inhalte

Was ist angesagt?

Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual FirmMarjorieAdams4
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Innovators
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility InsightsJoe Robens
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Faindra Jabbar
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officeAPNIC
 
THE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURETHE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHUREEyal Benedek
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014Stewart Paul
 

Was ist angesagt? (16)

Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
MADS6638
MADS6638MADS6638
MADS6638
 
Resume
ResumeResume
Resume
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
 
Dc16 ch02
Dc16 ch02Dc16 ch02
Dc16 ch02
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
Maximize the Cloud Today
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
THE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURETHE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURE
 
Ubiquitous Computng
Ubiquitous ComputngUbiquitous Computng
Ubiquitous Computng
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014
 

Ähnlich wie How To Enable a Remote Workforce & Stay Productive

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment LCpublicrelations
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Virtual offices moving2cloud
Virtual offices moving2cloudVirtual offices moving2cloud
Virtual offices moving2cloud501 Commons
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftDamir Delija
 

Ähnlich wie How To Enable a Remote Workforce & Stay Productive (20)

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Virtual offices moving2cloud
Virtual offices moving2cloudVirtual offices moving2cloud
Virtual offices moving2cloud
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Technology
TechnologyTechnology
Technology
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

How To Enable a Remote Workforce & Stay Productive

  • 2. Today’s Goals • Lessen the fear of the technology and what you need or may already have • Equip you with the questions and ideas for what do next • Give you the knowledge of the tools that can address your needs • Empower you to enable a productive remote workforce
  • 3. Things your business will need to be a productive WFH (Work From Home) business • Portable devices with access to the Internet. • Access to hardware for remote work • Productivity tools (Video Conferencing, Word Processing, Email, File Sharing, Access to Apps) • Mobile Management of devices • Remote tools • Identity Management and Security
  • 4. Portable devices (What you need) • Laptops, tablets, smart phones with Internet capabilities are a must • Most remote access is achieved through a remote tool of some type • VPN, Remote Desktop, Windows Virtual Device or Direct Access • Portable Devices can either have or do not have hard drives
  • 5. Can I get the mobile devices and if not, what? • Most manufacturers are out of stock or backlogged. • We can still get hardware, but it may need new tools to access our work data • We may not have our traditional work phones at home so we may need a soft phone (deskless)
  • 6. How do I stay productive? • Hubs for File Sharing, Team Communication • Real-time communication with Video Conferencing, Instant Messaging • Document Sharing/Co authoring • Electronic email or other messaging tools • Voice • Document Management/Data Management
  • 7. Mobile Management of Mobile Users and Data • Mobile Management simply means having the ability to push and pull data and information so my users can be more productive. 1. Pushing access to applications on premise or in the cloud 2. Security Policies 3. Remote Access and Support
  • 8. Identity Management and Security • Identity Management is what we call the “source of truth” - this tells us: • Which employees have access to which files • What applications they can access • What groups, departments, etc. they can communicate with Identity Management Security • Identity Protection w/Passwords • Rights Management • Data Loss Prevention • Intrusion Prevention • Data Management and centralized storage
  • 9. Identity Management Continued • Increased load and usage from so many people working remotely creates potential vulnerabilities in your network/systems. • Hotspots or Wifi at your home/Remote Facility • It’s important your employees’ identities are secure and your people and their devices are managed.
  • 10. So where do I go? Step 2: Review your current remote access setup. Step 1: Get all remote hardware you and your organization will need to perform remote work Step 3: Make sure all policies and applications are accessible to your team and data can be accessed by your WFH/Remote Workforce. Step 4: Get a HUB for Collaboration and tools in place so meetings, calls, documents storage, document authoring, file sharing, etc. can be done easily. Step 5: Get Mobile Devices (Laptops, Desktops, Smart Phones, Tablets, etc.) in a place that they are secure and data/policies can be pushed and pulled from your remote workforce.
  • 11. Creating a Remote Hub for your Workforce Microsoft Office 365 w/Teams for $12.50/user gives you everything you need to work anywhere, anytime and from any device.
  • 12. Tools we can provide in a hurry • Access to hardware from various sources. • $50-75/user unlimited helpdesk based in San Diego, CA. • Microsoft Software Tools (Office 365 or Microsoft 365 for $12.50 for companies under 300 users. • CIO Consulting (Hourly) • Setup/Migration Services (Hourly)
  • 13. Questions to Consider for Remote Support/Helpdesk • What happens if your IT person can't get to you, WFH, can't access your device remotely? • How limited in skillset is one IT person versus a whole team? • Make sure you can log information into tickets so what happened and is happening can be captured. • Can you call 24/7?
  • 14. MANAGE & MONITOR Starting @ $10/user 24/7/365 Starting @ $50/user