SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Coffee Talk: Protect Your Business
with Managed Endpoint Security
© 2014 N-able Technologies, Inc. All rights reserved.
Presented by
© 2014 N-able Technologies, Inc. All rights reserved.
Bryan Zimmerman
Product Manager
Security Products
Webinar FAQ
© 2014 N-able Technologies, Inc. All rights reserved.
• Time expectations: 20 mins + Q&A
• We’ll be covering questions at the end
• Ask questions as you think of them
• This will be recorded and posted
within the next week
Phone: 1-888-200-4200
Access Code: 14152951
Local numbers for international locations
at: http://bit.ly/1nJBKQw
Malware is Pervasive & Costly
• Nearly one-third of all malware attacks
specifically target businesses with fewer than
250 employees.1
• Infection is easy and profitable – just a click can
lead to a network-wide infection.
• The recently outbreak of Cryptolocker
generated about $30M in just 100 days.2
• Reveton (or IcePol) is another example of
ransomware.
• Crime pays, and the criminals will continue
being creative.
1. http://www.biztechmagazine.com/article/2013/04/malware-attacks-targeting-small-businesses-rise-
infographic
2. http://www.pcworld.com/article/2082204/crime-pays-very-well-cryptolocker-grosses-up-to-30-million-in-
ransom.html
© 2014 N-able Technologies, Inc. All rights reserved.
Anti-Malware is Everywhere
• Exploits are well publicized, and
most end customers have some
sort of solution in place.
• Many are offered for free or at a
very low cost.
• There are a lot of choices, but not
all of them offer the same level of
protection.
© 2014 N-able Technologies, Inc. All rights reserved.
Why AV is a Problem for MSPs
• Disparate point solutions
• Commoditization
• Lack of integration
• Billing, reporting and management challenges
• Multiple consoles and customer views
• Separate consoles for every customer with multiple log-
ins and passwords – and no central reporting
• No standardization
• Complexity and operational challenges
• Mobile devices pose a roaming threat
© 2014 N-able Technologies, Inc. All rights reserved.
True Managed Endpoint Security
The Features Customers Need
• Anti-virus/spyware
• Firewall
• Intrusion prevention
• Centrally managed quarantine
• Real-time alerts
• Web content filtering
• Web access control
• Application control
A world-class solution doesn’t just eliminate threats – it prevents
malware from installing.
© 2014 N-able Technologies, Inc. All rights reserved.
Integration is Key
A true managed security solution is one that delivers industry-
leading malware protection through a single, integrated
management console.
• Integrated into workflows – not a silo or add on
• Seamlessly integrated into alerts, reports, automations
• Part of the comprehensive view
• Devices not under management are visible
• Scalable and flexible
• Manageable
• Activities are documented for customers and the MSP
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security – The Impact
• Infection is easy (click on an email), spreads quickly, and is
hard to eradicate.
• The cost of downtime and/or reduced productivity.
• The network is only as good as its weakest link – and a point,
commodity solution is often that weak link.
• The key isn’t to get rid of malware, but to avoid it from the
start.
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security - Consultation
• Are you using a standard anti-virus tool across your
organization?
• Can your users/employees turn off their protection or
scheduled scans?
• What type of AV data do you have? Is it installed on every
machine? Do you know when scans have run? Did they all run
without incident?
• Have you had a recent infection? Are your systems clean
now? All of them?
• Are you under any regulatory requirements?
• What would be the consequences if sensitive data or
information were stolen from your network?
© 2014 N-able Technologies, Inc. All rights reserved.
Security Manager – AV Defender
• Based on the #1 Anti-Virus engine, BitDefender® - #1
rating based on AV Comparatives Summary Report 2012.
• Technology repeatedly wins industry awards.
• World-class, enterprise-level end-point security.
© 2014 N-able Technologies, Inc. All rights reserved.
AV Defender – (Malware) Killer Features
• Organizational and system-level Global Exclusions
• Streamlined deployment with rules-controlled setup,
deployment, and migration
• Automatic removal of most previous AV products
• Increased visibility with comprehensive Security Events
• Dashboard-style view of anti-malware activity
• Robust reports to provide insight into the environment
© 2014 N-able Technologies, Inc. All rights reserved.
Demo
© 2014 N-able Technologies, Inc. All rights reserved.
Any Questions?
© 2014 N-able Technologies, Inc. All rights reserved.
Thank You for Attending
• Questions? sales@n-able.com
• Sign up for a free trial of N-central® and
Security Manager – AV Defender at N-
able.com or sales@n-able.com.
• Visit our blog at blogs.n-able.com
• After the webcast – these slides & the
webcast will be available on SlideShare® –
www.slideshare.net/N-ableSlides
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
Legal Information
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able
Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and
the Canadian Intellectual Property Office, and may be registered or pending registration in
other countries. All other N-able trademarks, service marks, and logos may be common law
marks, registered or pending registration in the United States, Canada, or in other countries. All
other trademarks mentioned herein are used for identification purposes only and may be or are
trademarks or registered trademarks of their respective companies.
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.

Weitere ähnliche Inhalte

Mehr von Solarwinds N-able

The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersSolarwinds N-able
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencySolarwinds N-able
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilitySolarwinds N-able
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPsSolarwinds N-able
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinarSolarwinds N-able
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business managementSolarwinds N-able
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report ManagerSolarwinds N-able
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsSolarwinds N-able
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptxSolarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationSolarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch managementSolarwinds N-able
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralSolarwinds N-able
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customersSolarwinds N-able
 

Mehr von Solarwinds N-able (20)

MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
 
5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 

Kürzlich hochgeladen

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Coffee Talk: Protect Your Business with Managed Endpoint Security

  • 1. Coffee Talk: Protect Your Business with Managed Endpoint Security © 2014 N-able Technologies, Inc. All rights reserved.
  • 2. Presented by © 2014 N-able Technologies, Inc. All rights reserved. Bryan Zimmerman Product Manager Security Products
  • 3. Webinar FAQ © 2014 N-able Technologies, Inc. All rights reserved. • Time expectations: 20 mins + Q&A • We’ll be covering questions at the end • Ask questions as you think of them • This will be recorded and posted within the next week Phone: 1-888-200-4200 Access Code: 14152951 Local numbers for international locations at: http://bit.ly/1nJBKQw
  • 4. Malware is Pervasive & Costly • Nearly one-third of all malware attacks specifically target businesses with fewer than 250 employees.1 • Infection is easy and profitable – just a click can lead to a network-wide infection. • The recently outbreak of Cryptolocker generated about $30M in just 100 days.2 • Reveton (or IcePol) is another example of ransomware. • Crime pays, and the criminals will continue being creative. 1. http://www.biztechmagazine.com/article/2013/04/malware-attacks-targeting-small-businesses-rise- infographic 2. http://www.pcworld.com/article/2082204/crime-pays-very-well-cryptolocker-grosses-up-to-30-million-in- ransom.html © 2014 N-able Technologies, Inc. All rights reserved.
  • 5. Anti-Malware is Everywhere • Exploits are well publicized, and most end customers have some sort of solution in place. • Many are offered for free or at a very low cost. • There are a lot of choices, but not all of them offer the same level of protection. © 2014 N-able Technologies, Inc. All rights reserved.
  • 6. Why AV is a Problem for MSPs • Disparate point solutions • Commoditization • Lack of integration • Billing, reporting and management challenges • Multiple consoles and customer views • Separate consoles for every customer with multiple log- ins and passwords – and no central reporting • No standardization • Complexity and operational challenges • Mobile devices pose a roaming threat © 2014 N-able Technologies, Inc. All rights reserved.
  • 7. True Managed Endpoint Security The Features Customers Need • Anti-virus/spyware • Firewall • Intrusion prevention • Centrally managed quarantine • Real-time alerts • Web content filtering • Web access control • Application control A world-class solution doesn’t just eliminate threats – it prevents malware from installing. © 2014 N-able Technologies, Inc. All rights reserved.
  • 8. Integration is Key A true managed security solution is one that delivers industry- leading malware protection through a single, integrated management console. • Integrated into workflows – not a silo or add on • Seamlessly integrated into alerts, reports, automations • Part of the comprehensive view • Devices not under management are visible • Scalable and flexible • Manageable • Activities are documented for customers and the MSP © 2014 N-able Technologies, Inc. All rights reserved.
  • 9. Selling Security – The Impact • Infection is easy (click on an email), spreads quickly, and is hard to eradicate. • The cost of downtime and/or reduced productivity. • The network is only as good as its weakest link – and a point, commodity solution is often that weak link. • The key isn’t to get rid of malware, but to avoid it from the start. © 2014 N-able Technologies, Inc. All rights reserved.
  • 10. Selling Security - Consultation • Are you using a standard anti-virus tool across your organization? • Can your users/employees turn off their protection or scheduled scans? • What type of AV data do you have? Is it installed on every machine? Do you know when scans have run? Did they all run without incident? • Have you had a recent infection? Are your systems clean now? All of them? • Are you under any regulatory requirements? • What would be the consequences if sensitive data or information were stolen from your network? © 2014 N-able Technologies, Inc. All rights reserved.
  • 11. Security Manager – AV Defender • Based on the #1 Anti-Virus engine, BitDefender® - #1 rating based on AV Comparatives Summary Report 2012. • Technology repeatedly wins industry awards. • World-class, enterprise-level end-point security. © 2014 N-able Technologies, Inc. All rights reserved.
  • 12. AV Defender – (Malware) Killer Features • Organizational and system-level Global Exclusions • Streamlined deployment with rules-controlled setup, deployment, and migration • Automatic removal of most previous AV products • Increased visibility with comprehensive Security Events • Dashboard-style view of anti-malware activity • Robust reports to provide insight into the environment © 2014 N-able Technologies, Inc. All rights reserved.
  • 13. Demo © 2014 N-able Technologies, Inc. All rights reserved.
  • 14. Any Questions? © 2014 N-able Technologies, Inc. All rights reserved.
  • 15. Thank You for Attending • Questions? sales@n-able.com • Sign up for a free trial of N-central® and Security Manager – AV Defender at N- able.com or sales@n-able.com. • Visit our blog at blogs.n-able.com • After the webcast – these slides & the webcast will be available on SlideShare® – www.slideshare.net/N-ableSlides © 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
  • 16. Legal Information The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.

Hinweis der Redaktion

  1. Full featured managed endpoint security is the best thing since sliced bread.
  2. The conversation can help you lead your customers to better technology.
  3. The conversation can help you lead your customers to better technology.