SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Mastering the Secrets to Success in Managed Security




              Mastering the Secrets to Success
                   in Managed Security
                             Special Guest: David Castro, Kaseya
                    Host: Michael Siggins, Publisher ChannelPro Magazine




                                                       1
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      How to Participate: Audio Options
     1. Turn on the volume on your computer.
        To join the audio broadcast during an event, choose “Join
        Audio Broadcasting” on the Communicate menu.

     2. Dial in to our teleconference line.
        Phone: 1-408-792-6300
        Meeting Number: 660 618 127

     If you are having difficulty with WebEx, please contact technical
     support: 866-229-3239.


                                                       2
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      How to Participate: Ask Questions
     1. To ask questions of the panelists:
        Submit your questions via the Q&A area in the bottom right
        area of your screen.

     2. To ask about technical issues:
        Use the Chat area in the middle right area of your screen.
        Submit your questions to the Host, EH Publishing.

     If you are having difficulty with WebEx, please contact technical
     support: 866-229-3239.


                                                       3
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




      Agenda
     •    Four keys to safe computing
     •    Common managed security challenges
     •    Five proven managed security best practices
     •    Choosing the right RMM tool
     •    Four examples of best practices in action
     •    Benefits of following best practices


                                                       4
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




    The Managed Security Opportunity
     • Security is still a major issue for SMBs
                   • Kaspersky Lab identified > 1 billion threats and ~89.5 million
                     malicious URLs in 2Q 2012 alone

     • SMBs spend heavily on security
                   • IDC says U.S. SMB security spending will top $5.6 billion in
                     2015 and grow twice as fast as overall IT spending

     • Spending on managed security services is
       growing fast
                   • Infonetics says global managed security service revenue
                     grew 12% in 2011 to $11.7 billion and will reach nearly $18
                     billion by 2016

                                                       5
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



     What SMBs and MSPs Want from
     Managed Security Services
     SMBs:
            – End-to-end protection
            – Guaranteed service levels
            – Minimal disruption to user productivity and core
              business processes
     MSPs:
            –    High customer satisfaction rates
            –    Low administrative expenses
            –    Strong profits
            –    A scalable foundation for long-term growth
                                                       6
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




   The Four Keys to Secure Computing
     • Properly install reputable security software on
       every end point
     • Keep the software up to date with the latest
       revisions and containments
     • Ensure that the software performs system
       scans regularly
     • Verify that the software successfully patches
       OS’s and applications
                                                       7
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Why MSPs Struggle with Managed Security
   • Inconsistent execution due to lack of
     centralized oversight and control
                 Multiple security products with different interfaces
                 complicate management

   • Reactive technical processes
                 Security software or vendor must notify MSP of problems
                 and new updates and patches

   • Labor-intensive processes
                 Manual updating, installation, and patching—often in
                 person and device-by-device.
                                                       8
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




   Managed Security Best Practices
     How best-in-class managed security providers do
     business

     1. Sell security, not security products
                   • Business owners care about security, not tools
                   • Emphasize the end result—comprehensive security—
                     rather than the tools used to achieve it

     2. Choose the security tools your customers use
                   • Build it into you SLA

                                                       9
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



    Managed Security Best Practices
     3. Employ centralized, proactive security processes
            – Manage all products through one console
            – Actively confirm installations, updates, scans, and
              patching

     4. Automate your security processes wherever
     possible

     5. Deliver thorough, regular reports
            – Demonstrate value you add by listing updates,
              patching, and scans
                                                       10
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Features to Look For in an RMM Tool
     • Extensive built-in automation
                   System should search websites for updates and patches,
                   determine which devices need them, then install
                   automatically as instructed

     • Robust scripting
                  System should be capable of automating anything you
                  can do at the command line



                                                       11
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




  Features to Look For in an RMM Tool
     • Proactive security features
                  System should actively confirm installs, updates, scans,
                  and patches rather than react to input from security
                  software

     • Tight integration with leading security
       products
                  Close, two-way communication, not just a click-through

     • Strong reporting functionality
                  Ability to compile detailed data easily
                                                       12
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




 Example 1: Patching a PC Running Msft Windows
   1. Use RMM software to specify in advance:
                 • Which patches to install on which PCs
                 • Installation dates and times
                 • How to handle issue like rebooting

   2. Patch Windows devices automatically

   Results:
          – Patch nearly unlimited Windows devices with
            minimal human intervention
          – No WSUS required
                                                       13
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Example 2: Applying an Anti-Virus Update
   1. Use RMM software to find security updates
      automatically
   2. Install them automatically through one
      console at the click of a button

   Results:
          – No need to check websites yourself
          – No need for manual installation
          – More effectively keep clients current on latest
            updates
                                                       14
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Example 3: Deploying a Malware Containment

     1. Use RMM software to acquire new
        containments automatically as they appear
     2. Install them automatically where and as you
        specify

     Results:
            – Faster response times to new threats
            – No need for manual searches or installation


                                                       15
Success Series of Webinars
Mastering the Secrets to Success in Managed Security




Example 4: Deploying Non-Microsoft, Non-Malware Update

    1. Use RMM software to find updates for
       common technologies like Java, Flash, Zip,
       etc.
    2. Install them automatically based on highly
       configurable policies

    Results:
           – More comprehensive security
           – Minimal incremental effort

                                                       16
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



 Benefits of Using Managed Security Best Practices
    • Lower overhead
                  Centralization + automation = major savings of time and
                  effort

    • Higher profits
                  Lower overhead translates to a bigger bottom line

    • Better security
                  Automated, proactive processes reduce human error, keep
                  customers safer

    • Reduced risk of SLA failure
                   Better security means fewer SLA violations
                                                       17
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Benefits of Using Managed Security Best Practices
   • More time for strategic consulting and project
     work
                Because you’re spending less time on routine security
                maintenance

   • Enhanced customer satisfaction
                 Clients appreciate vendors who keep them secure and
                 provide strategic guidance

   • Greater ability to scale your business
                 Grow customer base faster than payroll thanks to
                 automated processes
                                                       18
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



   Summary
    • Managed security is a significant opportunity if
      you deliver it efficiently and effectively
    • Best-in-class MSPs use state-of-the-art RMM
      software to:
           – Build their managed security practice around
             automated, centralized, and proactive security
             processes
           – Sell security as an end result rather than a set of
             products
           – Secure and satisfy their clients more completely
           – Earn consistently high profits

                                                       19
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



    About Kaseya
    • Enterprise-class IT systems
      management for everybody

    • Key Facts
            – Founded 2000
            – Privately held, no debt, no external capital
              requirements
            – 33 offices worldwide in 20 countries with
              450+ employees
                   • 12,000+ customers
                   • Millions of assets managed
            – Patented IT service delivery process & remote
              IT management process
                   • 24 patents pending
            – Common Criteria (EAL2+) certified and FIPS
              140-2 security compliant
            – ITIL v2 and v3 compatible

                                                       20
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  The Kaseya Topology
  1 agent > 1 server > 1 web console




         On premise OR SaaS




                                                       21
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  One web console
  Core
  • Agent Monitoring
  • Agent Procedures
  • Audit and Inventory
  • Backup
  • Info Center
  • Live Connect
  • Mobile Device Management
  • Network Discovery
  • Network Monitor
  • Patch Management
  • Policy Management
  • PSA Integration                                    Add On
  • Remote Control                                     Directory Services, Desktop Policy Management,
                                                       Desktop Migration, Service Desk, Data Backup,
  • Ticketing                                          Antivirus, Antimalware, Imaging and Deployment,
  • Time Tracking                                      Software Deployment & Update, Endpoint Security
  • Service Billing

                                                                    22
Success Series of Webinars
Mastering the Secrets to Success in Managed Security

  3
  r




  Kaseya’s Security Solution
  d
  O
  p
  P
  e
  a
  r
  a
  y
   S
   c
  re
   M
   h
   K
   o
   e
  tA
   a
  tK
   n
   d
    S
    e
    r
    v
     K
     a
     s

     y
    ia
     g

  Blended Protection/Unified Platform/Remediation/Partners
  is
   na
    c
   ie
   u
  ne
   As
  *tE
   ln
  gr
   n
   yA
    e
   in
   o t
  Ss
   an
   td
    D
    yP
   r
   n
  o
  Sit
    e
    ap
   iP
   g
  y-t
  fio
   A
   /s r
   n r
  tc
   n
  st
   M
   g
   &
    k
    -
    Ai
     o
   R
   a
  tV
  wtn
    nh
     c
  a
  ee
   lt
   i&ie
     t
   &
   M e
   M
   m
   w
  rd
  m r
    in
   a
  ee
   aR
    u
    vg
     Ss
  MM
   n u
   d
   ls
   re
    ie
  So
   a r
  Dir
   e
   wpc
   b
   g e
  eao
    u
  Oiu
   e s
  pt
   rs
   lr
   m
  ft
  lii
   e
   e
  fi
   o
  o  t
  in
   n
  yty
  c g
  m
  e
  e
  n
  t




                                                       23
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



  Why MSPs Choose Kaseya


                    A single Kaseya user can proactively manage 1,000s of automated
                    IT systems and network tasks in the same amount of time required
                    by a team of technicians using other techniques

                    It’s the industry’s only patented server-agent architecture; MSPs
                    get enterprise-class capability that is easy to use and easy to afford

                    With 60+% of top MSPs worldwide using Kaseya, they get access to
                    the most robust community available

                    And with so many ISVs plugging in to Kaseya via a seamless
                    integration process, they get an easy way to leverage their existing
                    strategic technology partnerships



                                                       24
Success Series of Webinars
Mastering the Secrets to Success in Managed Security



More Machines per Technician



                                                                60% of Kaseya
                                                            customers double the
                                                             productivity of their
                                                                 technicians




                                                       25
Success Series of Webinars
   25
Mastering the Secrets to Success in Managed Security



 Attendees – Q3 ’12 Get started with Kaseya
  •  Custom demo
    – Eligible for free hosted POC (Kaseya EJS)
  • Special Pricing
    – Foundation $1995/Admin/yr
    – Essentials starting @ $5.75/device/mo
  • Promos*
    – KSDU starting @ $5/device/mo
    – KAV or KAM starting @ $6/device/yr
    26
                  /KaseyaFan             /company/kaseya   @kaseyacorp      community.kaseya.com


                                                                         *Other terms apply
                                                           26
Success Series of Webinars

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 

Was ist angesagt? (20)

Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
USPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability Management
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management Program
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
 

Andere mochten auch

Andere mochten auch (9)

Scripting and Automation within the MAX Platform Ernest Byrd
Scripting and Automation within the MAX Platform   Ernest ByrdScripting and Automation within the MAX Platform   Ernest Byrd
Scripting and Automation within the MAX Platform Ernest Byrd
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Abdullahi chowdhury presentation slides
Abdullahi chowdhury presentation slidesAbdullahi chowdhury presentation slides
Abdullahi chowdhury presentation slides
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
Consilien Managed IT Services
Consilien Managed IT ServicesConsilien Managed IT Services
Consilien Managed IT Services
 
NetWatcher crowdsourcing
NetWatcher crowdsourcingNetWatcher crowdsourcing
NetWatcher crowdsourcing
 

Ähnlich wie MSP Mastering the Secrets to Succuss in Managed Security

Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
Arun Gopinath
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 

Ähnlich wie MSP Mastering the Secrets to Succuss in Managed Security (20)

Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 

Mehr von David Castro

Mehr von David Castro (20)

SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
 
SI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials KitSI Alliance Marketing - GTM Bill of Materials Kit
SI Alliance Marketing - GTM Bill of Materials Kit
 
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding ToolLead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
Lead Generation Best Practices | Kaseya Partner Program VAR Onboarding Tool
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
 
For VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell KaseyaFor VARs and MSPs | Why Resell Kaseya
For VARs and MSPs | Why Resell Kaseya
 
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT ServicesFor SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
 
MSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2013 | Global Pricing Benchmark Survey and Results
 
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsMSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP Profits
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 
MSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing MessagesMSP Sales Tactics | How to Create Effective Marketing Messages
MSP Sales Tactics | How to Create Effective Marketing Messages
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
 
MSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New ContractsMSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
MSP Sales Tactic | Conducting Effective Network Assessments to Win New Contracts
 
MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...MSP Positioning & Messaging | How to differentiate your MSP business to win m...
MSP Positioning & Messaging | How to differentiate your MSP business to win m...
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
MSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and ResultsMSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
MSP State of the Union 2012 | Global Pricing Benchmark Survey and Results
 
MSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to UseMSP Best Practice | Staffing for Growth and Core KPIs to Use
MSP Best Practice | Staffing for Growth and Core KPIs to Use
 
Elevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solutionElevator pitch with context - enterprise software ITSM solution
Elevator pitch with context - enterprise software ITSM solution
 
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More ContractsMSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
MSP Best Practice | Using Strategic IT Roadmaps to Get More Contracts
 
Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...Multivariate Testing and Results - Landing Page Analysis (presented at Market...
Multivariate Testing and Results - Landing Page Analysis (presented at Market...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

MSP Mastering the Secrets to Succuss in Managed Security

  • 1. Mastering the Secrets to Success in Managed Security Mastering the Secrets to Success in Managed Security Special Guest: David Castro, Kaseya Host: Michael Siggins, Publisher ChannelPro Magazine 1 Success Series of Webinars
  • 2. Mastering the Secrets to Success in Managed Security How to Participate: Audio Options 1. Turn on the volume on your computer. To join the audio broadcast during an event, choose “Join Audio Broadcasting” on the Communicate menu. 2. Dial in to our teleconference line. Phone: 1-408-792-6300 Meeting Number: 660 618 127 If you are having difficulty with WebEx, please contact technical support: 866-229-3239. 2 Success Series of Webinars
  • 3. Mastering the Secrets to Success in Managed Security How to Participate: Ask Questions 1. To ask questions of the panelists: Submit your questions via the Q&A area in the bottom right area of your screen. 2. To ask about technical issues: Use the Chat area in the middle right area of your screen. Submit your questions to the Host, EH Publishing. If you are having difficulty with WebEx, please contact technical support: 866-229-3239. 3 Success Series of Webinars
  • 4. Mastering the Secrets to Success in Managed Security Agenda • Four keys to safe computing • Common managed security challenges • Five proven managed security best practices • Choosing the right RMM tool • Four examples of best practices in action • Benefits of following best practices 4 Success Series of Webinars
  • 5. Mastering the Secrets to Success in Managed Security The Managed Security Opportunity • Security is still a major issue for SMBs • Kaspersky Lab identified > 1 billion threats and ~89.5 million malicious URLs in 2Q 2012 alone • SMBs spend heavily on security • IDC says U.S. SMB security spending will top $5.6 billion in 2015 and grow twice as fast as overall IT spending • Spending on managed security services is growing fast • Infonetics says global managed security service revenue grew 12% in 2011 to $11.7 billion and will reach nearly $18 billion by 2016 5 Success Series of Webinars
  • 6. Mastering the Secrets to Success in Managed Security What SMBs and MSPs Want from Managed Security Services SMBs: – End-to-end protection – Guaranteed service levels – Minimal disruption to user productivity and core business processes MSPs: – High customer satisfaction rates – Low administrative expenses – Strong profits – A scalable foundation for long-term growth 6 Success Series of Webinars
  • 7. Mastering the Secrets to Success in Managed Security The Four Keys to Secure Computing • Properly install reputable security software on every end point • Keep the software up to date with the latest revisions and containments • Ensure that the software performs system scans regularly • Verify that the software successfully patches OS’s and applications 7 Success Series of Webinars
  • 8. Mastering the Secrets to Success in Managed Security Why MSPs Struggle with Managed Security • Inconsistent execution due to lack of centralized oversight and control Multiple security products with different interfaces complicate management • Reactive technical processes Security software or vendor must notify MSP of problems and new updates and patches • Labor-intensive processes Manual updating, installation, and patching—often in person and device-by-device. 8 Success Series of Webinars
  • 9. Mastering the Secrets to Success in Managed Security Managed Security Best Practices How best-in-class managed security providers do business 1. Sell security, not security products • Business owners care about security, not tools • Emphasize the end result—comprehensive security— rather than the tools used to achieve it 2. Choose the security tools your customers use • Build it into you SLA 9 Success Series of Webinars
  • 10. Mastering the Secrets to Success in Managed Security Managed Security Best Practices 3. Employ centralized, proactive security processes – Manage all products through one console – Actively confirm installations, updates, scans, and patching 4. Automate your security processes wherever possible 5. Deliver thorough, regular reports – Demonstrate value you add by listing updates, patching, and scans 10 Success Series of Webinars
  • 11. Mastering the Secrets to Success in Managed Security Features to Look For in an RMM Tool • Extensive built-in automation System should search websites for updates and patches, determine which devices need them, then install automatically as instructed • Robust scripting System should be capable of automating anything you can do at the command line 11 Success Series of Webinars
  • 12. Mastering the Secrets to Success in Managed Security Features to Look For in an RMM Tool • Proactive security features System should actively confirm installs, updates, scans, and patches rather than react to input from security software • Tight integration with leading security products Close, two-way communication, not just a click-through • Strong reporting functionality Ability to compile detailed data easily 12 Success Series of Webinars
  • 13. Mastering the Secrets to Success in Managed Security Example 1: Patching a PC Running Msft Windows 1. Use RMM software to specify in advance: • Which patches to install on which PCs • Installation dates and times • How to handle issue like rebooting 2. Patch Windows devices automatically Results: – Patch nearly unlimited Windows devices with minimal human intervention – No WSUS required 13 Success Series of Webinars
  • 14. Mastering the Secrets to Success in Managed Security Example 2: Applying an Anti-Virus Update 1. Use RMM software to find security updates automatically 2. Install them automatically through one console at the click of a button Results: – No need to check websites yourself – No need for manual installation – More effectively keep clients current on latest updates 14 Success Series of Webinars
  • 15. Mastering the Secrets to Success in Managed Security Example 3: Deploying a Malware Containment 1. Use RMM software to acquire new containments automatically as they appear 2. Install them automatically where and as you specify Results: – Faster response times to new threats – No need for manual searches or installation 15 Success Series of Webinars
  • 16. Mastering the Secrets to Success in Managed Security Example 4: Deploying Non-Microsoft, Non-Malware Update 1. Use RMM software to find updates for common technologies like Java, Flash, Zip, etc. 2. Install them automatically based on highly configurable policies Results: – More comprehensive security – Minimal incremental effort 16 Success Series of Webinars
  • 17. Mastering the Secrets to Success in Managed Security Benefits of Using Managed Security Best Practices • Lower overhead Centralization + automation = major savings of time and effort • Higher profits Lower overhead translates to a bigger bottom line • Better security Automated, proactive processes reduce human error, keep customers safer • Reduced risk of SLA failure Better security means fewer SLA violations 17 Success Series of Webinars
  • 18. Mastering the Secrets to Success in Managed Security Benefits of Using Managed Security Best Practices • More time for strategic consulting and project work Because you’re spending less time on routine security maintenance • Enhanced customer satisfaction Clients appreciate vendors who keep them secure and provide strategic guidance • Greater ability to scale your business Grow customer base faster than payroll thanks to automated processes 18 Success Series of Webinars
  • 19. Mastering the Secrets to Success in Managed Security Summary • Managed security is a significant opportunity if you deliver it efficiently and effectively • Best-in-class MSPs use state-of-the-art RMM software to: – Build their managed security practice around automated, centralized, and proactive security processes – Sell security as an end result rather than a set of products – Secure and satisfy their clients more completely – Earn consistently high profits 19 Success Series of Webinars
  • 20. Mastering the Secrets to Success in Managed Security About Kaseya • Enterprise-class IT systems management for everybody • Key Facts – Founded 2000 – Privately held, no debt, no external capital requirements – 33 offices worldwide in 20 countries with 450+ employees • 12,000+ customers • Millions of assets managed – Patented IT service delivery process & remote IT management process • 24 patents pending – Common Criteria (EAL2+) certified and FIPS 140-2 security compliant – ITIL v2 and v3 compatible 20 Success Series of Webinars
  • 21. Mastering the Secrets to Success in Managed Security The Kaseya Topology 1 agent > 1 server > 1 web console On premise OR SaaS 21 Success Series of Webinars
  • 22. Mastering the Secrets to Success in Managed Security One web console Core • Agent Monitoring • Agent Procedures • Audit and Inventory • Backup • Info Center • Live Connect • Mobile Device Management • Network Discovery • Network Monitor • Patch Management • Policy Management • PSA Integration Add On • Remote Control Directory Services, Desktop Policy Management, Desktop Migration, Service Desk, Data Backup, • Ticketing Antivirus, Antimalware, Imaging and Deployment, • Time Tracking Software Deployment & Update, Endpoint Security • Service Billing 22 Success Series of Webinars
  • 23. Mastering the Secrets to Success in Managed Security 3 r Kaseya’s Security Solution d O p P e a r a y S c re M h K o e tA a tK n d S e r v K a s y ia g Blended Protection/Unified Platform/Remediation/Partners is na c ie u ne As *tE ln gr n yA e in o t Ss an td D yP r n o Sit e ap iP g y-t fio A /s r n r tc n st M g & k - Ai o R a tV wtn nh c a ee lt i&ie t & M e M m w rd m r in a ee aR u vg Ss MM n u d ls re ie So a r Dir e wpc b g e eao u Oiu e s pt rs lr m ft lii e e fi o o t in n yty c g m e e n t 23 Success Series of Webinars
  • 24. Mastering the Secrets to Success in Managed Security Why MSPs Choose Kaseya A single Kaseya user can proactively manage 1,000s of automated IT systems and network tasks in the same amount of time required by a team of technicians using other techniques It’s the industry’s only patented server-agent architecture; MSPs get enterprise-class capability that is easy to use and easy to afford With 60+% of top MSPs worldwide using Kaseya, they get access to the most robust community available And with so many ISVs plugging in to Kaseya via a seamless integration process, they get an easy way to leverage their existing strategic technology partnerships 24 Success Series of Webinars
  • 25. Mastering the Secrets to Success in Managed Security More Machines per Technician 60% of Kaseya customers double the productivity of their technicians 25 Success Series of Webinars 25
  • 26. Mastering the Secrets to Success in Managed Security Attendees – Q3 ’12 Get started with Kaseya • Custom demo – Eligible for free hosted POC (Kaseya EJS) • Special Pricing – Foundation $1995/Admin/yr – Essentials starting @ $5.75/device/mo • Promos* – KSDU starting @ $5/device/mo – KAV or KAM starting @ $6/device/yr 26 /KaseyaFan /company/kaseya @kaseyacorp community.kaseya.com *Other terms apply 26 Success Series of Webinars