How to Take Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breaches, Damaging Litigation and Rogue (or Careless) Employee
1. Safeguard your Business
$
~ OR ~
How to Take Cut IT Costs and
Boost Productivity WITHOUT
Exposing Your Company to
Security Breaches, Damaging
Litigation and Rogue (or Careless)
Employees
2. Who the Heck is
Denis Wilson and
Why Should I
Listen to Him?
“I am a veteran technology strategist who
specializes in developing highly effective
network and computing systems for small
businesses that provide professional services
or manufacture high-technology products.”
Been working with Microsoft and their clients for
over 20 years
Certified by Microsoft on cloud computing and
hybrid systems
Very knowledgeable in vertical markets like
construction, engineering, architecture,
manufacturing, and the like
Author and speaker on the subject of SMB
technology for SCORE, SBDC, EDCs, SBA, and
a variety of business associations
3. Slide Deck
Availability
Available at:
Slide Share: www.slideshare.net/dwpia
I also have over 15 presentations that are posted at
the same location for your perusal.
Ask me to connect with you on Facebook, LinkedIn or
Twitter if you would like to get my blog posts, and
curated posts on small business technology and
processes.
4. What We Are Going to Cover
PART 2 How technology can help you
PART 3 How to get started
PART 1 How to safeguard your business
5. Ultimately: We Are Going to Cover…
How To Be Smart, Strategic And Intentional With Your IT
Decisions To Maximize Profits, Boost Productivity, Fuel
Growth, Minimize Waste And Significantly Reduce Your
Exposure To Risk
(Versus Taking A Random And Haphazard Approach, Which Is What MOST
Businesses Do)
6. 1. A No-Obligation
Strategic Network
Security
Assessment and
Report (Keep the
Report, It’s Yours)
2. And a Microsoft
Office 365 Business
Premium 30-day
trial
(A $300 Value)
Absolutely FREE.
Bonus!
Hang On Until The End And Get
This FREE!
7. Protect and control
your data
Be prepared for the
unexpected
The manageable
side of risk
management.
8. Our data has
to be secure.
What does
my modern
business need?
We need to reopen our
business quickly after an
emergency.
40% of businesses
hit by disaster
never reopen
FEMA 2013
60% SMB technology leaders
cited data security or privacy
as a concern
Boston Consulting Group study
10. One of your team loses their
mobile device. You can:
• Lock the device to restrict
access
• Reset a user’s PIN to enable
access once it’s been found
• Wipe data from a device that
can’t be located
Manage and
protect
mobile devices.
PIN Reset
12__
Remote Data Wipe
Remote Lock
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
11. • Choose the level of security
and privacy you need
• Customize security by user, by
device and by location
Secure what
matters most.
Salesperson. Mobile worker. Access price
quotes, orders, inventory, customer data,
expense report forms
Human resources manager.
In the office. Access to
personnel files, benefits
information, resumes
Branch office manager. On
location. Access to budget
updates, time sheets,
inventory, scheduling
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
12. • Get to important applications
and information wherever you
are
• Keep company data on the
server, where it is backed up
and up to date
Control access
to your
business data.
HR
CRM
Easy remote access to on-site
applications
Sensitive data stays safe because it’s
on the server and not on a device
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
13. Engineers protected
when on the roof or in
the street
“It was like an invisible and
impenetrable Iron Curtain
that allowed me to sleep at
night”
Tim McCarthy, CEO, TR2 Inc.
Data protection enables a more mobile workforce
without compromising security
TR2 has 2-3 engineers working all around
the U.S. every day. Company and client
critical information is on their laptops and
smartphones. They need to secure that data
without creating inefficiencies for their
engineers.
DWP Information Architects brought in
MaaS360 mobile device management to
secure all laptops, tablets and smartphones,
no matter the operating system.
The result: TR2 could be sure that their
client data was absolutely secure while
their engineers weren’t required to do
anything different.
5 employees | Architectural Engineering | www.tr2.comControllingaccess
Remote Wipe and Device Encryption protected lost
devices
All existing devices could be protected, so they did
not have to spend additional capital.
14. • Take advantage of a single
platform and easy-to-use
tools to proactively manage
desktops and devices
• Get dependable support from
experts
Simplify
management.
Products like Microsoft Intune and
IBM’s MaaS360 provide PC, mobile
device and application
management across popular
platforms (Windows, Windows
phone, iOS, and Android)
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Manage policies and devices with
ease with Office
15. Avoid spam and viruses with
continuously updated protection
Guard PCs and devices with
built-in device security like
BitLocker and encryption
Get automatic,
always-on
protection.
Full device encryption, like
BitLocker technology
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Fingerprint login
Protect against viruses, phishing, and malware, like with
Windows Defender, SmartScreen, and Malwarebytes
16. • Help ensure your data
remains private and secure
• Comply with industry
standards and data privacy
rules
Meet privacy
and security
standards.
Design for deep, multi-
level security through
encryption,
authentication and data
privacy rules.
Meet requirements
specified in
ISO27001, EU
Model Clauses,
HIPAA and more
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
17. • Threats are complex
• Design for attacks at all
stages of their life cycle
• And enable quick and
accurate mitigation
Protect data at
multiple stages
in the attack
lifecycle
Solutions focused on
one stage may fail,
especially when new or
unknown techniques
are used. An effective
prevention strategy
includes technologies
that detect and prevent
across each stage,
easily block known
threat components,
and hone in on evasive
behavior to ultimately
stop attackers from
reaching their end goal.
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Though prevention is
preferable, mitigation
and remediation cycles
continue to be an
important part of each
organization’s
cybersecurity strategy,
and when there’s an
infection, every minute
counts.
Advanced persistent
threats (APTs) are
designed to be evasive
in order to bypass
security defenses. It’s
incredibly easy to
fragment a payload into
several packets, change
a malicious file hash, or
spoof an email header.
18. Credit union keeps
business moving.
“With data
encryption, we no
longer worry
about data security
if the device is lost
or stolen.”
Mark Malinowski, Vice President
of Accounting
Data protection enables a more mobile workforce
without compromising security
Responsive performance and modern hardware
improves customer perception
Live Tiles increase the speed of publishing interest
rates and other real-time information
When natural disasters impacted their
ability to serve customers, RBFCU realized
they needed to increase mobility while
meeting financial industry standards for
data security.
We helped them move from desktop
Windows XP PCs to mobile Windows 10
ultrabooks and tablets.
The result: RBFCU improved customer
service and data security at the same time.
33 employees | Financial Services | www.rbfcu.coop
Protect&ControlYourData
19. Protect your files AND minimize
business disruption
Keep a replica of your entire server
and keep it updated frequently
Get your applications and
services back up and
running in minutes
Protect your files quickly and simply
– the first line of defense
Save copies of your files to a
second location
Quickly restore your files when
accidentally deleted or lost
Backup vs. Disaster Recovery
What’s the difference?
Together, two complementary layers of protection for your business
Disaster RecoveryBackup
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
20. Get to your latest files from
anywhere when the unexpected
happens and never miss a step.
Never lose your
latest files –
even if you lose
your laptop or
device.Back up to a second location or
the cloud
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
File share and sync
stores files in the
cloud, keeping them
available
21. Environment engineers
took their data to the
cloud
“It just worked. It was so
much easier than what we
did before. And we’ve had
no outages”
Lisa Maturkanic, Office Manager, Meridian
Consultants LLC
Meridian got unlimited storage in the cloud and
shared to all of their employees no matter where they
were
Meridian Consultants had an over
abundance of graphic data files that
bogged down their server but the users
needed immediate access.
DWP Information Architects created a cloud
file share and sync network that backed up
to the network-attached storage on-site
The result: They got immediate results
while knowing that their “server” wasn’t
going down on them and having all their
files backed up on-site.
20 employees | Environmental engineers | www.meridianconsultantsllc.comBepreparedfortheunexpected
The critical files were backed up on-site so their
access was immediate and local
Version control was maintained when multiple
engineers accessed the file.
22. Get your critical
business apps
back up and
running in
minutes.
Keep your business running—
even in the event of a disaster
such as fire, break-in, or flood.
A modern server replicates apps
on your virtual machine to a
second virtualized host server at
a second site or in the cloud
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
23. • Ask for a financially-backed
99.9% uptime guarantee
• Ask for 24/7 support system
for business-critical issues
Count on the
reliability of
the cloud.
Look for continuous data backup
in globally-distributed data
centers
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
24. Legal firm sails through
tornado with Windows
Server
IT at the Law Offices of Aaron I. Katsman couldn’t
keep up with the firm’s growth. Slow
performance and the need to frequently restart
servers significantly reduced productivity.
DWP Information Architects deployed Windows
Server 2012, using Hyper-V to create virtual
servers and desktop computers. They set up
automatic backup and failover capabilities to
guard against disaster.
The result: During tornado, employees
served customers from home – without
even realizing they were using the failover
system.
Bepreparedfortheunexpected
“Our computers are
our lifeline. When
tornado hit, Hyper-V
Replica saved our
business.”
Aaron I. Katsman, Owner, Law Offices
of Aaron I. Katsman
Delivered uninterrupted customer service despite a natural
disaster that could have impacted business continuity
Increased IT agility and reduced costs with virtual servers
desktops running on consolidated hardware
Gained time to focus on growing the business by reducing
IT hassles and improving system performance
30 employees | Law | www.katsmanlaw.com
25. ModernBiz
Choose your own path to modern,
with flexible, familiar, and trusted
solutions for your business – desktop
to mobile, server to cloud.
$
26. Next steps
Contact your favorite IT consultant
Take a guided tours products and
services to educate yourself
Sign up for a free trial
27. Get Your No-Obligation
Strategic Network Security
Assessment and Report (Keep
the Report, It’s Yours)
We are a vendor to business only, so we just ask
that the assessment call be for your small business
of 5 -100 PCs, and up to several servers. Offer good
until November 30th.