Simple Threat Management For IT Teams and MSPs JEFF KAPLAN Managing Director THINKstrategies, Inc. ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
The Best of Times & Worst of Times GOOD NEWS, More ways to connect, Employees Products Customers/Partners BAD NEWS, More security vulnerabilities, End-points Access points Business interactions ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
The World Is Changing GLOBALIZATION MOBILITY CONSUMERIZATION ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Expanding IT Security Responsibilities ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Software Becoming Embedded Everywhere August 20, 2011 Movie Rentals -> Used to have no idea how much people viewed stuff. Movie rental store might tell you in aggregate monthly. But now with Netflix or VOD, you know every view, what time, how they found the movie through search or recommendations, how many times you paused it and where etc… many more user interactions are happening and being captured ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Software + Sensors + Cloud = Infinite IoT Opportunities ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Connected World Transforming Everything Industry CONNECTED Cars CONNECTED Homes CONNECTED Health ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Using Data to Better Target Solutions ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
And, Changing Business Models ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Finding New Ways to Serve Customers What do they need? What do they prefer? How do they behave? When are they at risk? What will they want next? RECORD ANALYZE ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
– Bill Ruh, CEO GE Digital Changing Industries “Any industrial business that does not become a software (digital) business will not be relevant.” – Bill Ruh, CEO GE Digital ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Redefining Businesses Comfort Services Managed Lighting Services Information Services ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Privacy & Security Concerns ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Privacy & Security Concerns ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Privacy & Security Concerns ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Keys to Simple Threat Management Centralized Control Patch Management User Authentication ONGOING MONITORING SPECIALIZED SKILLS Intrusion Detection Anti-Virus/Malware Remote Device Management <WOC> Would suggest we add HYBRID to the Title “Six keys to Building Successful Public/Hybrid/Private Cloud Solutions” <WOC> Would also suggest adding Industry Standards to the categories in the slide, we should emphasize this to help avoid lock in. <WOC> Would change Scalability to Scalability (Extreme) ©2017 THINKstrategies, Inc. | www.thinkstrategies.com
Security threats continue to evolve and risk management is time consuming for IT departments Known malware instances in 2015 and the most common type of attack $73K Estimated cost of a network intrusion at an SMB1 57% Of businesses that have suffered from a malicious breach or attack Security threats continue to evolve – and get smarter – making risk management a consuming task for IT teams and MSPs. There were over 400 million known malware instances in 2015 and that number continues to rise. And those instances are not easy on the wallet – each malicious attack is estimated at $73 thousand dollars. That’s not to mention the cost of having your computers or your customers offline for an extended period of time. What’s even scarier is how commonplace breaches and attacks are – almost 60% of it teams have experienced a breach or attach at some point. 1- Kaspersky https://1tfe942cap5m2szkj344rcutzhz-wpengine.netdna-ssl.com/files/2013/06/The_cost_of_cyber-attack_for_business-10-210436.png Sources:, Kaspersky1
Best-in-class security and control with LogMeIn Central Easy, quick view into computer status from a single dashboard View, manage, and make changes to anti-virus software, powered by Kaspersky Lab Protect your business from increasingly sophisticated threats with Windows and application updates Setup alerts and monitoring so your end points are always protected, even if you’re not watching