Download presentation
Presentation is loading. Please wait.
1
Simple Threat Management For IT Teams and MSPs
JEFF KAPLAN Managing Director THINKstrategies, Inc. ©2017 THINKstrategies, Inc. |
2
The Best of Times & Worst of Times
GOOD NEWS, More ways to connect, Employees Products Customers/Partners BAD NEWS, More security vulnerabilities, End-points Access points Business interactions ©2017 THINKstrategies, Inc. |
3
The World Is Changing GLOBALIZATION MOBILITY CONSUMERIZATION
©2017 THINKstrategies, Inc. |
4
Expanding IT Security Responsibilities
©2017 THINKstrategies, Inc. |
5
Software Becoming Embedded Everywhere
August 20, 2011 Movie Rentals -> Used to have no idea how much people viewed stuff. Movie rental store might tell you in aggregate monthly. But now with Netflix or VOD, you know every view, what time, how they found the movie through search or recommendations, how many times you paused it and where etc… many more user interactions are happening and being captured ©2017 THINKstrategies, Inc. |
6
Software + Sensors + Cloud = Infinite IoT Opportunities
©2017 THINKstrategies, Inc. |
7
Connected World Transforming Everything Industry
CONNECTED Cars CONNECTED Homes CONNECTED Health ©2017 THINKstrategies, Inc. |
8
Using Data to Better Target Solutions
©2017 THINKstrategies, Inc. |
9
And, Changing Business Models
©2017 THINKstrategies, Inc. |
10
Finding New Ways to Serve Customers
What do they need? What do they prefer? How do they behave? When are they at risk? What will they want next? RECORD ANALYZE ©2017 THINKstrategies, Inc. |
11
– Bill Ruh, CEO GE Digital
Changing Industries “Any industrial business that does not become a software (digital) business will not be relevant.” – Bill Ruh, CEO GE Digital ©2017 THINKstrategies, Inc. |
12
Redefining Businesses
Comfort Services Managed Lighting Services Information Services ©2017 THINKstrategies, Inc. |
13
Privacy & Security Concerns
©2017 THINKstrategies, Inc. |
14
Privacy & Security Concerns
©2017 THINKstrategies, Inc. |
15
Privacy & Security Concerns
©2017 THINKstrategies, Inc. |
16
Keys to Simple Threat Management
Centralized Control Patch Management User Authentication ONGOING MONITORING SPECIALIZED SKILLS Intrusion Detection Anti-Virus/Malware Remote Device Management <WOC> Would suggest we add HYBRID to the Title “Six keys to Building Successful Public/Hybrid/Private Cloud Solutions” <WOC> Would also suggest adding Industry Standards to the categories in the slide, we should emphasize this to help avoid lock in. <WOC> Would change Scalability to Scalability (Extreme) ©2017 THINKstrategies, Inc. |
18
Security threats continue to evolve and risk management is time consuming for IT departments
Known malware instances in 2015 and the most common type of attack $73K Estimated cost of a network intrusion at an SMB1 57% Of businesses that have suffered from a malicious breach or attack Security threats continue to evolve – and get smarter – making risk management a consuming task for IT teams and MSPs. There were over 400 million known malware instances in 2015 and that number continues to rise. And those instances are not easy on the wallet – each malicious attack is estimated at $73 thousand dollars. That’s not to mention the cost of having your computers or your customers offline for an extended period of time. What’s even scarier is how commonplace breaches and attacks are – almost 60% of it teams have experienced a breach or attach at some point. 1- Kaspersky Sources:, Kaspersky1
19
Best-in-class security and control with LogMeIn Central
Easy, quick view into computer status from a single dashboard View, manage, and make changes to anti-virus software, powered by Kaspersky Lab Protect your business from increasingly sophisticated threats with Windows and application updates Setup alerts and monitoring so your end points are always protected, even if you’re not watching
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.