Coffee Talk: Protect Your Business with Managed Endpoint Security

16
Coffee Talk: Protect Your Business with Managed Endpoint Security © 2014 N-able Technologies, Inc. All rights reserved.

description

It can be a simple mistake. Someone clicked on a link to get some useful information that they were promised. The network is opened to vicious malware. And then the heartache begins. Data is corrupted. The network goes down. The company can’t send invoices or fulfil orders. Paralyzed, they make a panic stricken call to their MSP. They call you. What do you do? The best answer is to make sure you and your customers are never faced with this scenario by utilizing a managed security solution. Product Manager Bryan Zimmerman leads an informative and interactive 30-minute webinar that will highlights how using a managed endpoint solution can save you time and money and keep your customer’s data and networks safe and secure so you are never faced with this nightmare scenario. Topics covered include: Why anti-virus protection and security can be a challenge for MSPs The need for managed security Key requirements for an endpoint managed security solution How to sell a managed endpoint solution to your customers

Transcript of Coffee Talk: Protect Your Business with Managed Endpoint Security

Page 1: Coffee Talk: Protect Your Business with Managed Endpoint Security

Coffee Talk: Protect Your Business with Managed Endpoint Security

© 2014 N-able Technologies, Inc. All rights reserved.

Page 2: Coffee Talk: Protect Your Business with Managed Endpoint Security

Presented by

© 2014 N-able Technologies, Inc. All rights reserved.

Bryan ZimmermanProduct Manager

Security Products

Page 3: Coffee Talk: Protect Your Business with Managed Endpoint Security

Webinar FAQ

© 2014 N-able Technologies, Inc. All rights reserved.

• Time expectations: 20 mins + Q&A• We’ll be covering questions at the end

• Ask questions as you think of them• This will be recorded and posted

within the next week

Phone: 1-888-200-4200Access Code: 14152951Local numbers for international locations at: http://bit.ly/1nJBKQw

Page 4: Coffee Talk: Protect Your Business with Managed Endpoint Security

Malware is Pervasive & Costly• Nearly one-third of all malware attacks

specifically target businesses with fewer than 250 employees.1

• Infection is easy and profitable – just a click can lead to a network-wide infection.

• The recently outbreak of Cryptolocker generated about $30M in just 100 days.2

• Reveton (or IcePol) is another example of ransomware.

• Crime pays, and the criminals will continue being creative.

1. http://www.biztechmagazine.com/article/2013/04/malware-attacks-targeting-small-businesses-rise-infographic

2. http://www.pcworld.com/article/2082204/crime-pays-very-well-cryptolocker-grosses-up-to-30-million-in-ransom.html

© 2014 N-able Technologies, Inc. All rights reserved.

Page 5: Coffee Talk: Protect Your Business with Managed Endpoint Security

Anti-Malware is Everywhere• Exploits are well publicized, and

most end customers have some sort of solution in place.

• Many are offered for free or at a very low cost.

• There are a lot of choices, but not all of them offer the same level of protection.

© 2014 N-able Technologies, Inc. All rights reserved.

Page 6: Coffee Talk: Protect Your Business with Managed Endpoint Security

Why AV is a Problem for MSPs• Disparate point solutions• Commoditization • Lack of integration

• Billing, reporting and management challenges • Multiple consoles and customer views

• Separate consoles for every customer with multiple log-ins and passwords – and no central reporting

• No standardization • Complexity and operational challenges

• Mobile devices pose a roaming threat

© 2014 N-able Technologies, Inc. All rights reserved.

Page 7: Coffee Talk: Protect Your Business with Managed Endpoint Security

True Managed Endpoint SecurityThe Features Customers Need• Anti-virus/spyware• Firewall • Intrusion prevention• Centrally managed quarantine • Real-time alerts• Web content filtering• Web access control• Application controlA world-class solution doesn’t just eliminate threats – it prevents malware from installing.

© 2014 N-able Technologies, Inc. All rights reserved.

Page 8: Coffee Talk: Protect Your Business with Managed Endpoint Security

Integration is KeyA true managed security solution is one that delivers industry-leading malware protection through a single, integrated management console.• Integrated into workflows – not a silo or add on

• Seamlessly integrated into alerts, reports, automations• Part of the comprehensive view• Devices not under management are visible

• Scalable and flexible• Manageable• Activities are documented for customers and the MSP

© 2014 N-able Technologies, Inc. All rights reserved.

Page 9: Coffee Talk: Protect Your Business with Managed Endpoint Security

Selling Security – The Impact• Infection is easy (click on an email), spreads quickly, and is

hard to eradicate. • The cost of downtime and/or reduced productivity. • The network is only as good as its weakest link – and a point,

commodity solution is often that weak link. • The key isn’t to get rid of malware, but to avoid it from the

start.

© 2014 N-able Technologies, Inc. All rights reserved.

Page 10: Coffee Talk: Protect Your Business with Managed Endpoint Security

Selling Security - Consultation• Are you using a standard anti-virus tool across your

organization?• Can your users/employees turn off their protection or

scheduled scans?• What type of AV data do you have? Is it installed on every

machine? Do you know when scans have run? Did they all run without incident?

• Have you had a recent infection? Are your systems clean now? All of them?

• Are you under any regulatory requirements? • What would be the consequences if sensitive data or

information were stolen from your network?

© 2014 N-able Technologies, Inc. All rights reserved.

Page 11: Coffee Talk: Protect Your Business with Managed Endpoint Security

Security Manager – AV Defender• Based on the #1 Anti-Virus engine, BitDefender® - #1

rating based on AV Comparatives Summary Report 2012.• Technology repeatedly wins industry awards. • World-class, enterprise-level end-point security.

© 2014 N-able Technologies, Inc. All rights reserved.

Page 12: Coffee Talk: Protect Your Business with Managed Endpoint Security

AV Defender – (Malware) Killer Features• Organizational and system-level Global Exclusions• Streamlined deployment with rules-controlled setup,

deployment, and migration • Automatic removal of most previous AV products• Increased visibility with comprehensive Security Events• Dashboard-style view of anti-malware activity• Robust reports to provide insight into the environment

© 2014 N-able Technologies, Inc. All rights reserved.

Page 13: Coffee Talk: Protect Your Business with Managed Endpoint Security

Demo

© 2014 N-able Technologies, Inc. All rights reserved.

Page 14: Coffee Talk: Protect Your Business with Managed Endpoint Security

Any Questions?

© 2014 N-able Technologies, Inc. All rights reserved.

Page 15: Coffee Talk: Protect Your Business with Managed Endpoint Security

Thank You for Attending

• Questions? [email protected]• Sign up for a free trial of N-central® and

Security Manager – AV Defender at N-able.com or [email protected].

• Visit our blog at blogs.n-able.com• After the webcast – these slides & the webcast

will be available on SlideShare® – www.slideshare.net/N-ableSlides

© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.

Page 16: Coffee Talk: Protect Your Business with Managed Endpoint Security

Legal Information

The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.

© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.