coffee talk: protect your business with managed endpoint security
DESCRIPTION
It can be a simple mistake. Someone clicked on a link to get some useful information that they were promised. The network is opened to vicious malware. And then the heartache begins. Data is corrupted. The network goes down. The company can’t send invoices or fulfil orders. Paralyzed, they make a panic stricken call to their MSP. They call you. What do you do? The best answer is to make sure you and your customers are never faced with this scenario by utilizing a managed security solution. Product Manager Bryan Zimmerman leads an informative and interactive 30-minute webinar that will highlights how using a managed endpoint solution can save you time and money and keep your customer’s data and networks safe and secure so you are never faced with this nightmare scenario. Topics covered include: Why anti-virus protection and security can be a challenge for MSPs The need for managed security Key requirements for an endpoint managed security solution How to sell a managed endpoint solution to your customersTRANSCRIPT
Coffee Talk: Protect Your Business with Managed Endpoint Security
© 2014 N-able Technologies, Inc. All rights reserved.
Presented by
© 2014 N-able Technologies, Inc. All rights reserved.
Bryan ZimmermanProduct Manager
Security Products
Webinar FAQ
© 2014 N-able Technologies, Inc. All rights reserved.
• Time expectations: 20 mins + Q&A• We’ll be covering questions at the end
• Ask questions as you think of them• This will be recorded and posted
within the next week
Phone: 1-888-200-4200Access Code: 14152951Local numbers for international locations at: http://bit.ly/1nJBKQw
Malware is Pervasive & Costly• Nearly one-third of all malware attacks
specifically target businesses with fewer than 250 employees.1
• Infection is easy and profitable – just a click can lead to a network-wide infection.
• The recently outbreak of Cryptolocker generated about $30M in just 100 days.2
• Reveton (or IcePol) is another example of ransomware.
• Crime pays, and the criminals will continue being creative.
1. http://www.biztechmagazine.com/article/2013/04/malware-attacks-targeting-small-businesses-rise-infographic
2. http://www.pcworld.com/article/2082204/crime-pays-very-well-cryptolocker-grosses-up-to-30-million-in-ransom.html
© 2014 N-able Technologies, Inc. All rights reserved.
Anti-Malware is Everywhere• Exploits are well publicized, and
most end customers have some sort of solution in place.
• Many are offered for free or at a very low cost.
• There are a lot of choices, but not all of them offer the same level of protection.
© 2014 N-able Technologies, Inc. All rights reserved.
Why AV is a Problem for MSPs• Disparate point solutions• Commoditization • Lack of integration
• Billing, reporting and management challenges • Multiple consoles and customer views
• Separate consoles for every customer with multiple log-ins and passwords – and no central reporting
• No standardization • Complexity and operational challenges
• Mobile devices pose a roaming threat
© 2014 N-able Technologies, Inc. All rights reserved.
True Managed Endpoint SecurityThe Features Customers Need• Anti-virus/spyware• Firewall • Intrusion prevention• Centrally managed quarantine • Real-time alerts• Web content filtering• Web access control• Application controlA world-class solution doesn’t just eliminate threats – it prevents malware from installing.
© 2014 N-able Technologies, Inc. All rights reserved.
Integration is KeyA true managed security solution is one that delivers industry-leading malware protection through a single, integrated management console.• Integrated into workflows – not a silo or add on
• Seamlessly integrated into alerts, reports, automations• Part of the comprehensive view• Devices not under management are visible
• Scalable and flexible• Manageable• Activities are documented for customers and the MSP
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security – The Impact• Infection is easy (click on an email), spreads quickly, and is
hard to eradicate. • The cost of downtime and/or reduced productivity. • The network is only as good as its weakest link – and a point,
commodity solution is often that weak link. • The key isn’t to get rid of malware, but to avoid it from the
start.
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security - Consultation• Are you using a standard anti-virus tool across your
organization?• Can your users/employees turn off their protection or
scheduled scans?• What type of AV data do you have? Is it installed on every
machine? Do you know when scans have run? Did they all run without incident?
• Have you had a recent infection? Are your systems clean now? All of them?
• Are you under any regulatory requirements? • What would be the consequences if sensitive data or
information were stolen from your network?
© 2014 N-able Technologies, Inc. All rights reserved.
Security Manager – AV Defender• Based on the #1 Anti-Virus engine, BitDefender® - #1
rating based on AV Comparatives Summary Report 2012.• Technology repeatedly wins industry awards. • World-class, enterprise-level end-point security.
© 2014 N-able Technologies, Inc. All rights reserved.
AV Defender – (Malware) Killer Features• Organizational and system-level Global Exclusions• Streamlined deployment with rules-controlled setup,
deployment, and migration • Automatic removal of most previous AV products• Increased visibility with comprehensive Security Events• Dashboard-style view of anti-malware activity• Robust reports to provide insight into the environment
© 2014 N-able Technologies, Inc. All rights reserved.
Demo
© 2014 N-able Technologies, Inc. All rights reserved.
Any Questions?
© 2014 N-able Technologies, Inc. All rights reserved.
Thank You for Attending
• Questions? [email protected]• Sign up for a free trial of N-central® and
Security Manager – AV Defender at N-able.com or [email protected].
• Visit our blog at blogs.n-able.com• After the webcast – these slides & the webcast
will be available on SlideShare® – www.slideshare.net/N-ableSlides
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
Legal Information
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.