coffee talk: protect your business with managed endpoint security
Post on 19-Dec-2014
5.414 Views
Preview:
DESCRIPTION
TRANSCRIPT
Coffee Talk: Protect Your Business with Managed Endpoint Security
© 2014 N-able Technologies, Inc. All rights reserved.
Presented by
© 2014 N-able Technologies, Inc. All rights reserved.
Bryan ZimmermanProduct Manager
Security Products
Webinar FAQ
© 2014 N-able Technologies, Inc. All rights reserved.
• Time expectations: 20 mins + Q&A• We’ll be covering questions at the end
• Ask questions as you think of them• This will be recorded and posted
within the next week
Phone: 1-888-200-4200Access Code: 14152951Local numbers for international locations at: http://bit.ly/1nJBKQw
Malware is Pervasive & Costly• Nearly one-third of all malware attacks
specifically target businesses with fewer than 250 employees.1
• Infection is easy and profitable – just a click can lead to a network-wide infection.
• The recently outbreak of Cryptolocker generated about $30M in just 100 days.2
• Reveton (or IcePol) is another example of ransomware.
• Crime pays, and the criminals will continue being creative.
1. http://www.biztechmagazine.com/article/2013/04/malware-attacks-targeting-small-businesses-rise-infographic
2. http://www.pcworld.com/article/2082204/crime-pays-very-well-cryptolocker-grosses-up-to-30-million-in-ransom.html
© 2014 N-able Technologies, Inc. All rights reserved.
Anti-Malware is Everywhere• Exploits are well publicized, and
most end customers have some sort of solution in place.
• Many are offered for free or at a very low cost.
• There are a lot of choices, but not all of them offer the same level of protection.
© 2014 N-able Technologies, Inc. All rights reserved.
Why AV is a Problem for MSPs• Disparate point solutions• Commoditization • Lack of integration
• Billing, reporting and management challenges • Multiple consoles and customer views
• Separate consoles for every customer with multiple log-ins and passwords – and no central reporting
• No standardization • Complexity and operational challenges
• Mobile devices pose a roaming threat
© 2014 N-able Technologies, Inc. All rights reserved.
True Managed Endpoint SecurityThe Features Customers Need• Anti-virus/spyware• Firewall • Intrusion prevention• Centrally managed quarantine • Real-time alerts• Web content filtering• Web access control• Application controlA world-class solution doesn’t just eliminate threats – it prevents malware from installing.
© 2014 N-able Technologies, Inc. All rights reserved.
Integration is KeyA true managed security solution is one that delivers industry-leading malware protection through a single, integrated management console.• Integrated into workflows – not a silo or add on
• Seamlessly integrated into alerts, reports, automations• Part of the comprehensive view• Devices not under management are visible
• Scalable and flexible• Manageable• Activities are documented for customers and the MSP
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security – The Impact• Infection is easy (click on an email), spreads quickly, and is
hard to eradicate. • The cost of downtime and/or reduced productivity. • The network is only as good as its weakest link – and a point,
commodity solution is often that weak link. • The key isn’t to get rid of malware, but to avoid it from the
start.
© 2014 N-able Technologies, Inc. All rights reserved.
Selling Security - Consultation• Are you using a standard anti-virus tool across your
organization?• Can your users/employees turn off their protection or
scheduled scans?• What type of AV data do you have? Is it installed on every
machine? Do you know when scans have run? Did they all run without incident?
• Have you had a recent infection? Are your systems clean now? All of them?
• Are you under any regulatory requirements? • What would be the consequences if sensitive data or
information were stolen from your network?
© 2014 N-able Technologies, Inc. All rights reserved.
Security Manager – AV Defender• Based on the #1 Anti-Virus engine, BitDefender® - #1
rating based on AV Comparatives Summary Report 2012.• Technology repeatedly wins industry awards. • World-class, enterprise-level end-point security.
© 2014 N-able Technologies, Inc. All rights reserved.
AV Defender – (Malware) Killer Features• Organizational and system-level Global Exclusions• Streamlined deployment with rules-controlled setup,
deployment, and migration • Automatic removal of most previous AV products• Increased visibility with comprehensive Security Events• Dashboard-style view of anti-malware activity• Robust reports to provide insight into the environment
© 2014 N-able Technologies, Inc. All rights reserved.
Demo
© 2014 N-able Technologies, Inc. All rights reserved.
Any Questions?
© 2014 N-able Technologies, Inc. All rights reserved.
Thank You for Attending
• Questions? sales@n-able.com• Sign up for a free trial of N-central® and
Security Manager – AV Defender at N-able.com or sales@n-able.com.
• Visit our blog at blogs.n-able.com• After the webcast – these slides & the webcast
will be available on SlideShare® – www.slideshare.net/N-ableSlides
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
Legal Information
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.
© 2014 N-able Technologies, Inc. All rights reserved.© 2014 N-able Technologies, Inc. All rights reserved.
top related