SlideShare a Scribd company logo
1 of 44
Download to read offline
UMBRELLA FOR 1_Title (1)
MSPS:
Leveraging Cloud Security
to be the Virtual CIO

Umbrella Confidential
WEBINAR AGENDA

!   UMBRELLA FOR MSPs INTRO
!   LEVERAGING CLOUD SECURITY
WITH JIM LANCASTER

!   REPORTING VALUE TO CUSTOMERS
!   VCIO: EXPOSING KEY TRENDS

YOUR PRESENTER:
DIMA KUMETS
PRODUCT MANAGER

!   PREVIEW: REPORTING ONLY ROLE
!   Q&A
GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS

#2 #2Ÿ

4-Dec-13 Ÿ Umbrella Confidential
COMPANY BACKGROUND

GLOBAL SECURITY
NETWORK
208.67.220.220

!   50M+ ACTIVE USERS DAILY
!   19 DATA CENTER LOCATIONS
1_Light Title
Only
!   ZERO DOWNTIME, SINCE 2006

208.67.222.222

!   50B+ REQUESTS DAILY
!   160+ COUNTRIES W/USERS
!   ZERO NET NEW LATENCY

EUROPE, MIDDLE
EAST & AFRICA

AMERICAS
#3 #3Ÿ

4-Dec-13 Ÿ Umbrella Confidential

ASIA-PACIFIC
CLOUD SECURITY SERVICE
1_Light Title
Only
With Reporting Integration into

#4 #4Ÿ

4-Dec-13 Ÿ Umbrella Confidential
INFECTED DEVICES IMPACT MSP MARGINS

MALWARE COSTS

YOUR
ENGINEER’S
TIME
#5 #5Ÿ

4-Dec-13 Ÿ Umbrella Confidential

CLIENTS’
EMPLOYEE
DOWNTIME
DECREASE MALWARE CLEAN UP EXPENSES

WEB

(PORTS ???)

ANY
PORT

WEB &
ANY
1_Light Title
PROTOCOL
NON-WEB

Only

WEB

ç THE INTERNET

ANY
APP

PREVENTS
MALWARE

CONTAINS
BOTNETS

BLOCKS

PHISHING ATTEMPTS &
INAPPROPRIATE USAGE

YOUR CUSTOMERSè
CLOUD SERVICE
WITH ZERO ADDED LATENCY

#6 #6Ÿ

4-Dec-13 Ÿ Umbrella Confidential
#7 #7Ÿ

4-Dec-13 Ÿ Umbrella Confidential
LEVERAGING
CLOUD SECURITY
#8 #8Ÿ

4-Dec-13 Ÿ Umbrella Confidential
JIM LANCASTER, CTO, SAGISS

•  Background
•  Managed Service Provider/monthly model
•  Over 20 years in business
•  Serving Dallas and surrounding areas

•  Jim Lancaster
•  Founder and CTO

#9 #9Ÿ

4-Dec-13 Ÿ Umbrella Confidential

GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS
JIM LANCASTER, CTO, SAGISS

•  Role of security in Managed Service
•  Key to growth: Standardizing
•  Sagiss’ Security Stack
•  Criteria for adding a product
•  Impact of OpenDNS on business

#10 Ÿ
#10

4-Dec-13 Ÿ Umbrella Confidential

GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#11 Ÿ
#11

4-Dec-13 Ÿ Umbrella Confidential
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#12 Ÿ
#12

4-Dec-13 Ÿ Umbrella Confidential
SECURITY STRATEGY TO STAY AHEAD

OF RAPID CHANGE

#13
Changing workplace

WORK USED TO BE A PLACE YOU GO

1_Light Title
Only

#14 Ÿ
#14

4-Dec-13 Ÿ Umbrella Confidential
NETWORK PERIMITER HAS CHANGED

SECURITY WAS BUILDING A BETTER MOAT
AROUND YOUR CASTLE

1_Light Title
Only

#15 Ÿ
#15

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

WORK IS NO LONGER A PLACE YOU GO,
WORK IS A THING YOU DO

1_Light Title
Only

#16 Ÿ
#16

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

WORK ANYWHERE

1_Light Title
Only

#17 Ÿ
#17

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

INTERNET EVERYWHERE

1_Light Title
Only

#18 Ÿ
#18

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

APPLIANCE AND UTM SECURITY DOESN’T PROTECT
OUTSIDE THE NETWORK PERIMITER

1_Light Title
Only

#19 Ÿ
#19

4-Dec-13 Ÿ Umbrella Confidential
SECURE EVERYWHERE

UMBRELLA ENABLES MSPs TO
!   PROTECT WORKERS ON AND OFF THE NETWORK
!   COVERAGE FOR BYOD AND UNMANAGED DEVICES

#20 Ÿ
#20

4-Dec-13 Ÿ Umbrella Confidential
SIMPLE DEPLOYMENT

NETWORK-LEVEL
PROVISIONING

LIGHTWEIGHT AGENT
PROTECTS EVERYWHERE

(ALL DEVICES ON NETWORK
INCLUDING BYOD AND UNMANAGED)

(EASY SCRIPTED DEPLOYMENT VIA RMM)

CLIENT-A:155.21.1.1/28
CLIENT-B: 214.41.3.1/32
CLIENT-C: 23.4.2.4/32

155.21.1.1/28
#21 Ÿ
#21

214.41.3.1/32

4-Dec-13 Ÿ Umbrella Confidential

23.4.2.4/32
IMPROVE RENEWALS AND RETENTION

IMPROVED UPTIME
!   FULL ON AND OFF NETWORK PROTECTION
!   PREDICTIVE PREVENTION AND CONTAINMENT
!   FEWER INFECTIONS = ALWAYS ON TECHNOLOGY
1_Light Title
have malware
Only

“I don’t
problems.
What am I paying for?”

#22 Ÿ
#22

4-Dec-13 Ÿ Umbrella Confidential
IMPROVING
RETENTION

#23 Ÿ
#23

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

VALUE REPORTS – OPENDNS DASHBOARD

1_Light Title
Only

• 
• 
• 
• 
• 
#24 Ÿ
#24

Custom date ranges
Customer-wide or filter by identity
Drill-down to see date-time activity
Download as CSV
Multi-tenant: Share access with customer

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

1_Light Title
Only

#25 Ÿ
#25

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

Exposing data within MSP Organization
• 
• 
• 

Everyone should be able to express value to customers
Service desk must be able to see efficacy
Data must be easy to access

Challenge:
•  Sales and Management
•  Don’t usually access outside systems
•  Need this data the most

#26 Ÿ
#26

4-Dec-13 Ÿ Umbrella Confidential
EXPOSING WITHIN MSP ORGANIZATION

Solution: Push data to ConnectWise
• 
• 
• 
• 

#27 Ÿ
#27

Custom Configuration Type
Automatically updated nightly
Allows anyone to show proactive protection
Roadmap: Botnet activity ticketing

4-Dec-13 Ÿ Umbrella Confidential
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#28 Ÿ
#28

4-Dec-13 Ÿ Umbrella Confidential
EASY ACCESS TO NETWORK USAGE

Network usage
•  Overview within ConnectWise
•  Detailed log in Umbrella Dashboard

#29 Ÿ
#29

4-Dec-13 Ÿ Umbrella Confidential
EASY ACCESS TO NETWORK USAGE

Network usage insights
Adobe Creative Cloud
Managed licensing?
Hardware upgrade?

Blocking Facebook so
employees are going to
twitter.

#30 Ÿ
#30

4-Dec-13 Ÿ Umbrella Confidential

Video Streaming
Increase bandwidth?
Upgrade to 802.11ac?
Filter?
UPSELL

#31 Ÿ
#31

4-Dec-13 Ÿ Umbrella Confidential
PROFITABLE WEB FILTER

WEB FILTER AS A VALUE ADDED SERVICE
!   60 CATEGORIES
!   GRANULAR WHITELIST/BLACKLIST
!   CUSTOM BLOCK PAGE

FEATURES TO CHARGE A PREMIUM PRICE
!   PER-COMPUTER POLICY
!   BYOD AND GUEST FILTERING
!   BLOCK PAGE BYPASS CODES

REPORTING AND MONITORING
!   REAL-TIME ACTIVITY REPORT
!   TOP DOMAINS/TOP CATEGORIES/TOP USERS
!   SAVED REPORTS WITH EXPORT
#32 Ÿ
#32

4-Dec-13 Ÿ Umbrella Confidential
CHALLENGES WITH WEB FILTERING

CHALLENGE: MOBILE
!   4G/LTE CONNECTIVITY ON EMPLOYEE OWNED DEVICES
!   EMPLOYEES AVOID CONNECTING TO FILTERED NETWORK

CHALLENGE: ARMS RACE
!   RESTRICTIVE POLICIES CHALLENGE TO PROBLEM EMPLOYEES
!   MAKES CIRCUMVENTING POLICIES A GAME

SOLUTION: WEB MONITORING AS A SERVICE
!   REAL-TIME ACTIVITY REPORT
!   ENABLE MANAGEMENT TO ENGAGE WITH EMPLOYEES

#33 Ÿ
#33

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

WEB MONITORING AS A SERVICE
!   TRUST BUT VERIFY
!   BLOCK CORE OFFENDING CONTENT (PORNOGRAPHY, P2P)
!   USE REAL-TIME ACTIVITY LOG TO SPOT OFFENDERS

!   EMPOWER THE CUSTOMER
!
!
!
!
!

#34 Ÿ
#34

  CATCH OFFENDERS IN THE ACT
  ENABLE BETTER MANAGEMENT
  CHANGE BEHAVIORS INSTEAD OF TECHNOLOGIES
  ENGAGE WITH THE CUSTOMER ON PROBLEM AREAS
  LIVE DEMO WITH CUSTOMERS

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

WEB MONITORING AS A SERVICE
!  TRUST BUT VERIFY

#35 Ÿ
#35

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

MSP View: Multi-tenant

#36 Ÿ
#36

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

MSP View: Multi-tenant

#37 Ÿ
#37

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

Customer View: Isolated

#38 Ÿ
#38

4-Dec-13 Ÿ Umbrella Confidential
PREVIEW:
REPORTING-ONLY
LIMITED CUSTOMER ROLE

#39
WEB MONITORING AS A SERVICE

BETA: REPORTING ONLY
ROADMAP: CO-BRAND
Full Admin

Reporting only

#40 Ÿ
#40

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

BETA: REPORTING ONLY

#41 Ÿ
#41

4-Dec-13 Ÿ Umbrella Confidential
#42 Ÿ
#42

4-Dec-13 Ÿ Umbrella Confidential
BUSINESS ALIGNED WITH MSPs
!   MONTHLY BILLING
!   AGGREGATE VOLUME PRICING
!   MANAGE SEATS ON-DEMAND
!   COMMITMENT TO PARTNER SUCCESS

#43 Ÿ
#43

4-Dec-13 Ÿ Umbrella Confidential
THANK YOU! ANY QUESTIONS?...

EMAIL QUESTIONS TO:
SALES@OPENDNS.COM

OR JUST TWEET
@GETUMBRELLA

#44 Ÿ
#44

4-Dec-13 Ÿ Umbrella Confidential

More Related Content

Similar to MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...SORACOM,INC
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsAngelo Agatino Nicolosi
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services RightScale
 
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...CA Technologies
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentOpenDNS
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the CloudNicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the CloudNicus Software
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...Jisc
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Umbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-ableUmbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-ableOpenDNS
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackLaurenWendler
 

Similar to MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO (20)

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial Institutions
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services
 
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Cogeco Peer1
Cogeco Peer1Cogeco Peer1
Cogeco Peer1
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the CloudNicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Umbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-ableUmbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-able
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 

More from OpenDNS

New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsOpenDNS
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationOpenDNS
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain OpenDNS
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...OpenDNS
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGPOpenDNS
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOpenDNS
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramOpenDNS
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...OpenDNS
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsOpenDNS
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNSOpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and DockerOpenDNS
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonOpenDNS
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudOpenDNS
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...OpenDNS
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...OpenDNS
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationOpenDNS
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker WebcastOpenDNS
 

More from OpenDNS (20)

New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGP
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and Docker
 
Defcon
DefconDefcon
Defcon
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker Webcast
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO

  • 1. UMBRELLA FOR 1_Title (1) MSPS: Leveraging Cloud Security to be the Virtual CIO Umbrella Confidential
  • 2. WEBINAR AGENDA !   UMBRELLA FOR MSPs INTRO !   LEVERAGING CLOUD SECURITY WITH JIM LANCASTER !   REPORTING VALUE TO CUSTOMERS !   VCIO: EXPOSING KEY TRENDS YOUR PRESENTER: DIMA KUMETS PRODUCT MANAGER !   PREVIEW: REPORTING ONLY ROLE !   Q&A GUEST PRESENTER: JIM LANCASTER CTO, SAGISS #2 #2Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 3. COMPANY BACKGROUND GLOBAL SECURITY NETWORK 208.67.220.220 !   50M+ ACTIVE USERS DAILY !   19 DATA CENTER LOCATIONS 1_Light Title Only !   ZERO DOWNTIME, SINCE 2006 208.67.222.222 !   50B+ REQUESTS DAILY !   160+ COUNTRIES W/USERS !   ZERO NET NEW LATENCY EUROPE, MIDDLE EAST & AFRICA AMERICAS #3 #3Ÿ 4-Dec-13 Ÿ Umbrella Confidential ASIA-PACIFIC
  • 4. CLOUD SECURITY SERVICE 1_Light Title Only With Reporting Integration into #4 #4Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 5. INFECTED DEVICES IMPACT MSP MARGINS MALWARE COSTS YOUR ENGINEER’S TIME #5 #5Ÿ 4-Dec-13 Ÿ Umbrella Confidential CLIENTS’ EMPLOYEE DOWNTIME
  • 6. DECREASE MALWARE CLEAN UP EXPENSES WEB (PORTS ???) ANY PORT WEB & ANY 1_Light Title PROTOCOL NON-WEB Only WEB ç THE INTERNET ANY APP PREVENTS MALWARE CONTAINS BOTNETS BLOCKS PHISHING ATTEMPTS & INAPPROPRIATE USAGE YOUR CUSTOMERSè CLOUD SERVICE WITH ZERO ADDED LATENCY #6 #6Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 7. #7 #7Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 8. LEVERAGING CLOUD SECURITY #8 #8Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 9. JIM LANCASTER, CTO, SAGISS •  Background •  Managed Service Provider/monthly model •  Over 20 years in business •  Serving Dallas and surrounding areas •  Jim Lancaster •  Founder and CTO #9 #9Ÿ 4-Dec-13 Ÿ Umbrella Confidential GUEST PRESENTER: JIM LANCASTER CTO, SAGISS
  • 10. JIM LANCASTER, CTO, SAGISS •  Role of security in Managed Service •  Key to growth: Standardizing •  Sagiss’ Security Stack •  Criteria for adding a product •  Impact of OpenDNS on business #10 Ÿ #10 4-Dec-13 Ÿ Umbrella Confidential GUEST PRESENTER: JIM LANCASTER CTO, SAGISS
  • 11. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #11 Ÿ #11 4-Dec-13 Ÿ Umbrella Confidential
  • 12. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #12 Ÿ #12 4-Dec-13 Ÿ Umbrella Confidential
  • 13. SECURITY STRATEGY TO STAY AHEAD OF RAPID CHANGE #13
  • 14. Changing workplace WORK USED TO BE A PLACE YOU GO 1_Light Title Only #14 Ÿ #14 4-Dec-13 Ÿ Umbrella Confidential
  • 15. NETWORK PERIMITER HAS CHANGED SECURITY WAS BUILDING A BETTER MOAT AROUND YOUR CASTLE 1_Light Title Only #15 Ÿ #15 4-Dec-13 Ÿ Umbrella Confidential
  • 16. CHANGING WORKPLACE WORK IS NO LONGER A PLACE YOU GO, WORK IS A THING YOU DO 1_Light Title Only #16 Ÿ #16 4-Dec-13 Ÿ Umbrella Confidential
  • 17. CHANGING WORKPLACE WORK ANYWHERE 1_Light Title Only #17 Ÿ #17 4-Dec-13 Ÿ Umbrella Confidential
  • 18. CHANGING WORKPLACE INTERNET EVERYWHERE 1_Light Title Only #18 Ÿ #18 4-Dec-13 Ÿ Umbrella Confidential
  • 19. CHANGING WORKPLACE APPLIANCE AND UTM SECURITY DOESN’T PROTECT OUTSIDE THE NETWORK PERIMITER 1_Light Title Only #19 Ÿ #19 4-Dec-13 Ÿ Umbrella Confidential
  • 20. SECURE EVERYWHERE UMBRELLA ENABLES MSPs TO !   PROTECT WORKERS ON AND OFF THE NETWORK !   COVERAGE FOR BYOD AND UNMANAGED DEVICES #20 Ÿ #20 4-Dec-13 Ÿ Umbrella Confidential
  • 21. SIMPLE DEPLOYMENT NETWORK-LEVEL PROVISIONING LIGHTWEIGHT AGENT PROTECTS EVERYWHERE (ALL DEVICES ON NETWORK INCLUDING BYOD AND UNMANAGED) (EASY SCRIPTED DEPLOYMENT VIA RMM) CLIENT-A:155.21.1.1/28 CLIENT-B: 214.41.3.1/32 CLIENT-C: 23.4.2.4/32 155.21.1.1/28 #21 Ÿ #21 214.41.3.1/32 4-Dec-13 Ÿ Umbrella Confidential 23.4.2.4/32
  • 22. IMPROVE RENEWALS AND RETENTION IMPROVED UPTIME !   FULL ON AND OFF NETWORK PROTECTION !   PREDICTIVE PREVENTION AND CONTAINMENT !   FEWER INFECTIONS = ALWAYS ON TECHNOLOGY 1_Light Title have malware Only “I don’t problems. What am I paying for?” #22 Ÿ #22 4-Dec-13 Ÿ Umbrella Confidential
  • 24. SHOW EFFICACY VALUE REPORTS – OPENDNS DASHBOARD 1_Light Title Only •  •  •  •  •  #24 Ÿ #24 Custom date ranges Customer-wide or filter by identity Drill-down to see date-time activity Download as CSV Multi-tenant: Share access with customer 4-Dec-13 Ÿ Umbrella Confidential
  • 25. SHOW EFFICACY 1_Light Title Only #25 Ÿ #25 4-Dec-13 Ÿ Umbrella Confidential
  • 26. SHOW EFFICACY Exposing data within MSP Organization •  •  •  Everyone should be able to express value to customers Service desk must be able to see efficacy Data must be easy to access Challenge: •  Sales and Management •  Don’t usually access outside systems •  Need this data the most #26 Ÿ #26 4-Dec-13 Ÿ Umbrella Confidential
  • 27. EXPOSING WITHIN MSP ORGANIZATION Solution: Push data to ConnectWise •  •  •  •  #27 Ÿ #27 Custom Configuration Type Automatically updated nightly Allows anyone to show proactive protection Roadmap: Botnet activity ticketing 4-Dec-13 Ÿ Umbrella Confidential
  • 28. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #28 Ÿ #28 4-Dec-13 Ÿ Umbrella Confidential
  • 29. EASY ACCESS TO NETWORK USAGE Network usage •  Overview within ConnectWise •  Detailed log in Umbrella Dashboard #29 Ÿ #29 4-Dec-13 Ÿ Umbrella Confidential
  • 30. EASY ACCESS TO NETWORK USAGE Network usage insights Adobe Creative Cloud Managed licensing? Hardware upgrade? Blocking Facebook so employees are going to twitter. #30 Ÿ #30 4-Dec-13 Ÿ Umbrella Confidential Video Streaming Increase bandwidth? Upgrade to 802.11ac? Filter?
  • 31. UPSELL #31 Ÿ #31 4-Dec-13 Ÿ Umbrella Confidential
  • 32. PROFITABLE WEB FILTER WEB FILTER AS A VALUE ADDED SERVICE !   60 CATEGORIES !   GRANULAR WHITELIST/BLACKLIST !   CUSTOM BLOCK PAGE FEATURES TO CHARGE A PREMIUM PRICE !   PER-COMPUTER POLICY !   BYOD AND GUEST FILTERING !   BLOCK PAGE BYPASS CODES REPORTING AND MONITORING !   REAL-TIME ACTIVITY REPORT !   TOP DOMAINS/TOP CATEGORIES/TOP USERS !   SAVED REPORTS WITH EXPORT #32 Ÿ #32 4-Dec-13 Ÿ Umbrella Confidential
  • 33. CHALLENGES WITH WEB FILTERING CHALLENGE: MOBILE !   4G/LTE CONNECTIVITY ON EMPLOYEE OWNED DEVICES !   EMPLOYEES AVOID CONNECTING TO FILTERED NETWORK CHALLENGE: ARMS RACE !   RESTRICTIVE POLICIES CHALLENGE TO PROBLEM EMPLOYEES !   MAKES CIRCUMVENTING POLICIES A GAME SOLUTION: WEB MONITORING AS A SERVICE !   REAL-TIME ACTIVITY REPORT !   ENABLE MANAGEMENT TO ENGAGE WITH EMPLOYEES #33 Ÿ #33 4-Dec-13 Ÿ Umbrella Confidential
  • 34. WEB MONITORING AS A SERVICE WEB MONITORING AS A SERVICE !   TRUST BUT VERIFY !   BLOCK CORE OFFENDING CONTENT (PORNOGRAPHY, P2P) !   USE REAL-TIME ACTIVITY LOG TO SPOT OFFENDERS !   EMPOWER THE CUSTOMER ! ! ! ! ! #34 Ÿ #34   CATCH OFFENDERS IN THE ACT   ENABLE BETTER MANAGEMENT   CHANGE BEHAVIORS INSTEAD OF TECHNOLOGIES   ENGAGE WITH THE CUSTOMER ON PROBLEM AREAS   LIVE DEMO WITH CUSTOMERS 4-Dec-13 Ÿ Umbrella Confidential
  • 35. WEB MONITORING AS A SERVICE WEB MONITORING AS A SERVICE !  TRUST BUT VERIFY #35 Ÿ #35 4-Dec-13 Ÿ Umbrella Confidential
  • 36. WEB MONITORING AS A SERVICE MSP View: Multi-tenant #36 Ÿ #36 4-Dec-13 Ÿ Umbrella Confidential
  • 37. WEB MONITORING AS A SERVICE MSP View: Multi-tenant #37 Ÿ #37 4-Dec-13 Ÿ Umbrella Confidential
  • 38. WEB MONITORING AS A SERVICE Customer View: Isolated #38 Ÿ #38 4-Dec-13 Ÿ Umbrella Confidential
  • 40. WEB MONITORING AS A SERVICE BETA: REPORTING ONLY ROADMAP: CO-BRAND Full Admin Reporting only #40 Ÿ #40 4-Dec-13 Ÿ Umbrella Confidential
  • 41. WEB MONITORING AS A SERVICE BETA: REPORTING ONLY #41 Ÿ #41 4-Dec-13 Ÿ Umbrella Confidential
  • 42. #42 Ÿ #42 4-Dec-13 Ÿ Umbrella Confidential
  • 43. BUSINESS ALIGNED WITH MSPs !   MONTHLY BILLING !   AGGREGATE VOLUME PRICING !   MANAGE SEATS ON-DEMAND !   COMMITMENT TO PARTNER SUCCESS #43 Ÿ #43 4-Dec-13 Ÿ Umbrella Confidential
  • 44. THANK YOU! ANY QUESTIONS?... EMAIL QUESTIONS TO: SALES@OPENDNS.COM OR JUST TWEET @GETUMBRELLA #44 Ÿ #44 4-Dec-13 Ÿ Umbrella Confidential