SlideShare a Scribd company logo
1 of 40
Download to read offline
1_Title (1)

UMBRELLA FOR MSPs:
Cloud Security
via N-Able

Dima Kumets
MSP Product Manager
Umbrella Confidential
COMPANY BACKGROUND

GLOBAL SECURITY
NETWORK
208.67.220.220

!   50M+ ACTIVE USERS DAILY
!   19 DATA CENTER LOCATIONS
1_Light Title
Only
!   ZERO DOWNTIME, SINCE 2006

208.67.222.222

!   50B+ REQUESTS DAILY
!   160+ COUNTRIES W/USERS
!   ZERO NET NEW LATENCY

EUROPE, MIDDLE
EAST & AFRICA

AMERICAS
#2 #2!

29-Oct-13 ! Umbrella Confidential

ASIA-PACIFIC
CLOUD SECURITY SERVICE
1_Light Title
Only
PARTNERING WITH

TO MAKE DEPLOYMENT FAST AND SEAMLESS
#3 #3!

29-Oct-13 ! Umbrella Confidential
CHANGING THREAT LANDSCAPE

VELOCITY & PACE

#4
TODAY

MALWARE HAS EXPLODED
!   PROFIT MOTIVE + LIQUIDITY

CYBERCRIME AS A SERVICE
!   DISTRIBUTED CRIMINAL ORGANIZATIONS
!   SPECIALIZED TALENT
!   MORE EFFICIENT + MORE DANGEROUS

#5 #5!

29-Oct-13 ! Umbrella Confidential
DISTRIBUTION VECTORS

#6 #6!

29-Oct-13 ! Umbrella Confidential
DIY EXPLOIT KITS

DO-IT-YOURSELF EXPLOIT KITS
!   PRE-PACKAGED SCRIPTS
!   NO “HACKER” SKILLS NECESSARY
!   USES MANY ATTACK VECTORS TO INSTALL
MALWARE
!   EMBED ON A WEBSITE – EASY TO USE

!   RESULT
!   EXPANDS CYBERCRIME TO TRADITIONAL
CRIMINAL ORGANIZATIONS
!   BIGGER PROFIT FOR BLACK-HAT HACKERS

!  $200-$20,000
#7 #7!

29-Oct-13 ! Umbrella Confidential
DIY EXPLOIT KIT

1_Light Title
Only

#8 #8!

29-Oct-13 ! Umbrella Confidential
DIY EXPLOIT KIT

1_Light Title
Only

#9 #9!

29-Oct-13 ! Umbrella Confidential
EXPLOIT KIT REPORTING!

1_Light Title
Only

#10 !
#10

29-Oct-13 ! Umbrella Confidential
DISTRIBUTION VECTORS

!  ACTIVE/WIDE NET
!  MALVERTISING
!  SPAM

!  TARGETED
!  SPEARPHISHING
!  WATERING HOLE ATTACKS

!  EMERGING
!  MOBILE THREATS
! SMiShing (SMS PHISHING)

#11 !
#11

29-Oct-13 ! Umbrella Confidential
MALWARE PAYLOAD

#12 !
#12

29-Oct-13 ! Umbrella Confidential
UNWITTING PARTICIPATION IN EXTORTION

DDOS BOTS

#13 !
#13

29-Oct-13 ! Umbrella Confidential
MALWARE RUINS EMAIL REPUATION

SPAMBOTS

#14 !
#14

29-Oct-13 ! Umbrella Confidential
MALWARE SEIZES COMPUTERS

FAKE ANTI-VIRUS

#15 !
#15

29-Oct-13 ! Umbrella Confidential
MALWARE HAS BECOME MORE DANGEROUS

RANSOMWARE

#16 !
#16

29-Oct-13 ! Umbrella Confidential
MALWARE CAN DESTROY SMBs

KEYLOGGERS AND BACKDOORS

#17 !
#17

29-Oct-13 ! Umbrella Confidential
ATTACKS INCREASINGLY TARGET SMBs UNDER 250 USERS

36%
18%
2011

JUNE 2012

TARGETED ATTACKS
AGAINST SMBS

83%
77%
69%

#18 !
#18

29-Oct-13 ! Umbrella Confidential

SMBs NEED MANAGED
ENTERPRISE-GRADE
SECURITY
15x

HAVE NO FORMAL WRITTEN INTERNET
SECURITY POLICY FOR EMPLOYEES
THINK THEIR COMPANY IS SAFE FROM
HACKERS, VIRUSES AND MALWARE
HAVE NO INFORMAL INTERNET
SECURITY POLICY FOR EMPLOYEES

1x
ORGS WITH ORGS WITH
<11 or >100 11-100
EMPLOYEES EMPLOYEES

PROPORTION OF
BREACHES BY ORG SIZE
HOW DO YOU PROTECT CUSTOMERS?
ANTI-VIRUS IS JUST
A SINGLE LAYER
IN A DEFENSE IN DEPTH STRATEGY
“SIGNATURE-BASED
TOOLS (AV, FW & IPS)
ARE ONLY EFFECTIVE
AGAINST 30-50% OF
CURRENT SECURITY
THREATS”

#19 !
#19

29-Oct-13 ! Umbrella Confidential

“CLOUD-BASED PROVIDERS SHOULD
HAVE BETTER REAL-TIME
TELEMETRY OF GLOBAL EVENTS AND
THE ABILITY TO RESPOND TO THESE
EVENTS RAPIDLY BY MODIFYING THE
SOLUTION.”
CLOUD SECURITY
TO REDUCE
COMPLEXITY,
TIME AND COST

#20
introducing…

1_Light Title FOR MSPs
Only

#21 !
#21

29-Oct-13 ! Umbrella Confidential
ALLOWING AN MSP TO

Decrease
Costs
50%-90% reduction in
malware clean up time

Increase
Revenue
Per-user Web Filter
as a value added
service

#22 !
#22

Improve
Retention
Improved customer
uptime and value
reports

29-Oct-13 ! Umbrella Confidential
EASY TO DO BUSINESS WITH

VOLUME
PRICING

MONTHLY
BILLING

BUSINESS PRACTICES
ALIGNED WITH MONTHLY
RECURRING REVENUE MODELS

MANAGE SEATS
ON-DEMAND
#23 !
#23

29-Oct-13 ! Umbrella Confidential

MULTI-TENANT
DASHBOARD
HOW DO WE HELP MSPs TO

Decrease
Costs
50%-80% reduction in
malware clean up time

Increase
Revenue
Per-user Web Filter
as a value added
service

#24 !
#24

Improve
Retention
Improved customer
uptime and value
reports

29-Oct-13 ! Umbrella Confidential
INFECTED DEVICES IMPACT MSP MARGINS

MALWARE COSTS

YOUR
ENGINEER’S
TIME
#25 !
#25

29-Oct-13 ! Umbrella Confidential

CLIENTS’
EMPLOYEE
DOWNTIME
DECREASE MALWARE CLEAN UP EXPENSES

WEB

(PORTS ???)

ANY
PORT

WEB &
ANY
1_Light Title
PROTOCOL
NON-WEB

Only

WEB

! THE INTERNET

ANY
APP

PREVENTS
MALWARE

CONTAINS
BOTNETS

BLOCKS

PHISHING ATTEMPTS &
INAPPROPRIATE USAGE

YOUR CUSTOMERS"
CLOUD SERVICE
WITH ZERO ADDED LATENCY

#26 !
#26

29-Oct-13 ! Umbrella Confidential
SECURE EVERYWHERE

!   COVERAGE FOR WORKERS ON AND OFF THE NETWORK
!   COVERAGE FOR BYOD AND UNMANAGED DEVICES

#27 !
#27

29-Oct-13 ! Umbrella Confidential
UMBRELLA BY OPENDNS

THE ONLY CLOUD-DELIVERED
AND DNS-BASED
WEB SECURITY SOLUTION

80M+

REQUESTS
1_Light Title TO ADVANCED
MALWARE, BOTNET & PHISHING
Only

100K+
#28 !
#28

29-Oct-13 ! Umbrella Confidential

THREATS BLOCKED DAILY

NEW THREAT ORIGINS
DISCOVERED OR PREDICTED DAILY
ANALYZING DATA TO EXTRACT ACTIONABLE SECURITY INFORMATION

#29 !
#29

29-Oct-13 ! Umbrella Confidential
BIG DATA EXAMPLE – DGA ALGORITHM
!   Goal: try to tell if a domain has been machine generated by malware
!   Look at name: bigrams, trigrams, length, entropy, etc.
!   Look at timing: concentrated DNS queries with short life spans (temporal progression)
!   High level of activity at the time of domain generation -> fades over time
!   Result: Predict if a domain is a botnet command and control server and block it.
!   Benefit: Malware is contained and doesn’t update or become part of a botnet

Instance 1
cso0vm2q6g86owao.thepohzi.su
5qloxxe.tohk5ja.cc
k2s0euuz.oogagh.su
Instance 2
v8ylm8e.thepohzi.su
2g24ar4vu8ay6.tohk5ja.cc
d6vh5x1cic1yyz1i.oogagh.su
Instance 3
t2250p29079m6oq8.thepohzi.su
ngb0ef99.tohk5ja.cc
nxdhetohak91794.oogagh.su
#30 !
#30

29-Oct-13 ! Umbrella Confidential
LABS.UMBRELLA.COM http://labs.umbrella.com/2013/09/25/ripple-effect/

#31 !
#31

29-Oct-13 ! Umbrella Confidential
PREDICTING ADVANCED
ATTACKS FROM HIGH-RISK
SITES AND LOCATIONS:
!   MALWARE HOSTS

!   BOTNET CONTROLLERS
!   PHISHING WEBSITES
#32 !
#32

29-Oct-13 ! Umbrella Confidential
HOW DO WE HELP MSPs TO

Decrease
Costs
50%-80% reduction in
malware clean up time

Increase
Revenue
Per-user Web Filter
as a value added
service

#33 !
#33

Improve
Retention
Improved customer
uptime and value
reports

29-Oct-13 ! Umbrella Confidential
PROFITABLE WEB FILTER

WEB FILTER AS A VALUE ADDED SERVICE
!   60 CATEGORIES
!   GRANULAR WHITELIST/BLACKLIST
!   CUSTOM BLOCK PAGE

FEATURES TO CHARGE A PREMIUM PRICE
!   PER-COMPUTER POLICY
!   BYOD AND GUEST FILTERING
!   BLOCK PAGE BYPASS CODES

REPORTING AND MONITORING
!   REAL-TIME ACTIVITY REPORT
!   TOP DOMAINS/TOP CATEGORIES/TOP USERS
!   SAVED REPORTS WITH EXPORT
#34 !
#34

29-Oct-13 ! Umbrella Confidential
PROFITABLE WEB FILTER

FAST AND EASY TO MANAGE
!  SPEND LESS TIME MANAGING FILTERING
!  EASY TO USE AND UNDERSTAND

!  CENTRALIZED WEB DASHBOARD
!  REMOTE MANAGEMENT
!  ALL IN THE BACKGROUND

!  MULTI-TENANT
!  MULTIPLE CUSTOMER ORGANIZATIONS
!  MSP ADMINS HAVE ACCESS TO ALL CUSTOMERS
!  CUSTOMERS ARE ISOLATED TO THEIR OWN
ORGANIZATION
#35 !
#35

29-Oct-13 ! Umbrella Confidential
HOW DO WE HELP MSPs TO

Decrease
Costs
50%-80% reduction in
malware clean up time

Increase
Revenue
Per-user Web Filter
as a value added
service

#36 !
#36

Improve
Retention
Improved customer
uptime and value
reports

29-Oct-13 ! Umbrella Confidential
IMPROVE RENEWALS AND RETENTION

IMPROVED UPTIME
!  PROACTIVE SECURITY PROTECTION
!  FEWER INFECTIONS = ALWAYS ON TECHNOLOGY

VALUE REPORTS
1_Light Title
!  INFECTIONS PREVENTED
Only
!  MALWARE CONTAINED
!  PHISHING BLOCKED

VIRTUAL CIO
!  ASSIST HR AND STAFFING DECISIONS
!  ASSESS AND PLAN NETWORK USAGE
#37 !
#37

29-Oct-13 ! Umbrella Confidential
ENTERPRISE-CLASS MANAGEMENT WITHOUT THE ENTERPRISE COMPLEXITY

NETWORK-LEVEL LIGHTWEIGHT AGENT
PROVISIONING WITH AUTOMATION
(ALL DEVICES ON NETWORK
INCLUDING BYOD AND UNMANAGED)
POLICY TO DEPLOY

CLIENT-A:155.21.1.1/28
CLIENT-B: 214.41.3.1/32
CLIENT-C: 23.4.2.4/32

155.21.1.1/28
#38 !
#38

214.41.3.1/32

29-Oct-13 ! Umbrella Confidential

23.4.2.4/32
SUMMARY
!   SECURITY WITHOUT APPLIANCES
to reduce infected devices.

!   COVERAGE for all devices
regardless of location.

!   VOLUME pricing for your entire
license pool.

!   VISIBILITY into all network traffic
regardless of port or protocol.

!   MONTHLY billing to reduce OpEx
while aligning with billing
cycles.

!   ACCURACY to prevent, contain
and inform on the latest and
most complex threats.

!   SCALABILITY to meet
all traffic throughput
without bottlenecks.

!   MULTI-TENANT
console for reports
and policy config.

!   RELIABILITY for 100%
uptime, everywhere.

!   ON-DEMAND license
re-allocation.

!   LATENCY to enforce
policies & protections
is as fast as direct
Internet connections.

!   IMMEDIATE networklevel provisioning.

#39 !
#39

29-Oct-13 ! Umbrella Confidential

CLOUD FIRST

!   RMM-compatible
device provisioning.
THANK YOU! ANY QUESTIONS?...

FOR MORE INFORMATION
EMAIL US
MSP@OPENDNS.COM
OR VISIT US AT
umbrella.com/msp
OR JUST TWEET
@OPENDNS

#40 !
#40

29-Oct-13 ! Umbrella Confidential

More Related Content

What's hot

2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection
The Strategic Advantage of Adaptive  Multi-Engine Advanced Threat  ProtectionThe Strategic Advantage of Adaptive  Multi-Engine Advanced Threat  Protection
The Strategic Advantage of Adaptive Multi-Engine Advanced Threat ProtectionPriyanka Aash
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Why managed detection and response is more important now than ever
Why managed detection and response is more important now than everWhy managed detection and response is more important now than ever
Why managed detection and response is more important now than everG’SECURE LABS
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMwareXylos
 

What's hot (6)

2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection
The Strategic Advantage of Adaptive  Multi-Engine Advanced Threat  ProtectionThe Strategic Advantage of Adaptive  Multi-Engine Advanced Threat  Protection
The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection
 
Sophos
SophosSophos
Sophos
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Why managed detection and response is more important now than ever
Why managed detection and response is more important now than everWhy managed detection and response is more important now than ever
Why managed detection and response is more important now than ever
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMware
 

Viewers also liked

Managed Services - Becoming a Vendor
Managed Services - Becoming a VendorManaged Services - Becoming a Vendor
Managed Services - Becoming a VendorCA Nimsoft
 
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...eFolder
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentOpenDNS
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsOpenDNS
 
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...David Castro
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS
 
Decoding Connectivity: Thriving and Leading in the Internet of Everything World
Decoding Connectivity: Thriving and Leading in the Internet of Everything WorldDecoding Connectivity: Thriving and Leading in the Internet of Everything World
Decoding Connectivity: Thriving and Leading in the Internet of Everything WorldCisco Canada
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...David Castro
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsDavid Castro
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsOpenDNS
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOpenDNS
 
MSP Development Theme
MSP Development ThemeMSP Development Theme
MSP Development ThemeTOPdesk
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...Kaseya
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationOpenDNS
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 

Viewers also liked (17)

MSP Media Pitch
MSP Media PitchMSP Media Pitch
MSP Media Pitch
 
Managed Services - Becoming a Vendor
Managed Services - Becoming a VendorManaged Services - Becoming a Vendor
Managed Services - Becoming a Vendor
 
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...
eFolder Partner Chat Webinar — MSP Sales Strategies, Part 4: How to Bait for ...
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
 
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
MSP Marketing Tips | Tools and Examples for Differentiating Your Business to ...
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
 
Decoding Connectivity: Thriving and Leading in the Internet of Everything World
Decoding Connectivity: Thriving and Leading in the Internet of Everything WorldDecoding Connectivity: Thriving and Leading in the Internet of Everything World
Decoding Connectivity: Thriving and Leading in the Internet of Everything World
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
 
MSP Development Theme
MSP Development ThemeMSP Development Theme
MSP Development Theme
 
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
MSP Best Practice: Using Service Blueprints and Strategic IT Roadmaps to Get ...
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Similar to Umbrella for MSPs: Cloud Security via N-able

Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client AlertRobyn Melnyk
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgChristopher R. Ward
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio RosaTI Safe
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIOMSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIOOpenDNS
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS Cristian Garcia G.
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021PhilSmith165
 

Similar to Umbrella for MSPs: Cloud Security via N-able (20)

Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIOMSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021
 

More from OpenDNS

What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain OpenDNS
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...OpenDNS
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGPOpenDNS
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramOpenDNS
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...OpenDNS
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNSOpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and DockerOpenDNS
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonOpenDNS
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudOpenDNS
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...OpenDNS
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...OpenDNS
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationOpenDNS
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker WebcastOpenDNS
 
Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSOpenDNS
 

More from OpenDNS (16)

What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGP
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and Docker
 
Defcon
DefconDefcon
Defcon
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker Webcast
 
Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNS
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Umbrella for MSPs: Cloud Security via N-able

  • 1. 1_Title (1) UMBRELLA FOR MSPs: Cloud Security via N-Able Dima Kumets MSP Product Manager Umbrella Confidential
  • 2. COMPANY BACKGROUND GLOBAL SECURITY NETWORK 208.67.220.220 !   50M+ ACTIVE USERS DAILY !   19 DATA CENTER LOCATIONS 1_Light Title Only !   ZERO DOWNTIME, SINCE 2006 208.67.222.222 !   50B+ REQUESTS DAILY !   160+ COUNTRIES W/USERS !   ZERO NET NEW LATENCY EUROPE, MIDDLE EAST & AFRICA AMERICAS #2 #2! 29-Oct-13 ! Umbrella Confidential ASIA-PACIFIC
  • 3. CLOUD SECURITY SERVICE 1_Light Title Only PARTNERING WITH TO MAKE DEPLOYMENT FAST AND SEAMLESS #3 #3! 29-Oct-13 ! Umbrella Confidential
  • 5. TODAY MALWARE HAS EXPLODED !   PROFIT MOTIVE + LIQUIDITY CYBERCRIME AS A SERVICE !   DISTRIBUTED CRIMINAL ORGANIZATIONS !   SPECIALIZED TALENT !   MORE EFFICIENT + MORE DANGEROUS #5 #5! 29-Oct-13 ! Umbrella Confidential
  • 6. DISTRIBUTION VECTORS #6 #6! 29-Oct-13 ! Umbrella Confidential
  • 7. DIY EXPLOIT KITS DO-IT-YOURSELF EXPLOIT KITS !   PRE-PACKAGED SCRIPTS !   NO “HACKER” SKILLS NECESSARY !   USES MANY ATTACK VECTORS TO INSTALL MALWARE !   EMBED ON A WEBSITE – EASY TO USE !   RESULT !   EXPANDS CYBERCRIME TO TRADITIONAL CRIMINAL ORGANIZATIONS !   BIGGER PROFIT FOR BLACK-HAT HACKERS !  $200-$20,000 #7 #7! 29-Oct-13 ! Umbrella Confidential
  • 8. DIY EXPLOIT KIT 1_Light Title Only #8 #8! 29-Oct-13 ! Umbrella Confidential
  • 9. DIY EXPLOIT KIT 1_Light Title Only #9 #9! 29-Oct-13 ! Umbrella Confidential
  • 10. EXPLOIT KIT REPORTING! 1_Light Title Only #10 ! #10 29-Oct-13 ! Umbrella Confidential
  • 11. DISTRIBUTION VECTORS !  ACTIVE/WIDE NET !  MALVERTISING !  SPAM !  TARGETED !  SPEARPHISHING !  WATERING HOLE ATTACKS !  EMERGING !  MOBILE THREATS ! SMiShing (SMS PHISHING) #11 ! #11 29-Oct-13 ! Umbrella Confidential
  • 12. MALWARE PAYLOAD #12 ! #12 29-Oct-13 ! Umbrella Confidential
  • 13. UNWITTING PARTICIPATION IN EXTORTION DDOS BOTS #13 ! #13 29-Oct-13 ! Umbrella Confidential
  • 14. MALWARE RUINS EMAIL REPUATION SPAMBOTS #14 ! #14 29-Oct-13 ! Umbrella Confidential
  • 15. MALWARE SEIZES COMPUTERS FAKE ANTI-VIRUS #15 ! #15 29-Oct-13 ! Umbrella Confidential
  • 16. MALWARE HAS BECOME MORE DANGEROUS RANSOMWARE #16 ! #16 29-Oct-13 ! Umbrella Confidential
  • 17. MALWARE CAN DESTROY SMBs KEYLOGGERS AND BACKDOORS #17 ! #17 29-Oct-13 ! Umbrella Confidential
  • 18. ATTACKS INCREASINGLY TARGET SMBs UNDER 250 USERS 36% 18% 2011 JUNE 2012 TARGETED ATTACKS AGAINST SMBS 83% 77% 69% #18 ! #18 29-Oct-13 ! Umbrella Confidential SMBs NEED MANAGED ENTERPRISE-GRADE SECURITY 15x HAVE NO FORMAL WRITTEN INTERNET SECURITY POLICY FOR EMPLOYEES THINK THEIR COMPANY IS SAFE FROM HACKERS, VIRUSES AND MALWARE HAVE NO INFORMAL INTERNET SECURITY POLICY FOR EMPLOYEES 1x ORGS WITH ORGS WITH <11 or >100 11-100 EMPLOYEES EMPLOYEES PROPORTION OF BREACHES BY ORG SIZE
  • 19. HOW DO YOU PROTECT CUSTOMERS? ANTI-VIRUS IS JUST A SINGLE LAYER IN A DEFENSE IN DEPTH STRATEGY “SIGNATURE-BASED TOOLS (AV, FW & IPS) ARE ONLY EFFECTIVE AGAINST 30-50% OF CURRENT SECURITY THREATS” #19 ! #19 29-Oct-13 ! Umbrella Confidential “CLOUD-BASED PROVIDERS SHOULD HAVE BETTER REAL-TIME TELEMETRY OF GLOBAL EVENTS AND THE ABILITY TO RESPOND TO THESE EVENTS RAPIDLY BY MODIFYING THE SOLUTION.”
  • 21. introducing… 1_Light Title FOR MSPs Only #21 ! #21 29-Oct-13 ! Umbrella Confidential
  • 22. ALLOWING AN MSP TO Decrease Costs 50%-90% reduction in malware clean up time Increase Revenue Per-user Web Filter as a value added service #22 ! #22 Improve Retention Improved customer uptime and value reports 29-Oct-13 ! Umbrella Confidential
  • 23. EASY TO DO BUSINESS WITH VOLUME PRICING MONTHLY BILLING BUSINESS PRACTICES ALIGNED WITH MONTHLY RECURRING REVENUE MODELS MANAGE SEATS ON-DEMAND #23 ! #23 29-Oct-13 ! Umbrella Confidential MULTI-TENANT DASHBOARD
  • 24. HOW DO WE HELP MSPs TO Decrease Costs 50%-80% reduction in malware clean up time Increase Revenue Per-user Web Filter as a value added service #24 ! #24 Improve Retention Improved customer uptime and value reports 29-Oct-13 ! Umbrella Confidential
  • 25. INFECTED DEVICES IMPACT MSP MARGINS MALWARE COSTS YOUR ENGINEER’S TIME #25 ! #25 29-Oct-13 ! Umbrella Confidential CLIENTS’ EMPLOYEE DOWNTIME
  • 26. DECREASE MALWARE CLEAN UP EXPENSES WEB (PORTS ???) ANY PORT WEB & ANY 1_Light Title PROTOCOL NON-WEB Only WEB ! THE INTERNET ANY APP PREVENTS MALWARE CONTAINS BOTNETS BLOCKS PHISHING ATTEMPTS & INAPPROPRIATE USAGE YOUR CUSTOMERS" CLOUD SERVICE WITH ZERO ADDED LATENCY #26 ! #26 29-Oct-13 ! Umbrella Confidential
  • 27. SECURE EVERYWHERE !   COVERAGE FOR WORKERS ON AND OFF THE NETWORK !   COVERAGE FOR BYOD AND UNMANAGED DEVICES #27 ! #27 29-Oct-13 ! Umbrella Confidential
  • 28. UMBRELLA BY OPENDNS THE ONLY CLOUD-DELIVERED AND DNS-BASED WEB SECURITY SOLUTION 80M+ REQUESTS 1_Light Title TO ADVANCED MALWARE, BOTNET & PHISHING Only 100K+ #28 ! #28 29-Oct-13 ! Umbrella Confidential THREATS BLOCKED DAILY NEW THREAT ORIGINS DISCOVERED OR PREDICTED DAILY
  • 29. ANALYZING DATA TO EXTRACT ACTIONABLE SECURITY INFORMATION #29 ! #29 29-Oct-13 ! Umbrella Confidential
  • 30. BIG DATA EXAMPLE – DGA ALGORITHM !   Goal: try to tell if a domain has been machine generated by malware !   Look at name: bigrams, trigrams, length, entropy, etc. !   Look at timing: concentrated DNS queries with short life spans (temporal progression) !   High level of activity at the time of domain generation -> fades over time !   Result: Predict if a domain is a botnet command and control server and block it. !   Benefit: Malware is contained and doesn’t update or become part of a botnet Instance 1 cso0vm2q6g86owao.thepohzi.su 5qloxxe.tohk5ja.cc k2s0euuz.oogagh.su Instance 2 v8ylm8e.thepohzi.su 2g24ar4vu8ay6.tohk5ja.cc d6vh5x1cic1yyz1i.oogagh.su Instance 3 t2250p29079m6oq8.thepohzi.su ngb0ef99.tohk5ja.cc nxdhetohak91794.oogagh.su #30 ! #30 29-Oct-13 ! Umbrella Confidential
  • 32. PREDICTING ADVANCED ATTACKS FROM HIGH-RISK SITES AND LOCATIONS: !   MALWARE HOSTS !   BOTNET CONTROLLERS !   PHISHING WEBSITES #32 ! #32 29-Oct-13 ! Umbrella Confidential
  • 33. HOW DO WE HELP MSPs TO Decrease Costs 50%-80% reduction in malware clean up time Increase Revenue Per-user Web Filter as a value added service #33 ! #33 Improve Retention Improved customer uptime and value reports 29-Oct-13 ! Umbrella Confidential
  • 34. PROFITABLE WEB FILTER WEB FILTER AS A VALUE ADDED SERVICE !   60 CATEGORIES !   GRANULAR WHITELIST/BLACKLIST !   CUSTOM BLOCK PAGE FEATURES TO CHARGE A PREMIUM PRICE !   PER-COMPUTER POLICY !   BYOD AND GUEST FILTERING !   BLOCK PAGE BYPASS CODES REPORTING AND MONITORING !   REAL-TIME ACTIVITY REPORT !   TOP DOMAINS/TOP CATEGORIES/TOP USERS !   SAVED REPORTS WITH EXPORT #34 ! #34 29-Oct-13 ! Umbrella Confidential
  • 35. PROFITABLE WEB FILTER FAST AND EASY TO MANAGE !  SPEND LESS TIME MANAGING FILTERING !  EASY TO USE AND UNDERSTAND !  CENTRALIZED WEB DASHBOARD !  REMOTE MANAGEMENT !  ALL IN THE BACKGROUND !  MULTI-TENANT !  MULTIPLE CUSTOMER ORGANIZATIONS !  MSP ADMINS HAVE ACCESS TO ALL CUSTOMERS !  CUSTOMERS ARE ISOLATED TO THEIR OWN ORGANIZATION #35 ! #35 29-Oct-13 ! Umbrella Confidential
  • 36. HOW DO WE HELP MSPs TO Decrease Costs 50%-80% reduction in malware clean up time Increase Revenue Per-user Web Filter as a value added service #36 ! #36 Improve Retention Improved customer uptime and value reports 29-Oct-13 ! Umbrella Confidential
  • 37. IMPROVE RENEWALS AND RETENTION IMPROVED UPTIME !  PROACTIVE SECURITY PROTECTION !  FEWER INFECTIONS = ALWAYS ON TECHNOLOGY VALUE REPORTS 1_Light Title !  INFECTIONS PREVENTED Only !  MALWARE CONTAINED !  PHISHING BLOCKED VIRTUAL CIO !  ASSIST HR AND STAFFING DECISIONS !  ASSESS AND PLAN NETWORK USAGE #37 ! #37 29-Oct-13 ! Umbrella Confidential
  • 38. ENTERPRISE-CLASS MANAGEMENT WITHOUT THE ENTERPRISE COMPLEXITY NETWORK-LEVEL LIGHTWEIGHT AGENT PROVISIONING WITH AUTOMATION (ALL DEVICES ON NETWORK INCLUDING BYOD AND UNMANAGED) POLICY TO DEPLOY CLIENT-A:155.21.1.1/28 CLIENT-B: 214.41.3.1/32 CLIENT-C: 23.4.2.4/32 155.21.1.1/28 #38 ! #38 214.41.3.1/32 29-Oct-13 ! Umbrella Confidential 23.4.2.4/32
  • 39. SUMMARY !   SECURITY WITHOUT APPLIANCES to reduce infected devices. !   COVERAGE for all devices regardless of location. !   VOLUME pricing for your entire license pool. !   VISIBILITY into all network traffic regardless of port or protocol. !   MONTHLY billing to reduce OpEx while aligning with billing cycles. !   ACCURACY to prevent, contain and inform on the latest and most complex threats. !   SCALABILITY to meet all traffic throughput without bottlenecks. !   MULTI-TENANT console for reports and policy config. !   RELIABILITY for 100% uptime, everywhere. !   ON-DEMAND license re-allocation. !   LATENCY to enforce policies & protections is as fast as direct Internet connections. !   IMMEDIATE networklevel provisioning. #39 ! #39 29-Oct-13 ! Umbrella Confidential CLOUD FIRST !   RMM-compatible device provisioning.
  • 40. THANK YOU! ANY QUESTIONS?... FOR MORE INFORMATION EMAIL US MSP@OPENDNS.COM OR VISIT US AT umbrella.com/msp OR JUST TWEET @OPENDNS #40 ! #40 29-Oct-13 ! Umbrella Confidential