• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
iScan Online BYOD Security for MSSP's
 

iScan Online BYOD Security for MSSP's

on

  • 244 views

 

Statistics

Views

Total Views
244
Views on SlideShare
244
Embed Views
0

Actions

Likes
1
Downloads
8
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    iScan Online BYOD Security for MSSP's iScan Online BYOD Security for MSSP's Document Transcript

    • BYOD Security Scanning The Right Tool, The Right Time for the MSP BYOD Is the New Black It is no secret that the BYOD tsunami is sweeping over the IT landscape. According to a recent study by Cisco, over 95% of all organizations have BYOD devices accessing their data, applications and networks in some form or another. As a trusted partner, managed service providers can either choose to ignore this trend at the risk of becoming irrelevant or embrace it as a way to provide greater value to your customers and enhance your bottom line. Security the Tailor Made Service for MSPs For most organizations security is critical to their business (they can’t afford a security incident), but it is not core to what they do. Therefore, security is the perfect candidate for outsourcing to a 3rd party. Add to this that security can be very hard for a small organization not geared to provide it and that makes it even more attractive as a service from an MSP. Security being a popular, profitable offering for MSPs is not a secret. It probably represents one of the fastest growing sectors of the MSP market.The Cloud, Security, and ComplianceA recent study found that for many enterprises it was not unusual for over 1000different cloud services to be accessed via their network. The use of BYOD andcloud services outside of the network represent two distinct threats to the securityof your customer’s network. Additionally regulatory compliance demands thatdevices, the data they access and how they access it be in conformity withregulations. While this can be a burden to your customer, it is also a goldenopportunity for an MSP to offer additional services. www.iscanonline.com    —      sales@iscanonline.com  —    (214)  276-­‐1150  
    • BYOD Scanning Any device accessing the network represents a threat. Understanding what is on that device isn’t just nice, it is mandatory. Traditional security scanning solutions were designed for a static world where devices were plugged into the LAN 24/7. Today’s dynamic networks with mobile and remote users call for a new way of scanning these devices. We call it opportunistic scanning. The idea of being able to scan BYOD devices as well as desktops, laptops and other mobile devices anytime, anywhere provides the MSP with a valuable service to offer. One that is not available in the market today.What you can scan with iScan Online?iScan Online actually performs 3 differentkinds of scans:•  Vulnerability scans – full scale, complete vulnerability scans for all known vulnerabilities done in seconds and minutes rather than hours.•  Compliance Scans – PCI scans satisfying the new internal and mobile scanning recommendations of the PCI Council. Additionally you can scan for HIPAA and other compliance regulations.•  Data discovery scans – Scanning for data such as credit card numbers (PAN) or other PII on devices.iScan Online is MSP ready.We understand the MSP business modeland work with you, not against you. A successful MSP service has to be manageable across•  iScan Online’s cloud console is white multiple customers. iScan Online’s cloud console is labeled, easy to be branded and multi-tenant, white labeled with your branding and delivered to multiple customers•  We know your customers pay as they deliverable to multiple customers. go. We bill for what you need, when you need it.•  Training for Tier 1 support with Tier 2 & iScan Online is changing the paradigm 3 support of how security assessments are•  Subject matter overlay sales support for performed. security, compliance and BYOD Scan Anyone, Anytime, Anywhere! www.iscanonline.com    —      sales@iscanonline.com  —    (214)  276  -­‐1150