SlideShare a Scribd company logo
1 of 23
welcome
Confidential Information
welcome
marconet.com
Managed IT Services
Focus on what matters
to the business
I just want technology to
work for our employees
I want to focus on what
matters (our business)
– not IT
When technology isn’t
working, it affects our
bottom line
WHAT WE HEAR
Confidential Information *Indeed Survey of 101,465 Employees - September 2017 – September 2019
I am not confident we
are secure
We don’t know how to
protect our business from
hackers
Mitigating risk to our
organization is difficult
in IT
Hard to staff
IT positions
Technology sector
unemployment is at
<1.3% (20-year low)
Average technology
sector base salary:
$70,697* (True Cost 1.25x
- 1.4x)
Invest in training - then
they leave for higher pay!
Avoiding unexpected
costs are difficult with IT
I want IT costs to be
predictable
I need a trusted partner
to help us plan for IT
expenditures
When technology isn’t
working, it affects our
bottom line
Concerned about
getting hacked
SUPPORT
MANAGED IT SERVICES
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Email and Web
Security
Remote Management
and Monitoring
Anti-Malware
Protection
TOOLS
MANAGED IT SERVICES
Confidential Information
Triage | 24/7 live-call answer by Marco employees
ī‚§ 98% of calls answered within 10 seconds
Remediation | Monday - Friday 8:00 AM – 5:00 PM
ī‚§ 98% of issues resolved remotely
ī‚§ 24/7 remediation uplift available
Support Teams
ī‚§ Rapid Resolution - Front line support team to remediate
issues faster
ī‚§ Color Care Teams - Tier 1, Tier 2, and team supervisor
ī‚§ Escalation - Advance Security Team, Advance Network
Team, Field Services
BIG COMPANY RESOURCES
Unlimited Support Desk
Confidential Information
SMALL COMPANY FEEL
Triage | 24/7 live-call answer by Marco employees
ī‚§ 98% of calls answered within 10 seconds
Remediation | Monday - Friday 8:00 AM – 5:00 PM
ī‚§ 98% of issues resolved remotely
ī‚§ 24/7 remediation uplift available
Support Teams
ī‚§ Rapid Resolution - Front line support team to remediate
issues faster
ī‚§ Color Care Teams - Tier 1, Tier 2, and team supervisor
ī‚§ Escalation - Advance Security Team, Advance Network
Team, Field Services
Unlimited Support Desk
MANAGED IT SERVICES
MANAGED IT SERVICES
Confidential Information
Immediate Client Feedback
Client Business Reviews
ī‚§ Service metrics
ī‚§ User feedback review
95.6%
2.7% 1.6%
Positive
Negative
Neutral
Client Business Review Process
MANAGED IT SERVICES
Confidential Information
Field Services
ī‚§ 59 Marco locations
ī‚§ 750+ certified systems engineers
and technical representatives
Marco Extended Support Network
ī‚§ For areas we can’t reach, we are members of a
national support network of “smart hands”
Unlimited On-Site Support
On-Site Visits
ī‚§ Regularly scheduled
maintenance visits
ī‚§ Recurring health checks
Proactive On-Site Visits
Third Party Software Support
(Requires active support contract)
MANAGED IT SERVICES
Confidential Information
Budgeting & Planning
Client Business Review Process
Client Business Reviews
ī‚§ Service metrics
ī‚§ User feedback review
ī‚§ Hardware lifecycle management
ī‚§ Budgeting and planning services
MANAGED IT SERVICES
Confidential Information
Security Operations Center (SOC) Network Operations Center (NOC)
Security Operations Center Services
ī‚§ Security analysts who monitor your
network by leveraging an IDS (Intrusion
Detection System)
ī‚§ 24/7 network monitoring
ī‚§ IDS leverages multiple best-in-breed
threat feeds
Network Operations Center (NOC)
ī‚§ Tool & software administration, proactive
monitoring and alerting
ī‚§ Patching: operating systems (Windows / Mac)
and 3rd party software
ī‚§ Secret Server – encrypting and securing our
client data repository
EXPERIENCE MATTERS
End-User
Surveys
(immediate feedback)
Geographic
Call Routing
(small company feel)
Call
Recording
(quality control)
Confidential Information
Security
Focused
(reduce risk)
IT is never
“Out of the Office”
(increase productivity)
Over 10 Years of
MIT Experience
(mature processes)
Rapid Resolution
Team
(1st call remediation)
Unlimited
Support
(issues get resolved)
Warm Call
Handoff
(no repeating yourself)
Vendor
Facilitation
(no finger pointing)
MEASUREMENTS MATTER
Confidential Information
SECURITY AT HOME
Video Surveillance
Lock
Front Door
Alarm
System
Glass Break
Sensors
Human’s
Monitoring
IDENTIFY PROTECT RESPOND
DETECT RECOVER
SECURITY MATTERS
www.nist.gov/about-nist
Confidential Information
Asset management
Business environment
Governance
Risk assessment
Risk management
strategy
Anomalies and events
Security continuous
monitoring
Detection processes
Response planning
Communications
Analysis
Mitigation
Improvements
Recovery planning
Improvements
Communications
Access control
Awareness and
training
Data security
Information protection
process and
procedures
Maintenance
Protective technology
NIST Framework | National Institute of Standards and Technology
The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
SECURITY AT WORK
Video Surveillance
Lock
Front Door
Alarm
System
Glass Break
Sensors
Human’s
Monitoring
SECURITY AT WORK
Anti-Virus /
Anti-Malware
Firewall
Monitoring and Alerting
Detection
and Response
Platform
Network Sensors
Security Operations
Center (SOC)
SUPPORT
MANAGED IT SERVICES
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Email and Web
Security
Remote Management
and Monitoring
Anti-Malware
Protection
TOOLS
SECURITY AT WORK
Anti-Malware Protection
Anti-Virus / Anti-Malware
Threat Detection and Response
Firewall
Remote Management and Monitoring
Monitoring & Alerting
Email & Web Security
Detection and Response Platform
Secure Managed Network
Network Sensors
Security Training and Phishing
Security Operations Center (SOC)
IDENTIFY PROTECT RESPOND
DETECT RECOVER
NIST Framework | Marco Resources
MANAGED IT SERVICES
Confidential Information
Threat Detection
and Response
Security Operations
Center
Anti-Malware Protection
Network Operations
Center
Email & Web Security
Unlimited Support Desk
Secure Client Repository
Anti-Malware Protection
Patching (OS & 3rd Party)
Security Training and
Phishing
Unlimited Support Desk
Rapid Resolution Team
Threat Detection and
Response
Anti-Malware Protection
Unlimited On-site Support
Client Business Review
Process
Onboarding Process
Secure Managed Network
Remote Management
and Monitoring
Marco Assessments
Proactive On-site Visits
Managed Backup (Optional)
Comprehensive IT Partner
Over 10 Years of MIT
Experience
Unlimited On-site Support
The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
MANAGED IT SERVICES
Confidential Information
PER USER PRICING MODEL
$84/USER
Marco Assessments
Email and Web
Security
Rapid Resolution
Team
Comprehensive IT
Partner
WHY MARCO?
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Remote Management
and Monitoring
Anti-Malware
Protection
Onboarding Process Predictable Cost Big Company Resources
Small Company Feel
Secure Client Repository
Over 10 Years of
MIT Experience
IT is never
“Out of the Office”
WHAT TO EXPECT
KICK-OFF MEETING
SEMI-ANNUAL
BUSINESS REVIEW
Confidential Information
1
PROJECT PLAN
2
CREATE TIMELINE
3
AGENT LOAD
4
SITE DISCOVERIES
5
COMPLETE
DOCUMENTATION
6
TRAINING
7
GO-LIVE
8
DAILY/WEEKLY
STATUS
UPDATES
9
MONTHLY
SERVICE
REVIEWS
Our extensive onboarding process provides a feeling on go-live day. It’s as if we've been your IT support forever!
ī‚§ End-User Support Desk
ī‚§ Network Management
ī‚§ Desktop Management
ī‚§ Software Subscriptions
Copiers & Printers
IT Projects Managed Services
Managed IT Cloud Voice
Cloud Solutions
ī‚§ Data Center
ī‚§ Security
ī‚§ Unified Communications
ī‚§ Network Infrastructure
ī‚§ Audio Visual
ī‚§ Software
ī‚§ Document Management
ī‚§ Cloud Migration Services
ī‚§ VaaS
ī‚§ UCaaS
Connectivity
ī‚§ Managed SD-WAN
ī‚§ Carrier Services
ī‚§ Private Cloud
ī‚§ Public Cloud
ī‚§ Multi Cloud
ī‚§ Managed Print Services
ī‚§ Digital Printing Press
ī‚§ Wide Format Printers
ī‚§ Print Software Applications
ī‚§ Copiers, Printers &
Multi-function Devices
ī‚§ Shredding Services
Confidential Information
MARCO SOLUTIONS
Managed it   business leader ppt

More Related Content

What's hot

The business value of managed services: Findings from IDC research sponsored...
The business value of managed services:  Findings from IDC research sponsored...The business value of managed services:  Findings from IDC research sponsored...
The business value of managed services: Findings from IDC research sponsored...IBM Services
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
App dynamics and servicenow v5
App dynamics and servicenow   v5App dynamics and servicenow   v5
App dynamics and servicenow v5BrendanBooth
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).Rob Akershoek
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentationLen Moncrieffe
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Benefits of an Managed Service Provider
Benefits of an Managed Service ProviderBenefits of an Managed Service Provider
Benefits of an Managed Service ProviderThe TNS Group
 
Service Management
Service ManagementService Management
Service ManagementPeter Lindsay
 
Managed Services Model For IT Services
Managed Services Model For IT Services Managed Services Model For IT Services
Managed Services Model For IT Services Ajay Rathi
 
Managed Services
Managed ServicesManaged Services
Managed ServicesRishu Mehra
 
ITIL Service Operation 2011
ITIL Service Operation 2011ITIL Service Operation 2011
ITIL Service Operation 2011Marvin Sirait
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderDebojyoti Ghosh
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 
Data strategy in a Big Data world
Data strategy in a Big Data worldData strategy in a Big Data world
Data strategy in a Big Data worldCraig Milroy
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
MSP Pricing Tips | Determining Optimal Margins for IT Managed Services
MSP Pricing Tips | Determining Optimal Margins for IT Managed ServicesMSP Pricing Tips | Determining Optimal Margins for IT Managed Services
MSP Pricing Tips | Determining Optimal Margins for IT Managed ServicesDavid Castro
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 

What's hot (20)

The business value of managed services: Findings from IDC research sponsored...
The business value of managed services:  Findings from IDC research sponsored...The business value of managed services:  Findings from IDC research sponsored...
The business value of managed services: Findings from IDC research sponsored...
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
App dynamics and servicenow v5
App dynamics and servicenow   v5App dynamics and servicenow   v5
App dynamics and servicenow v5
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).IT4IT and DevOps Tools Landscape (2020).
IT4IT and DevOps Tools Landscape (2020).
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Benefits of an Managed Service Provider
Benefits of an Managed Service ProviderBenefits of an Managed Service Provider
Benefits of an Managed Service Provider
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
Service Management
Service ManagementService Management
Service Management
 
Managed Services Model For IT Services
Managed Services Model For IT Services Managed Services Model For IT Services
Managed Services Model For IT Services
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
ITIL Service Operation 2011
ITIL Service Operation 2011ITIL Service Operation 2011
ITIL Service Operation 2011
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service Provider
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Data strategy in a Big Data world
Data strategy in a Big Data worldData strategy in a Big Data world
Data strategy in a Big Data world
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
MSP Pricing Tips | Determining Optimal Margins for IT Managed Services
MSP Pricing Tips | Determining Optimal Margins for IT Managed ServicesMSP Pricing Tips | Determining Optimal Margins for IT Managed Services
MSP Pricing Tips | Determining Optimal Margins for IT Managed Services
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 

Similar to Managed it business leader ppt

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICESPlethora
 
Managed Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canadaManaged Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canadawebdeveloper15
 
Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation BniFunkmaster
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overviewlynotts
 
My Tech Team Managed Services
My Tech Team Managed ServicesMy Tech Team Managed Services
My Tech Team Managed ServicesMyTechTeam
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxTheWalkerGroup1
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed SecuritySrivatsan Desikan
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 

Similar to Managed it business leader ppt (20)

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
Managed Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canadaManaged Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canada
 
Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation Bni
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
NSI Net Factor Advantage
NSI Net Factor AdvantageNSI Net Factor Advantage
NSI Net Factor Advantage
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
My Tech Team Managed Services
My Tech Team Managed ServicesMy Tech Team Managed Services
My Tech Team Managed Services
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Managed it business leader ppt

  • 2. Focus on what matters to the business I just want technology to work for our employees I want to focus on what matters (our business) – not IT When technology isn’t working, it affects our bottom line WHAT WE HEAR Confidential Information *Indeed Survey of 101,465 Employees - September 2017 – September 2019 I am not confident we are secure We don’t know how to protect our business from hackers Mitigating risk to our organization is difficult in IT Hard to staff IT positions Technology sector unemployment is at <1.3% (20-year low) Average technology sector base salary: $70,697* (True Cost 1.25x - 1.4x) Invest in training - then they leave for higher pay! Avoiding unexpected costs are difficult with IT I want IT costs to be predictable I need a trusted partner to help us plan for IT expenditures When technology isn’t working, it affects our bottom line Concerned about getting hacked
  • 3. SUPPORT MANAGED IT SERVICES Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Email and Web Security Remote Management and Monitoring Anti-Malware Protection TOOLS
  • 4. MANAGED IT SERVICES Confidential Information Triage | 24/7 live-call answer by Marco employees ī‚§ 98% of calls answered within 10 seconds Remediation | Monday - Friday 8:00 AM – 5:00 PM ī‚§ 98% of issues resolved remotely ī‚§ 24/7 remediation uplift available Support Teams ī‚§ Rapid Resolution - Front line support team to remediate issues faster ī‚§ Color Care Teams - Tier 1, Tier 2, and team supervisor ī‚§ Escalation - Advance Security Team, Advance Network Team, Field Services BIG COMPANY RESOURCES Unlimited Support Desk
  • 5. Confidential Information SMALL COMPANY FEEL Triage | 24/7 live-call answer by Marco employees ī‚§ 98% of calls answered within 10 seconds Remediation | Monday - Friday 8:00 AM – 5:00 PM ī‚§ 98% of issues resolved remotely ī‚§ 24/7 remediation uplift available Support Teams ī‚§ Rapid Resolution - Front line support team to remediate issues faster ī‚§ Color Care Teams - Tier 1, Tier 2, and team supervisor ī‚§ Escalation - Advance Security Team, Advance Network Team, Field Services Unlimited Support Desk MANAGED IT SERVICES
  • 6. MANAGED IT SERVICES Confidential Information Immediate Client Feedback Client Business Reviews ī‚§ Service metrics ī‚§ User feedback review 95.6% 2.7% 1.6% Positive Negative Neutral Client Business Review Process
  • 7. MANAGED IT SERVICES Confidential Information Field Services ī‚§ 59 Marco locations ī‚§ 750+ certified systems engineers and technical representatives Marco Extended Support Network ī‚§ For areas we can’t reach, we are members of a national support network of “smart hands” Unlimited On-Site Support On-Site Visits ī‚§ Regularly scheduled maintenance visits ī‚§ Recurring health checks Proactive On-Site Visits Third Party Software Support (Requires active support contract)
  • 8. MANAGED IT SERVICES Confidential Information Budgeting & Planning Client Business Review Process Client Business Reviews ī‚§ Service metrics ī‚§ User feedback review ī‚§ Hardware lifecycle management ī‚§ Budgeting and planning services
  • 9. MANAGED IT SERVICES Confidential Information Security Operations Center (SOC) Network Operations Center (NOC) Security Operations Center Services ī‚§ Security analysts who monitor your network by leveraging an IDS (Intrusion Detection System) ī‚§ 24/7 network monitoring ī‚§ IDS leverages multiple best-in-breed threat feeds Network Operations Center (NOC) ī‚§ Tool & software administration, proactive monitoring and alerting ī‚§ Patching: operating systems (Windows / Mac) and 3rd party software ī‚§ Secret Server – encrypting and securing our client data repository
  • 10. EXPERIENCE MATTERS End-User Surveys (immediate feedback) Geographic Call Routing (small company feel) Call Recording (quality control) Confidential Information Security Focused (reduce risk) IT is never “Out of the Office” (increase productivity) Over 10 Years of MIT Experience (mature processes) Rapid Resolution Team (1st call remediation) Unlimited Support (issues get resolved) Warm Call Handoff (no repeating yourself) Vendor Facilitation (no finger pointing)
  • 12. SECURITY AT HOME Video Surveillance Lock Front Door Alarm System Glass Break Sensors Human’s Monitoring
  • 13. IDENTIFY PROTECT RESPOND DETECT RECOVER SECURITY MATTERS www.nist.gov/about-nist Confidential Information Asset management Business environment Governance Risk assessment Risk management strategy Anomalies and events Security continuous monitoring Detection processes Response planning Communications Analysis Mitigation Improvements Recovery planning Improvements Communications Access control Awareness and training Data security Information protection process and procedures Maintenance Protective technology NIST Framework | National Institute of Standards and Technology The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
  • 14. SECURITY AT WORK Video Surveillance Lock Front Door Alarm System Glass Break Sensors Human’s Monitoring
  • 15. SECURITY AT WORK Anti-Virus / Anti-Malware Firewall Monitoring and Alerting Detection and Response Platform Network Sensors Security Operations Center (SOC)
  • 16. SUPPORT MANAGED IT SERVICES Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Email and Web Security Remote Management and Monitoring Anti-Malware Protection TOOLS
  • 17. SECURITY AT WORK Anti-Malware Protection Anti-Virus / Anti-Malware Threat Detection and Response Firewall Remote Management and Monitoring Monitoring & Alerting Email & Web Security Detection and Response Platform Secure Managed Network Network Sensors Security Training and Phishing Security Operations Center (SOC)
  • 18. IDENTIFY PROTECT RESPOND DETECT RECOVER NIST Framework | Marco Resources MANAGED IT SERVICES Confidential Information Threat Detection and Response Security Operations Center Anti-Malware Protection Network Operations Center Email & Web Security Unlimited Support Desk Secure Client Repository Anti-Malware Protection Patching (OS & 3rd Party) Security Training and Phishing Unlimited Support Desk Rapid Resolution Team Threat Detection and Response Anti-Malware Protection Unlimited On-site Support Client Business Review Process Onboarding Process Secure Managed Network Remote Management and Monitoring Marco Assessments Proactive On-site Visits Managed Backup (Optional) Comprehensive IT Partner Over 10 Years of MIT Experience Unlimited On-site Support The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
  • 19. MANAGED IT SERVICES Confidential Information PER USER PRICING MODEL $84/USER
  • 20. Marco Assessments Email and Web Security Rapid Resolution Team Comprehensive IT Partner WHY MARCO? Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Remote Management and Monitoring Anti-Malware Protection Onboarding Process Predictable Cost Big Company Resources Small Company Feel Secure Client Repository Over 10 Years of MIT Experience IT is never “Out of the Office”
  • 21. WHAT TO EXPECT KICK-OFF MEETING SEMI-ANNUAL BUSINESS REVIEW Confidential Information 1 PROJECT PLAN 2 CREATE TIMELINE 3 AGENT LOAD 4 SITE DISCOVERIES 5 COMPLETE DOCUMENTATION 6 TRAINING 7 GO-LIVE 8 DAILY/WEEKLY STATUS UPDATES 9 MONTHLY SERVICE REVIEWS Our extensive onboarding process provides a feeling on go-live day. It’s as if we've been your IT support forever!
  • 22. ī‚§ End-User Support Desk ī‚§ Network Management ī‚§ Desktop Management ī‚§ Software Subscriptions Copiers & Printers IT Projects Managed Services Managed IT Cloud Voice Cloud Solutions ī‚§ Data Center ī‚§ Security ī‚§ Unified Communications ī‚§ Network Infrastructure ī‚§ Audio Visual ī‚§ Software ī‚§ Document Management ī‚§ Cloud Migration Services ī‚§ VaaS ī‚§ UCaaS Connectivity ī‚§ Managed SD-WAN ī‚§ Carrier Services ī‚§ Private Cloud ī‚§ Public Cloud ī‚§ Multi Cloud ī‚§ Managed Print Services ī‚§ Digital Printing Press ī‚§ Wide Format Printers ī‚§ Print Software Applications ī‚§ Copiers, Printers & Multi-function Devices ī‚§ Shredding Services Confidential Information MARCO SOLUTIONS

Editor's Notes

  1. Add NIST copy