Meet Millie. She uses a cloud office and doesn’t even know it. All she cares about is being able to work productively and securely from her laptop, tablet and smartphone -- no matter where she is.
Her clients are happy, her colleagues are happy and business is good. Why?
2. A Day in the Life of Thoroughly Modern Mobile Millie: Endpoint Protection for Business
I can’t imagine there are too many people who would disagree that a faster internet connection makes for a faster, more
competitive business. But what exactly could increasing your broadband mean for your business?
Take Millie:
No time to worry about the threats of cybercrime, a power outage, theft or flooding that puts the office out of action; she’s
trying to run her business. She also knows ignoring these things would be putting her increasingly mobile business at risk.
All she wants is for her & her staff to be able to access, manage and secure all their devices – desktops, laptops, tablets
and smart phones – wherever they are.
Here’s what happened one day in the life of Thoroughly Mobile Millie.
3. As Millie unwinds after her morning workout, she takes 20 minutes to check her emails. In the midst of them, she finds an alert from
her malware and virus detection software, warning her against a potential threat. Not recognising the sender, she chooses to blacklist
the email.
Smart decision.
Had it not been for the real-time detection model her IT manager set up, in a millisecond she could’ve exposed her business and
contacts to data corruption via the latest sophisticated evolution of email attack.
But in this case it was handled Without
slowing down Millie’s day.
08:00 hours – Millie avoids opening a phishing email
4. 09:00 hours – Millie arrives in the office to
discover she’s left her iPad on the train
It’s what we all dread. Losing a laptop,
smartphone or tablet with sensitive
customer data – not to mention business
data.
However, with a Cloud Based endpoint
protection set-up, Millie’s IT manager
quickly steps in to lock down the device and
wipe sensitive data.
He’s easily able to monitor and secure
activity without compromising her privacy.
Millie can also log onto all of her
applications on another device without
slowing down her busy day!
Every year, thousands of business devices
are lost or stolen, exposing companies to
the risk of data breaches – anything from
fines to damaging business reputations and
of course, customer confidence.
5. 11:00 hours – Millie welcomes three new recruits, already governed by
endpoint protection Millie’s business is flexible. It has to be.
So as employee numbers grows, contract and grow again, their endpoint
protection scales accordingly.
This keeps her business secure and compliant with data governance and
industry regulations. And it’s all managed from one central point with an
out-of-the-box solution advanced system reporting, automated report
generation, delivery and proactive metric-based backup management.
6. Key to this is that they have
recently had superfast broadband
installed.
This meant that Millie could
interview one of the new recruits
via video conferencing. But as
well as faster, more connected
working, there are more benefits
for Millie’s business:
She doesn’t have to pay upfront
costs for technology (hardware,
software licences and
maintenance) – her broadband is
in the cloud, so she’s accessing
all the technology she needs via
cloud services on a monthly
subscription.
She doesn’t have to pay
overheads for office-based staff;
most of her staff are now working
remotely, from home. Likewise,
she doesn’t need space for
messy, cluttered servers and
hardware.
Millie can choose where and
when she works – most
importantly, she can take a
holiday and still keep an eye on
the business
With faster connectivity and a
faster business, Millie’s
customers are feeling the benefit,
so customer loyalty levels have
risen.
7. 12:00 hours – Millie travels to a meeting with her lawyers, and needs to access files on the way
In the taxi on the way to meeting Millie and a colleague need to make some last-minute changes to a document.
A quick Skype for Business message exchange with a colleague who directs them to the file, which they access, collaborate on with their
office-based colleague, amend and save.
Changes are effected immediately and accessible across the business, to both office and remote workers alike. It’s also backed up.
This means Millie’s business continues to work at the speed required, they’re productive and there’s no need to waste their budget or time –
support costs are minimised without slowing down her busy day.
8. 13:00 hours – Lawyers can get
the information they need
quickly – with the Legal Hold
application
Millie’s lawyers need to find
correspondence relating to a
disputed SLA between Millie’s
business and a client. Normally,
finding the right data you need
quickly is no easy task for a legal
team. However, with the best
endpoint protection package for
the business, Millie’s IT manager
has made data retrieval fast and
secure.
With compliant seven-year
archiving and eDiscovery,
information regarding the
disputed SLA is found quickly,
saving Millie the need to pay
unnecessarily for costly
consultants, legal services and
third party tools. The Legal Hold
application automates and
centralises backup and search
of data across devices. So IT and
legal teams can easily identify,
collect, preserver and review
potential data internally.
9. 16:00 hours – Millie’s management team reviews their ISO 27001 compliance
requirements
With the case meeting out of the way, Millie heads back to the office for a
compliance meeting with her management team. To help them keep customers
and win new business in an increasingly competitive business environment,
Mille is keen to assure her customers of her business commitment to keeping
their data secure.
Using the same backup package that
protects business critical information of
more than four million other corporate
users, Millie is able to provide that
guarantee with ISO 27001 data security
protection. Advanced encryption and other
top-level security procedures and protocols
safeguard her business data at all times –
during transmission, storage and recovery.
10. 22:30 hours – With endpoint protection, Millie
has peace of mind
Safe in the knowledge that the business is both
available & protected 24/7, Millie can get a
good night’s sleep.
(Even if someone, somewhere, is working out a
new way to disrupt this…)
11. For small businesses in the
South West, the connectivity
roll-out offers potentially big
benefits.
Cloud solutions are very
scalable - pay on a per user.
Critical businesses issues such
as back up, security and
productivity, will be catered for
and the data can be accessed
from anywhere with an internet
connection.
Cloud Computing can reduce
the level of Capital investment
in ICT hardware and software.
In reality it is quite possible that
many businesses already use
cloud type services, like
Facebook and Hotmail.
With superfast broadband, the
use of such services becomes
much easier.
Many cloud based business
applications are now available,
ranging from office software like
Google Docs and Office365
(email, calendars, word
processors and spread sheets)
to more sophisticated business
software like customer
relationship management (CRM)
systems such as Salesforce.