Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Safeguard Your Business

413 views

Published on

How to Take Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breaches, Damaging Litigation and Rogue (or Careless) Employee

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Safeguard Your Business

  1. 1. Safeguard your Business $ ~ OR ~ How to Take Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breaches, Damaging Litigation and Rogue (or Careless) Employees
  2. 2. Who the Heck is Denis Wilson and Why Should I Listen to Him? “I am a veteran technology strategist who specializes in developing highly effective network and computing systems for small businesses that provide professional services or manufacture high-technology products.”  Been working with Microsoft and their clients for over 20 years  Certified by Microsoft on cloud computing and hybrid systems  Very knowledgeable in vertical markets like construction, engineering, architecture, manufacturing, and the like  Author and speaker on the subject of SMB technology for SCORE, SBDC, EDCs, SBA, and a variety of business associations
  3. 3. Slide Deck Availability Available at: Slide Share: www.slideshare.net/dwpia I also have over 15 presentations that are posted at the same location for your perusal. Ask me to connect with you on Facebook, LinkedIn or Twitter if you would like to get my blog posts, and curated posts on small business technology and processes.
  4. 4. What We Are Going to Cover PART 2 How technology can help you PART 3 How to get started PART 1 How to safeguard your business
  5. 5. Ultimately: We Are Going to Cover… How To Be Smart, Strategic And Intentional With Your IT Decisions To Maximize Profits, Boost Productivity, Fuel Growth, Minimize Waste And Significantly Reduce Your Exposure To Risk (Versus Taking A Random And Haphazard Approach, Which Is What MOST Businesses Do)
  6. 6. 1. A No-Obligation Strategic Network Security Assessment and Report (Keep the Report, It’s Yours) 2. And a Microsoft Office 365 Business Premium 30-day trial (A $300 Value) Absolutely FREE. Bonus! Hang On Until The End And Get This FREE!
  7. 7. Protect and control your data Be prepared for the unexpected The manageable side of risk management.
  8. 8. Our data has to be secure. What does my modern business need? We need to reopen our business quickly after an emergency. 40% of businesses hit by disaster never reopen FEMA 2013 60% SMB technology leaders cited data security or privacy as a concern Boston Consulting Group study
  9. 9. Controlling access Protecting data Managing mobile devices Backing up your files Ready for the unexpected Solutions for safeguarding your business
  10. 10. One of your team loses their mobile device. You can: • Lock the device to restrict access • Reset a user’s PIN to enable access once it’s been found • Wipe data from a device that can’t be located Manage and protect mobile devices. PIN Reset 12__ Remote Data Wipe Remote Lock Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  11. 11. • Choose the level of security and privacy you need • Customize security by user, by device and by location Secure what matters most. Salesperson. Mobile worker. Access price quotes, orders, inventory, customer data, expense report forms Human resources manager. In the office. Access to personnel files, benefits information, resumes Branch office manager. On location. Access to budget updates, time sheets, inventory, scheduling Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  12. 12. • Get to important applications and information wherever you are • Keep company data on the server, where it is backed up and up to date Control access to your business data. HR CRM Easy remote access to on-site applications Sensitive data stays safe because it’s on the server and not on a device Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  13. 13. Engineers protected when on the roof or in the street “It was like an invisible and impenetrable Iron Curtain that allowed me to sleep at night” Tim McCarthy, CEO, TR2 Inc. Data protection enables a more mobile workforce without compromising security TR2 has 2-3 engineers working all around the U.S. every day. Company and client critical information is on their laptops and smartphones. They need to secure that data without creating inefficiencies for their engineers. DWP Information Architects brought in MaaS360 mobile device management to secure all laptops, tablets and smartphones, no matter the operating system. The result: TR2 could be sure that their client data was absolutely secure while their engineers weren’t required to do anything different. 5 employees | Architectural Engineering | www.tr2.comControllingaccess Remote Wipe and Device Encryption protected lost devices All existing devices could be protected, so they did not have to spend additional capital.
  14. 14. • Take advantage of a single platform and easy-to-use tools to proactively manage desktops and devices • Get dependable support from experts Simplify management. Products like Microsoft Intune and IBM’s MaaS360 provide PC, mobile device and application management across popular platforms (Windows, Windows phone, iOS, and Android) Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Manage policies and devices with ease with Office
  15. 15. Avoid spam and viruses with continuously updated protection Guard PCs and devices with built-in device security like BitLocker and encryption Get automatic, always-on protection. Full device encryption, like BitLocker technology Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Fingerprint login Protect against viruses, phishing, and malware, like with Windows Defender, SmartScreen, and Malwarebytes
  16. 16. • Help ensure your data remains private and secure • Comply with industry standards and data privacy rules Meet privacy and security standards. Design for deep, multi- level security through encryption, authentication and data privacy rules. Meet requirements specified in ISO27001, EU Model Clauses, HIPAA and more Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  17. 17. • Threats are complex • Design for attacks at all stages of their life cycle • And enable quick and accurate mitigation Protect data at multiple stages in the attack lifecycle Solutions focused on one stage may fail, especially when new or unknown techniques are used. An effective prevention strategy includes technologies that detect and prevent across each stage, easily block known threat components, and hone in on evasive behavior to ultimately stop attackers from reaching their end goal. Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Though prevention is preferable, mitigation and remediation cycles continue to be an important part of each organization’s cybersecurity strategy, and when there’s an infection, every minute counts. Advanced persistent threats (APTs) are designed to be evasive in order to bypass security defenses. It’s incredibly easy to fragment a payload into several packets, change a malicious file hash, or spoof an email header.
  18. 18. Credit union keeps business moving. “With data encryption, we no longer worry about data security if the device is lost or stolen.” Mark Malinowski, Vice President of Accounting Data protection enables a more mobile workforce without compromising security Responsive performance and modern hardware improves customer perception Live Tiles increase the speed of publishing interest rates and other real-time information When natural disasters impacted their ability to serve customers, RBFCU realized they needed to increase mobility while meeting financial industry standards for data security. We helped them move from desktop Windows XP PCs to mobile Windows 10 ultrabooks and tablets. The result: RBFCU improved customer service and data security at the same time. 33 employees | Financial Services | www.rbfcu.coop Protect&ControlYourData
  19. 19. Protect your files AND minimize business disruption Keep a replica of your entire server and keep it updated frequently Get your applications and services back up and running in minutes Protect your files quickly and simply – the first line of defense Save copies of your files to a second location Quickly restore your files when accidentally deleted or lost Backup vs. Disaster Recovery What’s the difference? Together, two complementary layers of protection for your business Disaster RecoveryBackup Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  20. 20. Get to your latest files from anywhere when the unexpected happens and never miss a step. Never lose your latest files – even if you lose your laptop or device.Back up to a second location or the cloud Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected File share and sync stores files in the cloud, keeping them available
  21. 21. Environment engineers took their data to the cloud “It just worked. It was so much easier than what we did before. And we’ve had no outages” Lisa Maturkanic, Office Manager, Meridian Consultants LLC Meridian got unlimited storage in the cloud and shared to all of their employees no matter where they were Meridian Consultants had an over abundance of graphic data files that bogged down their server but the users needed immediate access. DWP Information Architects created a cloud file share and sync network that backed up to the network-attached storage on-site The result: They got immediate results while knowing that their “server” wasn’t going down on them and having all their files backed up on-site. 20 employees | Environmental engineers | www.meridianconsultantsllc.comBepreparedfortheunexpected The critical files were backed up on-site so their access was immediate and local Version control was maintained when multiple engineers accessed the file.
  22. 22. Get your critical business apps back up and running in minutes. Keep your business running— even in the event of a disaster such as fire, break-in, or flood. A modern server replicates apps on your virtual machine to a second virtualized host server at a second site or in the cloud Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  23. 23. • Ask for a financially-backed 99.9% uptime guarantee • Ask for 24/7 support system for business-critical issues Count on the reliability of the cloud. Look for continuous data backup in globally-distributed data centers Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  24. 24. Legal firm sails through tornado with Windows Server IT at the Law Offices of Aaron I. Katsman couldn’t keep up with the firm’s growth. Slow performance and the need to frequently restart servers significantly reduced productivity. DWP Information Architects deployed Windows Server 2012, using Hyper-V to create virtual servers and desktop computers. They set up automatic backup and failover capabilities to guard against disaster. The result: During tornado, employees served customers from home – without even realizing they were using the failover system. Bepreparedfortheunexpected “Our computers are our lifeline. When tornado hit, Hyper-V Replica saved our business.” Aaron I. Katsman, Owner, Law Offices of Aaron I. Katsman Delivered uninterrupted customer service despite a natural disaster that could have impacted business continuity Increased IT agility and reduced costs with virtual servers desktops running on consolidated hardware Gained time to focus on growing the business by reducing IT hassles and improving system performance 30 employees | Law | www.katsmanlaw.com
  25. 25. ModernBiz Choose your own path to modern, with flexible, familiar, and trusted solutions for your business – desktop to mobile, server to cloud. $
  26. 26. Next steps Contact your favorite IT consultant Take a guided tours products and services to educate yourself Sign up for a free trial
  27. 27. Get Your No-Obligation Strategic Network Security Assessment and Report (Keep the Report, It’s Yours) We are a vendor to business only, so we just ask that the assessment call be for your small business of 5 -100 PCs, and up to several servers. Offer good until November 30th.
  28. 28. Denis Wilson denis@dwpia.com dwpia.com Your Microsoft Partner in San Fernando Valley, West LA, and Ventura County
  29. 29. Optimize. Reinvigorate. Profit.

×