SlideShare a Scribd company logo
1 of 25
Top Seven Features MSPs
Should Look for
in a Cloud File Sync Solution
US is the most
expensive data
breach total
average per
company
$5.4 million
81%
Employees
use at least
one
personally
owned
electronic
device
59%
Employees
use a mobile
device to run
line of business
applications
90% 1/2
Have
disabled
auto lock
for
tablets
Organizations
are fully
aware of
devices
accessing
their
networks
Companies
have
experienced
a data
breach due
to insecure
devices
34%
Store work
email
passwords and
if lost only half
would reset
their work-
related
passwords
<10%
Level Setting Mobility and Security Trends
On average
US Comprised
records
28,765
US Is the
most
expensive
data leaks cost
per record
$199
US is the most
expensive data
leaks total
average per
company
$5.4 million
Level Setting Mobility and Security Trends
37% 35% 29%Malicious
Criminal
Attach
Human
Factor
System
Glitch
Root Causes of Data Leaks
50%
40%
The Thing About Data It Has a Long Shelf Life
Employees who lost their jobs in
the last 12 months kept
confidential corporate data
Plan to use this data in their
new jobs
employees say their organization does not take steps to ensure employees do not use confidential competitive
information from third-parties
employees say it is acceptable to transfer work documents to personal computers, tablets, smartphones or
online file sharing applications. The majority never delete the data they've moved because they do not see
any harm in keeping it.
employees do not believe it is a crime to use a competitor's trade secret information; this mistaken belief
puts their current employers at risk as unwitting recipients of stolen IP
think it is acceptable to take corporate data because their company does not strictly enforce policie
employees say their manager views data protection as a business priorities
68%
62%
56%
38%
51%
Risk Assessment: Data Leaks and Mobility
Employees use a work
computer for personal
use everyday
Employees access
personal email from
business computers
Employees use a
work computer for
personal use at least
sometimes
Data Loss: Things You Haven’t Thought About
Public Cloud
Corporate Data
Traditional
File
Servers
Managed
File
Transfer
Enterprise
Content
Management
Email
Data leaks, no visibility, and no IT control
…without compromising security and control.
With
Anyone
Work
Anywhere
Across
Any
Device
With
Any
Content
1. Meet the Needs of Mobile and BYOD Users
IDC predicts, by 2015, the world's mobile
worker population will reach 1.3 billion,
representing 37.2% of the total
workforce.
2. Business-class Features
AD/LDAP authentication Fine-grained client, group,
and user permissions
2. Business-class Features
Rich file sharing and collaboration options
3. Security and Control
Encryption when
data is in transit
and “at rest” in
the cloud
Remote wipe for lost devices
or employee departures
4. Support Regulatory Compliance
HIPPA
GLBA
SOX
Business
Associate
Agreements
5. Multi-tenant Management and Monitoring
Partner
Client 1
User 1
User 2
User 3
Client 2
User 1
User 2
User 3
Client 3
User 1
User 2
User 3
6. Brandable Web Portal and Client Experience
The Web Portal
Client Software
Sample Email
7. Recurring Revenue Model, with
Attractive Gross Margins
Wholesale cost
$8
Wholesale
Cost
Un-Managed
business-class, Cloud
File Sync
$15
Wholesale
Cost
Managed, Business-
Class, Cloud File Sync
$25
Partner
Margin
Wholesale
Cost
Partner
Margin
Checklist:
Business-class
•File sync with anytime, anywhere, and any device access
•Share files and collaborate via email, URLs, team shares, and network mapped
drives
•Control access with user and group permissions and AD integration
Secure
•Complete data encryption in transit and at rest
•Sync to a petabyte-scale and proven storage cloud
•Fully HIPAA compliant, with business associate agreements
Channel-ready
•Multi-tenant management and monitoring, with PSA integration
•Brandable web portal
•Recurring revenue model, with attractive gross margin opportunities
Integration Features
Automatic Creation of Service Tickets
• Failed backups
• Disk usage notifications
• No backup notifications
Population of Back Up Statistics in ConnectWise
Management Summary Report
Automated Billing
• Online backup (total GB)
• Local backup (number of servers, number of non-servers)
• Email archiving (mailbox count)
• DoubleCheck email filtering (mailbox count)
Service Ticket
• Configure events in eFolder
that will create service
tickets in ConnectWise
• Decide the type and
severity of events which will
send you a notification
Management Summary Report Synchronization
Configure eFolder to
synchronize back up
statistics with the
ConnectWise
Management Summary
Report
Billing eFolder Services on ConnectWise
Agreements
Once you set up your
Agreement Addition in
ConnectWise for
eFolder products and
services the Total
Quantity will be
updated each month
Interested in eFolder?
www.eFolder.net
Interested in ConnectWise?
www.ConnectWise.com

More Related Content

What's hot

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
Splitty
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
Chris Hewitt
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
renaglasser
 

What's hot (20)

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
The Riskiest Industries in the Cloud
The Riskiest Industries in the CloudThe Riskiest Industries in the Cloud
The Riskiest Industries in the Cloud
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinar
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 

Similar to eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution

Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
DataExpress
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
Reece Gaumont
 

Similar to eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution (20)

FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 

More from Dropbox

eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
Dropbox
 

More from Dropbox (20)

How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
 
Setting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesSetting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 Minutes
 
eFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityeFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit Opportunity
 
eFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain ReliefeFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain Relief
 
New Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksNew Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with Playbooks
 
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
 
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinesseFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
 
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARseFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
 
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRseFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
 
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
 
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
 
eFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoeFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor Demo
 
eFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingeFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands Briefing
 
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
 
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SynceFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
 
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncFive Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectioneFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationeFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution

  • 1. Top Seven Features MSPs Should Look for in a Cloud File Sync Solution
  • 2. US is the most expensive data breach total average per company $5.4 million 81% Employees use at least one personally owned electronic device 59% Employees use a mobile device to run line of business applications 90% 1/2 Have disabled auto lock for tablets Organizations are fully aware of devices accessing their networks Companies have experienced a data breach due to insecure devices 34% Store work email passwords and if lost only half would reset their work- related passwords <10% Level Setting Mobility and Security Trends
  • 3. On average US Comprised records 28,765 US Is the most expensive data leaks cost per record $199 US is the most expensive data leaks total average per company $5.4 million Level Setting Mobility and Security Trends
  • 5. 50% 40% The Thing About Data It Has a Long Shelf Life Employees who lost their jobs in the last 12 months kept confidential corporate data Plan to use this data in their new jobs
  • 6. employees say their organization does not take steps to ensure employees do not use confidential competitive information from third-parties employees say it is acceptable to transfer work documents to personal computers, tablets, smartphones or online file sharing applications. The majority never delete the data they've moved because they do not see any harm in keeping it. employees do not believe it is a crime to use a competitor's trade secret information; this mistaken belief puts their current employers at risk as unwitting recipients of stolen IP think it is acceptable to take corporate data because their company does not strictly enforce policie employees say their manager views data protection as a business priorities 68% 62% 56% 38% 51% Risk Assessment: Data Leaks and Mobility
  • 7. Employees use a work computer for personal use everyday Employees access personal email from business computers Employees use a work computer for personal use at least sometimes Data Loss: Things You Haven’t Thought About
  • 9. …without compromising security and control. With Anyone Work Anywhere Across Any Device With Any Content
  • 10. 1. Meet the Needs of Mobile and BYOD Users IDC predicts, by 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the total workforce.
  • 11. 2. Business-class Features AD/LDAP authentication Fine-grained client, group, and user permissions
  • 12. 2. Business-class Features Rich file sharing and collaboration options
  • 13. 3. Security and Control Encryption when data is in transit and “at rest” in the cloud Remote wipe for lost devices or employee departures
  • 14. 4. Support Regulatory Compliance HIPPA GLBA SOX Business Associate Agreements
  • 15. 5. Multi-tenant Management and Monitoring Partner Client 1 User 1 User 2 User 3 Client 2 User 1 User 2 User 3 Client 3 User 1 User 2 User 3
  • 16. 6. Brandable Web Portal and Client Experience The Web Portal Client Software Sample Email
  • 17. 7. Recurring Revenue Model, with Attractive Gross Margins Wholesale cost $8 Wholesale Cost Un-Managed business-class, Cloud File Sync $15 Wholesale Cost Managed, Business- Class, Cloud File Sync $25 Partner Margin Wholesale Cost Partner Margin
  • 18.
  • 19. Checklist: Business-class •File sync with anytime, anywhere, and any device access •Share files and collaborate via email, URLs, team shares, and network mapped drives •Control access with user and group permissions and AD integration Secure •Complete data encryption in transit and at rest •Sync to a petabyte-scale and proven storage cloud •Fully HIPAA compliant, with business associate agreements Channel-ready •Multi-tenant management and monitoring, with PSA integration •Brandable web portal •Recurring revenue model, with attractive gross margin opportunities
  • 20.
  • 21. Integration Features Automatic Creation of Service Tickets • Failed backups • Disk usage notifications • No backup notifications Population of Back Up Statistics in ConnectWise Management Summary Report Automated Billing • Online backup (total GB) • Local backup (number of servers, number of non-servers) • Email archiving (mailbox count) • DoubleCheck email filtering (mailbox count)
  • 22. Service Ticket • Configure events in eFolder that will create service tickets in ConnectWise • Decide the type and severity of events which will send you a notification
  • 23. Management Summary Report Synchronization Configure eFolder to synchronize back up statistics with the ConnectWise Management Summary Report
  • 24. Billing eFolder Services on ConnectWise Agreements Once you set up your Agreement Addition in ConnectWise for eFolder products and services the Total Quantity will be updated each month
  • 25. Interested in eFolder? www.eFolder.net Interested in ConnectWise? www.ConnectWise.com

Editor's Notes

  1. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  2. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  3. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  4. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  5. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  6. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  7. Transition:ConnectWise is business automation software that helps IT service providers efficiently manage all aspects of their business. eFolder can be configured to push information about eFolder services into ConnectWise.Specifically, eFolder can be configured to automatically create service tickets in ConnectWise when a backup has failed or when disk usage reaches certain levels that you determine. eFolder can also be set up to push back up statistics into ConnectWise for reporting purposes and billing information into your agreements to streamline monthly invoicing.
  8. There is a ton of flexibility when it comes to alerts and notification events in eFolder and what’s cool is that you can get very specific with the type of event and severity of events that will trigger creation of a service ticket in ConnectWise. This allows you to make sure your techs will be taking action on specific issues and gives you visibility into issues from one location (single pane of glass).
  9. The Management Summary Report is an important tool that ConnectWise partners leverage as a deliverable to their end customers. This customer facing report combines data from different solutions that are integrated with ConnectWise to provide a snapshot of the state of the customer’s network and a summary of service delivered during a specified time period. eFolder will synchronize specific data about the backup statistics: failed and successful backup jobs.
  10. And last but not least, billing. eFolder integration with ConnectWise makes billing for these services simple and streamlined. All you have to do is set up your agreement one time, add the specific eFolder solutions you want to include on the monthly invoice and then eFolder will update the quantity each month so that your invoice is accurate and timely.