SlideShare a Scribd company logo
© 2015 N-able Technologies, Inc. All rights reserved. 1
Coffee Talk:
How secure are
your customers?
Webinar starting shortly
© 2015 N-able Technologies, Inc. All rights reserved. 2
Coffee Talk:
How secure are
your customers?
© 2015 N-able Technologies, Inc. All rights reserved. 3
Bryan Zimmerman
Product Manager
Presented by
© 2015 N-able Technologies, Inc. All rights reserved. 4
Webinar details
? REC
Length: 30min Questions
welcome any time
Recording and
slides available
next day
© 2015 N-able Technologies, Inc. All rights reserved. 5
Agenda
Protection strategies
Security threats
Security trends
© 2015 N-able Technologies, Inc. All rights reserved. 6
SecurityTrends
© 2015 N-able Technologies, Inc. All rights reserved.
© 2015 N-able Technologies, Inc. All rights reserved. 7
Major Security Breaches
(20 Mn or more records stolen)
1. “World’s Biggest Data Hacks”, Access 22 Oct 2014.
Available at: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
© 2015 N-able Technologies, Inc. All rights reserved. 8
Top 5 Operating Systems Market Share
1. Operating System Market Share, by W3Counter. Available at:
http://www.w3counter.com/globalstats.php?year=2014&month=9
© 2015 N-able Technologies, Inc. All rights reserved. 9
Windows 8 vs Windows 7
1. “Windows 7 Licenses sold worldwide to 2012”, Statista, Accessed: 24 November 2014, Available at:
http://www.statista.com/statistics/273490/global-amount-of-licenses-sold-of-windows-7/
2. “After 15 months, Windows 8 has sold 100 million fewer copies than Windows 7 did”, Emil Protalinski, Published 13 February
2014. Accessed: 24 Nov, 2014. Available at: http://thenextweb.com/microsoft/2014/02/13/15-months-windows-8-sold-100-
million-fewer-copies-windows-7/
0
200
400
600
800
Dec '09 Dec '10 Dec '11 Dec '12
Win 7 Licenses Sold (in
millions)1
20 Mn copies per month on
average
2
© 2015 N-able Technologies, Inc. All rights reserved. 10
Vulnerabilities by operating system version
1. “The Secunia Vulnerabilty Review 2014” by Secunia. Available at: http://secunia.com/resources/reports/vr2014/
© 2015 N-able Technologies, Inc. All rights reserved. 11
Web Browser Market Share
1. Web Browser Market Share, by W3Counter. Available at:
http://www.w3counter.com/globalstats.php?year=2014&month=9
© 2015 N-able Technologies, Inc. All rights reserved. 12
Vulnerabilities across top 5 browsers
1. “The Secunia Vulnerabilty Review 2014” by Secunia. Available at: http://secunia.com/resources/reports/vr2014/
© 2015 N-able Technologies, Inc. All rights reserved. 13
Security Threats Facing
Your Customers
© 2015 N-able Technologies, Inc. All rights reserved. 14
Data Breaches
When is your data vulnerable?
© 2015 N-able Technologies, Inc. All rights reserved. 15
“More than 50% of American adults
had their personal information
exposed to hackers last year alone”
Source: The New York Times, “How Many Times Has Your Personal Information Been Exposed to Hackers”. Accessed July 29, 2015, Available at:
http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?smid=fb-nytimes&smtyp=cur&_r=1
© 2015 N-able Technologies, Inc. All rights reserved. 16
Do you have an account with
these companies?
© 2015 N-able Technologies, Inc. All rights reserved. 17
Do you have healthcare from
any of these companies?
© 2015 N-able Technologies, Inc. All rights reserved. 18
Do you have a credit or debit card
with these companies?
© 2015 N-able Technologies, Inc. All rights reserved. 19
Any information you have online
could be subject to a data breach.
© 2015 N-able Technologies, Inc. All rights reserved. 20
Jeep hack test
Source: WIRED, “Hackers remotely kill a jeep on the highway – With me in it”.
Accessed July 29, 2015, Available at: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
© 2015 N-able Technologies, Inc. All rights reserved. 21
Personal Data
Educate people but it’s
their choice
Business Data
Have procedures that
limit data exposure
© 2015 N-able Technologies, Inc. All rights reserved. 22
What is the best
protection strategy?
© 2015 N-able Technologies, Inc. All rights reserved. 23
Managed Endpoint Protection
Protect against security threats
• Automatically protect new
devices as they are added
to the network
• Latest technology against
the latest threats
• Recover lost data
• Ensure backups complete
• Save on storage for images
Managed Backup
Recover lost data
© 2015 N-able Technologies, Inc. All rights reserved. 24
n-able.com/av n-able.com/backup
Want to learn more?
© 2015 N-able Technologies, Inc. All rights reserved. 25
The SolarWinds N-able difference
All-in-one RMM platform
Endpoint protection
Drag and drop automation
Business reporting
Comprehensive support
Technical onboarding
Business strategies
Marketing resources
www.n-able.com/try
© 2015 N-able Technologies, Inc. All rights reserved. 26
Thank you
© 2015 N-able Technologies, Inc. All rights reserved. 27
The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able
Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark
Office and the Canadian Intellectual Property Office, and may be registered or pending
registration in other countries. All other N-able trademarks, service marks, and logos may
be common law marks, registered or pending registration in the United States, Canada, or
in other countries. All other trademarks mentioned herein are used for identification
purposes only and may be or are trademarks or registered trademarks of their respective
companies.

More Related Content

What's hot

Fastest Path to Supplier Enablement
Fastest Path to Supplier Enablement Fastest Path to Supplier Enablement
Fastest Path to Supplier Enablement
Coupa Software
 
Everything you should know before launching a Lean IT initiative by Marie-Pia...
Everything you should know before launching a Lean IT initiative by Marie-Pia...Everything you should know before launching a Lean IT initiative by Marie-Pia...
Everything you should know before launching a Lean IT initiative by Marie-Pia...
Institut Lean France
 
7 Keys to MSP Success
7 Keys to MSP Success7 Keys to MSP Success
7 Keys to MSP Success
Solarwinds N-able
 
A 6 year Lean IT adventure in BNL by Silvia Cespa
A 6 year Lean IT adventure in BNL by Silvia CespaA 6 year Lean IT adventure in BNL by Silvia Cespa
A 6 year Lean IT adventure in BNL by Silvia Cespa
Institut Lean France
 
Innately: Custom Apps, Reinvented
Innately: Custom Apps, ReinventedInnately: Custom Apps, Reinvented
Innately: Custom Apps, Reinvented
Leah Watters
 
The Benefits of Platinum Support
The Benefits of Platinum SupportThe Benefits of Platinum Support
The Benefits of Platinum Support
Ignite Technologies
 
Unlimited IT Support
Unlimited IT SupportUnlimited IT Support
Unlimited IT Support
bso_admin
 
Measuring Customer-Centric Mobile Banking & Beyond
Measuring Customer-Centric Mobile Banking & BeyondMeasuring Customer-Centric Mobile Banking & Beyond
Measuring Customer-Centric Mobile Banking & Beyond
Dynatrace
 
Odoo Experience 2018 - Vision & Strategy for 2019
Odoo Experience 2018 - Vision & Strategy for 2019 Odoo Experience 2018 - Vision & Strategy for 2019
Odoo Experience 2018 - Vision & Strategy for 2019
ElínAnna Jónasdóttir
 
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
ElínAnna Jónasdóttir
 
Improving Efficiency and Profitability in Manufacturing
Improving Efficiency and Profitability in ManufacturingImproving Efficiency and Profitability in Manufacturing
Improving Efficiency and Profitability in Manufacturing
Barnaba Accardi
 
Odoo Implementation Methodology
Odoo Implementation MethodologyOdoo Implementation Methodology
Odoo Implementation Methodology
Odoo
 
Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365
United Technology Group (UTG)
 
Motega Company Overview
Motega Company OverviewMotega Company Overview
Motega Company Overview
Michael Saner
 
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
betabeers
 
How to find the right managed IT provider
How to find the right managed IT providerHow to find the right managed IT provider
How to find the right managed IT provider
Simon Golding
 
Comparison between ERP Systems: Bitrix24 vs Odoo
Comparison between ERP Systems: Bitrix24 vs OdooComparison between ERP Systems: Bitrix24 vs Odoo
Comparison between ERP Systems: Bitrix24 vs Odoo
Bhanu Arora
 
Fund Expert Product presentation
Fund Expert Product presentationFund Expert Product presentation
Fund Expert Product presentation
Traders Cockpit
 
Build your dream sales team part 2: the sales process
Build your dream sales team part 2:  the sales processBuild your dream sales team part 2:  the sales process
Build your dream sales team part 2: the sales process
Solarwinds N-able
 

What's hot (20)

Fastest Path to Supplier Enablement
Fastest Path to Supplier Enablement Fastest Path to Supplier Enablement
Fastest Path to Supplier Enablement
 
Everything you should know before launching a Lean IT initiative by Marie-Pia...
Everything you should know before launching a Lean IT initiative by Marie-Pia...Everything you should know before launching a Lean IT initiative by Marie-Pia...
Everything you should know before launching a Lean IT initiative by Marie-Pia...
 
7 Keys to MSP Success
7 Keys to MSP Success7 Keys to MSP Success
7 Keys to MSP Success
 
A 6 year Lean IT adventure in BNL by Silvia Cespa
A 6 year Lean IT adventure in BNL by Silvia CespaA 6 year Lean IT adventure in BNL by Silvia Cespa
A 6 year Lean IT adventure in BNL by Silvia Cespa
 
Innately: Custom Apps, Reinvented
Innately: Custom Apps, ReinventedInnately: Custom Apps, Reinvented
Innately: Custom Apps, Reinvented
 
The Benefits of Platinum Support
The Benefits of Platinum SupportThe Benefits of Platinum Support
The Benefits of Platinum Support
 
Unlimited IT Support
Unlimited IT SupportUnlimited IT Support
Unlimited IT Support
 
Measuring Customer-Centric Mobile Banking & Beyond
Measuring Customer-Centric Mobile Banking & BeyondMeasuring Customer-Centric Mobile Banking & Beyond
Measuring Customer-Centric Mobile Banking & Beyond
 
Odoo Experience 2018 - Vision & Strategy for 2019
Odoo Experience 2018 - Vision & Strategy for 2019 Odoo Experience 2018 - Vision & Strategy for 2019
Odoo Experience 2018 - Vision & Strategy for 2019
 
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
Odoo Experience 2018 - QuickStart 2.0: How to Guarantee Your Odoo Implementat...
 
Improving Efficiency and Profitability in Manufacturing
Improving Efficiency and Profitability in ManufacturingImproving Efficiency and Profitability in Manufacturing
Improving Efficiency and Profitability in Manufacturing
 
Odoo Implementation Methodology
Odoo Implementation MethodologyOdoo Implementation Methodology
Odoo Implementation Methodology
 
Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365Making Sense of the Cloud w/ Office 365
Making Sense of the Cloud w/ Office 365
 
Motega Company Overview
Motega Company OverviewMotega Company Overview
Motega Company Overview
 
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
Dev ops.continuous delivery - Ibon Landa (Plain Concepts)
 
Innovee profile (Aaron)
Innovee profile (Aaron)Innovee profile (Aaron)
Innovee profile (Aaron)
 
How to find the right managed IT provider
How to find the right managed IT providerHow to find the right managed IT provider
How to find the right managed IT provider
 
Comparison between ERP Systems: Bitrix24 vs Odoo
Comparison between ERP Systems: Bitrix24 vs OdooComparison between ERP Systems: Bitrix24 vs Odoo
Comparison between ERP Systems: Bitrix24 vs Odoo
 
Fund Expert Product presentation
Fund Expert Product presentationFund Expert Product presentation
Fund Expert Product presentation
 
Build your dream sales team part 2: the sales process
Build your dream sales team part 2:  the sales processBuild your dream sales team part 2:  the sales process
Build your dream sales team part 2: the sales process
 

Viewers also liked

Introduction to Mahara
Introduction to MaharaIntroduction to Mahara
Introduction to Mahara
Ron Grimes
 
Allison miller creatingnyour own eportfolio using mahara
Allison miller  creatingnyour own eportfolio using maharaAllison miller  creatingnyour own eportfolio using mahara
Allison miller creatingnyour own eportfolio using mahara
ePortfolios Australia
 
How to succeed in the cloud
How to succeed in the cloudHow to succeed in the cloud
How to succeed in the cloud
Spiceworks Ziff Davis
 
The Story of Mahara: An ePortfolio for Moodle
The Story of Mahara: An ePortfolio for MoodleThe Story of Mahara: An ePortfolio for Moodle
The Story of Mahara: An ePortfolio for Moodle
Mark Brown
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
Dropbox
 
SFIA And Mahara
SFIA And MaharaSFIA And Mahara
SFIA And Mahara
ePortfolios Australia
 
SFIA & High Performance Workforce
SFIA & High Performance WorkforceSFIA & High Performance Workforce
SFIA & High Performance Workforce
it-workforce.com
 
Introduction to Scrum.ppt
Introduction to Scrum.pptIntroduction to Scrum.ppt
Introduction to Scrum.pptMohan Late
 

Viewers also liked (9)

Introduction to Mahara
Introduction to MaharaIntroduction to Mahara
Introduction to Mahara
 
Allison miller creatingnyour own eportfolio using mahara
Allison miller  creatingnyour own eportfolio using maharaAllison miller  creatingnyour own eportfolio using mahara
Allison miller creatingnyour own eportfolio using mahara
 
How to succeed in the cloud
How to succeed in the cloudHow to succeed in the cloud
How to succeed in the cloud
 
The Story of Mahara: An ePortfolio for Moodle
The Story of Mahara: An ePortfolio for MoodleThe Story of Mahara: An ePortfolio for Moodle
The Story of Mahara: An ePortfolio for Moodle
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
 
ePortfolios and Mahara
ePortfolios and MaharaePortfolios and Mahara
ePortfolios and Mahara
 
SFIA And Mahara
SFIA And MaharaSFIA And Mahara
SFIA And Mahara
 
SFIA & High Performance Workforce
SFIA & High Performance WorkforceSFIA & High Performance Workforce
SFIA & High Performance Workforce
 
Introduction to Scrum.ppt
Introduction to Scrum.pptIntroduction to Scrum.ppt
Introduction to Scrum.ppt
 

Similar to How secure are your customers.pptx

MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
Rocket Software
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
Solarwinds N-able
 
Audit Manager -- Compliance made easy
Audit Manager -- Compliance made easyAudit Manager -- Compliance made easy
Audit Manager -- Compliance made easy
Solarwinds N-able
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
John Palfreyman
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
DLT Solutions
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
John Palfreyman
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Cyren, Inc
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
John Palfreyman
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic
BHD Creative Ltd
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
North Texas Chapter of the ISSA
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
poore120
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
SolarWinds
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
Cloudera, Inc.
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
 

Similar to How secure are your customers.pptx (20)

MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
Audit Manager -- Compliance made easy
Audit Manager -- Compliance made easyAudit Manager -- Compliance made easy
Audit Manager -- Compliance made easy
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 

More from Solarwinds N-able

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
Solarwinds N-able
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
Solarwinds N-able
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
Solarwinds N-able
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
Solarwinds N-able
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
Solarwinds N-able
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
Solarwinds N-able
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
Solarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
Solarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
Solarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
Solarwinds N-able
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
Solarwinds N-able
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reporting
Solarwinds N-able
 
Rmm101 server management
Rmm101 server managementRmm101 server management
Rmm101 server management
Solarwinds N-able
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation Management
Solarwinds N-able
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing Headcount
Solarwinds N-able
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and Recovery
Solarwinds N-able
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
Solarwinds N-able
 
The Office 365 Opportunity. Is it right for MSPs?
The Office 365 Opportunity. Is it right for MSPs?The Office 365 Opportunity. Is it right for MSPs?
The Office 365 Opportunity. Is it right for MSPs?
Solarwinds N-able
 

More from Solarwinds N-able (20)

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
RMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reportingRMM 101 part 3 -- analysis and reporting
RMM 101 part 3 -- analysis and reporting
 
Rmm101 server management
Rmm101 server managementRmm101 server management
Rmm101 server management
 
RMM 101 -- Workstation Management
RMM 101 -- Workstation ManagementRMM 101 -- Workstation Management
RMM 101 -- Workstation Management
 
Automation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing HeadcountAutomation -- Increase Your Customers Without Increasing Headcount
Automation -- Increase Your Customers Without Increasing Headcount
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and Recovery
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
The Office 365 Opportunity. Is it right for MSPs?
The Office 365 Opportunity. Is it right for MSPs?The Office 365 Opportunity. Is it right for MSPs?
The Office 365 Opportunity. Is it right for MSPs?
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

How secure are your customers.pptx

  • 1. © 2015 N-able Technologies, Inc. All rights reserved. 1 Coffee Talk: How secure are your customers? Webinar starting shortly
  • 2. © 2015 N-able Technologies, Inc. All rights reserved. 2 Coffee Talk: How secure are your customers?
  • 3. © 2015 N-able Technologies, Inc. All rights reserved. 3 Bryan Zimmerman Product Manager Presented by
  • 4. © 2015 N-able Technologies, Inc. All rights reserved. 4 Webinar details ? REC Length: 30min Questions welcome any time Recording and slides available next day
  • 5. © 2015 N-able Technologies, Inc. All rights reserved. 5 Agenda Protection strategies Security threats Security trends
  • 6. © 2015 N-able Technologies, Inc. All rights reserved. 6 SecurityTrends © 2015 N-able Technologies, Inc. All rights reserved.
  • 7. © 2015 N-able Technologies, Inc. All rights reserved. 7 Major Security Breaches (20 Mn or more records stolen) 1. “World’s Biggest Data Hacks”, Access 22 Oct 2014. Available at: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 8. © 2015 N-able Technologies, Inc. All rights reserved. 8 Top 5 Operating Systems Market Share 1. Operating System Market Share, by W3Counter. Available at: http://www.w3counter.com/globalstats.php?year=2014&month=9
  • 9. © 2015 N-able Technologies, Inc. All rights reserved. 9 Windows 8 vs Windows 7 1. “Windows 7 Licenses sold worldwide to 2012”, Statista, Accessed: 24 November 2014, Available at: http://www.statista.com/statistics/273490/global-amount-of-licenses-sold-of-windows-7/ 2. “After 15 months, Windows 8 has sold 100 million fewer copies than Windows 7 did”, Emil Protalinski, Published 13 February 2014. Accessed: 24 Nov, 2014. Available at: http://thenextweb.com/microsoft/2014/02/13/15-months-windows-8-sold-100- million-fewer-copies-windows-7/ 0 200 400 600 800 Dec '09 Dec '10 Dec '11 Dec '12 Win 7 Licenses Sold (in millions)1 20 Mn copies per month on average 2
  • 10. © 2015 N-able Technologies, Inc. All rights reserved. 10 Vulnerabilities by operating system version 1. “The Secunia Vulnerabilty Review 2014” by Secunia. Available at: http://secunia.com/resources/reports/vr2014/
  • 11. © 2015 N-able Technologies, Inc. All rights reserved. 11 Web Browser Market Share 1. Web Browser Market Share, by W3Counter. Available at: http://www.w3counter.com/globalstats.php?year=2014&month=9
  • 12. © 2015 N-able Technologies, Inc. All rights reserved. 12 Vulnerabilities across top 5 browsers 1. “The Secunia Vulnerabilty Review 2014” by Secunia. Available at: http://secunia.com/resources/reports/vr2014/
  • 13. © 2015 N-able Technologies, Inc. All rights reserved. 13 Security Threats Facing Your Customers
  • 14. © 2015 N-able Technologies, Inc. All rights reserved. 14 Data Breaches When is your data vulnerable?
  • 15. © 2015 N-able Technologies, Inc. All rights reserved. 15 “More than 50% of American adults had their personal information exposed to hackers last year alone” Source: The New York Times, “How Many Times Has Your Personal Information Been Exposed to Hackers”. Accessed July 29, 2015, Available at: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?smid=fb-nytimes&smtyp=cur&_r=1
  • 16. © 2015 N-able Technologies, Inc. All rights reserved. 16 Do you have an account with these companies?
  • 17. © 2015 N-able Technologies, Inc. All rights reserved. 17 Do you have healthcare from any of these companies?
  • 18. © 2015 N-able Technologies, Inc. All rights reserved. 18 Do you have a credit or debit card with these companies?
  • 19. © 2015 N-able Technologies, Inc. All rights reserved. 19 Any information you have online could be subject to a data breach.
  • 20. © 2015 N-able Technologies, Inc. All rights reserved. 20 Jeep hack test Source: WIRED, “Hackers remotely kill a jeep on the highway – With me in it”. Accessed July 29, 2015, Available at: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  • 21. © 2015 N-able Technologies, Inc. All rights reserved. 21 Personal Data Educate people but it’s their choice Business Data Have procedures that limit data exposure
  • 22. © 2015 N-able Technologies, Inc. All rights reserved. 22 What is the best protection strategy?
  • 23. © 2015 N-able Technologies, Inc. All rights reserved. 23 Managed Endpoint Protection Protect against security threats • Automatically protect new devices as they are added to the network • Latest technology against the latest threats • Recover lost data • Ensure backups complete • Save on storage for images Managed Backup Recover lost data
  • 24. © 2015 N-able Technologies, Inc. All rights reserved. 24 n-able.com/av n-able.com/backup Want to learn more?
  • 25. © 2015 N-able Technologies, Inc. All rights reserved. 25 The SolarWinds N-able difference All-in-one RMM platform Endpoint protection Drag and drop automation Business reporting Comprehensive support Technical onboarding Business strategies Marketing resources www.n-able.com/try
  • 26. © 2015 N-able Technologies, Inc. All rights reserved. 26 Thank you
  • 27. © 2015 N-able Technologies, Inc. All rights reserved. 27 The N-ABLE TECHNOLOGIES and N-CENTRAL marks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies.