SlideShare a Scribd company logo
Coronavirus:
Enabling a Remote
Workforce & Staying
Productive
Today’s Goals
• Lessen the fear of the technology
and what you need or may
already have
• Equip you with the questions and
ideas for what do next
• Give you the knowledge of the
tools that can address your
needs
• Empower you to enable a
productive remote workforce
Things your business will need to be a
productive WFH (Work From Home) business
• Portable devices with access to
the Internet.
• Access to hardware for remote
work
• Productivity tools (Video
Conferencing, Word
Processing, Email, File Sharing,
Access to Apps)
• Mobile Management of devices
• Remote tools
• Identity Management and
Security
Portable devices
(What you need)
• Laptops, tablets, smart phones with
Internet capabilities are a must
• Most remote access is
achieved through a remote
tool of some type
• VPN, Remote Desktop,
Windows Virtual Device
or Direct Access
• Portable Devices can either
have or do not have hard
drives
Can I get the mobile
devices and if not, what?
• Most manufacturers are out of
stock or backlogged.
• We can still get hardware, but it
may need new tools to access
our work data
• We may not have our traditional
work phones at home so we
may need a soft phone
(deskless)
How do I stay productive?
• Hubs for File Sharing, Team
Communication
• Real-time communication with
Video Conferencing, Instant
Messaging
• Document Sharing/Co authoring
• Electronic email or other
messaging tools
• Voice
• Document Management/Data
Management
Mobile Management of Mobile Users and
Data
• Mobile Management simply
means having the ability to
push and pull data and
information so my users can be
more productive.
1. Pushing access to
applications on premise or
in the cloud
2. Security Policies
3. Remote Access and
Support
Identity Management and Security
• Identity Management is what
we call the “source of truth” -
this tells us:
• Which employees have
access to which files
• What applications they
can access
• What groups,
departments, etc. they can
communicate with
Identity Management Security
• Identity Protection w/Passwords
• Rights Management
• Data Loss Prevention
• Intrusion Prevention
• Data Management and centralized
storage
Identity Management Continued
• Increased load and usage from so
many people working remotely
creates potential vulnerabilities in
your network/systems.
• Hotspots or Wifi at your
home/Remote Facility
• It’s important your employees’
identities are secure and your
people and their devices are
managed.
So where do I go?
Step 2: Review your current remote access setup.
Step 1: Get all remote hardware you and your organization will need
to perform remote work
Step 3: Make sure all policies and applications are
accessible to your team and data can be accessed by
your WFH/Remote Workforce.
Step 4: Get a HUB for Collaboration and tools in place
so meetings, calls, documents storage, document
authoring, file sharing, etc. can be done easily.
Step 5: Get Mobile Devices (Laptops, Desktops, Smart
Phones, Tablets, etc.) in a place that they are secure
and data/policies can be pushed and pulled from your
remote workforce.
Creating a Remote Hub for your Workforce
Microsoft Office 365 w/Teams for
$12.50/user gives you everything you
need to work anywhere, anytime and
from any device.
Tools we can provide in a hurry
• Access to hardware from various sources.
• $50-75/user unlimited helpdesk based in San
Diego, CA.
• Microsoft Software Tools (Office 365 or Microsoft
365 for $12.50 for companies under 300 users.
• CIO Consulting (Hourly)
• Setup/Migration Services (Hourly)
Questions to Consider for Remote Support/Helpdesk
• What happens if your IT person can't get to you, WFH, can't access
your device remotely?
• How limited in skillset is one IT person versus a whole team?
• Make sure you can log information into tickets so what happened
and is happening can be captured.
• Can you call 24/7?
MANAGE &
MONITOR
Starting @ $10/user
24/7/365
Starting @ $50/user
THANK YOU
888.563.9132
Managedsolution.com
sales@managedsolution.com

More Related Content

What's hot

Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm
MarjorieAdams4
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
Community IT Innovators
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
MADS6638
MADS6638MADS6638
MADS6638
Carlos G. Gomez
 
Resume
ResumeResume
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
Joe Robens
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
Tammy Carter
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Faindra Jabbar
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
APNIC
 
Dc16 ch02
Dc16 ch02Dc16 ch02
Dc16 ch02
Maria_Khanzada
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
Amandeep Kaur
 
THE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURETHE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURE
Eyal Benedek
 
Ubiquitous Computng
Ubiquitous ComputngUbiquitous Computng
Ubiquitous Computng
Nikunj_Agrawal
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014
Stewart Paul
 

What's hot (16)

Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm8 Tips For Running A 100% Virtual Firm
8 Tips For Running A 100% Virtual Firm
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
MADS6638
MADS6638MADS6638
MADS6638
 
Resume
ResumeResume
Resume
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
4.03 it careers 2
4.03 it careers 24.03 it careers 2
4.03 it careers 2
 
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
Computer Applications- Bring Your Own Device (BYOD) Policy and Online Learnin...
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
 
Dc16 ch02
Dc16 ch02Dc16 ch02
Dc16 ch02
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
Maximize the Cloud Today
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
THE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURETHE FUTURE OF WORK - SALES BROCHURE
THE FUTURE OF WORK - SALES BROCHURE
 
Ubiquitous Computng
Ubiquitous ComputngUbiquitous Computng
Ubiquitous Computng
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014
 

Similar to How To Enable a Remote Workforce & Stay Productive

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Legal Services National Technology Assistance Project (LSNTAP)
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
LCpublicrelations
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
Symptai Consulting Limited
 
Virtual offices moving2cloud
Virtual offices moving2cloudVirtual offices moving2cloud
Virtual offices moving2cloud
501 Commons
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
MobileWorxs
 
Technology
TechnologyTechnology
Technology
Deborah Oronzio
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
Damir Delija
 

Similar to How To Enable a Remote Workforce & Stay Productive (20)

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Virtual offices moving2cloud
Virtual offices moving2cloudVirtual offices moving2cloud
Virtual offices moving2cloud
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Technology
TechnologyTechnology
Technology
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 

Recently uploaded

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 

Recently uploaded (20)

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 

How To Enable a Remote Workforce & Stay Productive

  • 2. Today’s Goals • Lessen the fear of the technology and what you need or may already have • Equip you with the questions and ideas for what do next • Give you the knowledge of the tools that can address your needs • Empower you to enable a productive remote workforce
  • 3. Things your business will need to be a productive WFH (Work From Home) business • Portable devices with access to the Internet. • Access to hardware for remote work • Productivity tools (Video Conferencing, Word Processing, Email, File Sharing, Access to Apps) • Mobile Management of devices • Remote tools • Identity Management and Security
  • 4. Portable devices (What you need) • Laptops, tablets, smart phones with Internet capabilities are a must • Most remote access is achieved through a remote tool of some type • VPN, Remote Desktop, Windows Virtual Device or Direct Access • Portable Devices can either have or do not have hard drives
  • 5. Can I get the mobile devices and if not, what? • Most manufacturers are out of stock or backlogged. • We can still get hardware, but it may need new tools to access our work data • We may not have our traditional work phones at home so we may need a soft phone (deskless)
  • 6. How do I stay productive? • Hubs for File Sharing, Team Communication • Real-time communication with Video Conferencing, Instant Messaging • Document Sharing/Co authoring • Electronic email or other messaging tools • Voice • Document Management/Data Management
  • 7. Mobile Management of Mobile Users and Data • Mobile Management simply means having the ability to push and pull data and information so my users can be more productive. 1. Pushing access to applications on premise or in the cloud 2. Security Policies 3. Remote Access and Support
  • 8. Identity Management and Security • Identity Management is what we call the “source of truth” - this tells us: • Which employees have access to which files • What applications they can access • What groups, departments, etc. they can communicate with Identity Management Security • Identity Protection w/Passwords • Rights Management • Data Loss Prevention • Intrusion Prevention • Data Management and centralized storage
  • 9. Identity Management Continued • Increased load and usage from so many people working remotely creates potential vulnerabilities in your network/systems. • Hotspots or Wifi at your home/Remote Facility • It’s important your employees’ identities are secure and your people and their devices are managed.
  • 10. So where do I go? Step 2: Review your current remote access setup. Step 1: Get all remote hardware you and your organization will need to perform remote work Step 3: Make sure all policies and applications are accessible to your team and data can be accessed by your WFH/Remote Workforce. Step 4: Get a HUB for Collaboration and tools in place so meetings, calls, documents storage, document authoring, file sharing, etc. can be done easily. Step 5: Get Mobile Devices (Laptops, Desktops, Smart Phones, Tablets, etc.) in a place that they are secure and data/policies can be pushed and pulled from your remote workforce.
  • 11. Creating a Remote Hub for your Workforce Microsoft Office 365 w/Teams for $12.50/user gives you everything you need to work anywhere, anytime and from any device.
  • 12. Tools we can provide in a hurry • Access to hardware from various sources. • $50-75/user unlimited helpdesk based in San Diego, CA. • Microsoft Software Tools (Office 365 or Microsoft 365 for $12.50 for companies under 300 users. • CIO Consulting (Hourly) • Setup/Migration Services (Hourly)
  • 13. Questions to Consider for Remote Support/Helpdesk • What happens if your IT person can't get to you, WFH, can't access your device remotely? • How limited in skillset is one IT person versus a whole team? • Make sure you can log information into tickets so what happened and is happening can be captured. • Can you call 24/7?
  • 14. MANAGE & MONITOR Starting @ $10/user 24/7/365 Starting @ $50/user