SlideShare a Scribd company logo
1
www.linesystems.com VOICE l DATA l CLOUD
Welcome!
LSI Spring Agent Open House
May 8, 2014
2
www.linesystems.com VOICE l DATA l CLOUD
Thank you!
3
May 29
Diving Into The Cloud Webinar Series
www.linesystems.com VOICE l DATA l CLOUD
“Show Me The Money!”
Is Cloud Computing Really Cost
Effective?
#DIVINGINTOTHECLOUD
Part 1: 6 Most Commonly Asked Questions About The Cloud
Part 2: Public, Private, or Hybrid Cloud – Which is Right For You?
Part 3: The “As a Service” Trend: Explained & Compared
Part 4: 5 Tips to Keep Your Data Secure on the Cloud
4
www.linesystems.com VOICE l DATA l CLOUD
NEW Agent Portal
Survey Results: Ranking
#1: Pricing & Quote Generation
#2: Pre-Qualification
#3: Client Activity
#4: Commission Integration
#5: Marketing Collateral
#6: Agent Documents
#7: Product Training Material
#8: Sales Activity Reporting/Dashboards
#9: Contact Us, Escalation List, Chat Features
#10: Social Media Integration
5
www.linesystems.com VOICE l DATA l CLOUD
Q2 Promotions
Contact your LSI Channel Manager
for more information
6
Eric Brunswick, Channel Account Executive
Pennsylvania
Sophos
Security made Simple
7
Agenda
• How Sophos solves Security Problems “Simply”
• How to find a Security Project
88
About Sophos
9
“Complex solutions aren’t solutions. We
make security for the real world – for the
pragmatic enterprise. Simple security is
better security.”
Kris Hagerman, CEO Sophos
1010
The IT Security
Challenge
11
Threat Volume
0
10,000,000
20,000,000
30,000,000
40,000,000
50,000,000
60,000,000
70,000,000
80,000,000
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
Total
Malware
250,000
previously unseen
files received each
day within
SophosLabs
Source: SophosLabs 2013
12
Web Servers Are Under Constant Attack
Every 2 Seconds Another New Malicious URL Appears
30,000
malicious URLs seen
each day. This is almost
a new malicious URL
every 2 seconds
80%
of malicious URLs are
actually legitimate
sites that have been
compromised
Source: SophosLabs 2013
13
Professionalism, Crimeware
“Monetization”: Bulk of Threats Are Automated, Coordinated & Professional
50% 75% 88%
Welcome to the Age of Personalized Malware
50% of our detections
are based on only 19
malware identities.
75% of unique pieces of
malware are targeted
attacks (i.e., are not
seen beyond the
organization targeted).
88% of malware found
in fewer than 10 other
organizations.
Source: SophosLabs 2013
14
14
Anyonecandevelopmalware
15
IT Challenges
20%
23%
32%
37%
44%
48%
0% 10% 20% 30% 40% 50% 60%
Maintaining security and compliance
Lack of people/resources to do
everything that is being asked
Finding enough budget to refresh
hardware and end point devices
Application/OS patching and updates
Supporting a wide range of devices
Managing users across
remote locations
% of respondents who answered 1 or 2
What are the biggest challenges your IT organization faces in managing end users?
Ranked in order with 1 being the biggest challenge
Source: Spiceworks Community Survey
16
Smaller Enterprises Lack IT Security Staff
Average Number of People in Organization Dedicated to IT Security
0 1
3
8
50
0
10
20
30
40
50
60
100-499
Employees
500-999
Employees
1000-4,999
Employees
5000-19,999
Employees
20,000+
Employees
50% of IT Security Spend
Challenged by Complexity
Limited by Resources
17
Complicated by Security Challenges
Corporate
Owned and
BYOD
Protect My
Data
Go Wireless
Users Are
Everywhere
What About
Securing My
Servers?
Can’t Control
Users via
Brute Force
Downtime
Unacceptable
“Console
Proliferation”
& “Agent
Pollution”
Transition to
the Cloud
Regulations &
Compliance
Help Desk
Queries
New Attack
Surfaces
(Android, iOS)
250,000 New
Threats Will
Appear Today
Polymorphic
Threats Affect
Everyone
Macs Are No
Longer
Immune
Not Just A “Big
Company”
Problem
IT Systems Are
The Lifeblood
for Any Size Org
1818
How Sophos Helps
19
Complete
Security
Deployed How
You Want
Made Simple
Wherever the user is,
whatever device they use
On premise, as a service or
as a hardware or virtual
appliance
Easy setup, managed via
Cloud, etc.
Complete Security Can Be Made Simple
20
Complete Security, Made Simple
Complete Security…
Made Simple.
Network DevicesServers
Simple Deployment Simple Protection Simple Management
• On premise
• Virtual
• Cloud
• User self provision
• Active Protection – real-time
protection powered by SophosLabs
• Live lookups via the Cloud
• SophosLabs experts tune the
protection so you don’t have to
Next Gen
Firewall
Anti-
malware
and IPS
URL
Filtering
Network
Access Control
Wireless VPN Anti-Spam Email
Encryption
Anti-
Malware
Mobile Encryption Patch
Assessment
Application
Control
Device
Control
Encryption
for Cloud
Endpoint Web
Protection
Anti-Malware
Webserver
Protection
Virtualization
Intuitive consoles:
On Premise or
From the Cloud
Backed by expert support
21
• Do your end-users have mobile devices? How many users, how many
devices?
• What are you using today for Endpoint and MDMD? How is it licensed?
What is it costing you over 3 years?
• Wouldn’t it make sense to just pay once for all platforms and devices?
• Wouldn’t it make sense to get all the protection you need for Windows,
Macs, phones and tablets in one license?
• Wouldn’t it be great if you didn’t have to count devices?
• Wouldn’t it be great to get it all from one vendor with support specifically
focused on business?
22
www.linesystems.com VOICE l DATA l CLOUD
Questions?
23
www.linesystems.com VOICE l DATA l CLOUD
Thank you!

More Related Content

What's hot

apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
Zscaler
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
Zscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Symantec
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
Darryl Santa
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Management Associates
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
Zscaler
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
Zscaler
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
Zscaler
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
Appsecco
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
Zscaler
 

What's hot (20)

apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 

Viewers also liked

Lsi Nytro Flash 101 May 2012
Lsi Nytro Flash 101 May 2012Lsi Nytro Flash 101 May 2012
Lsi Nytro Flash 101 May 2012
Kent Abendroth LSI Nytro VAR channel manager
 
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...Emulex Corporation
 
tempdb and Performance Keys
tempdb and Performance Keystempdb and Performance Keys
tempdb and Performance Keys
Naji El Kotob
 
Microsoft SQL Server Flash Storage
Microsoft SQL Server Flash StorageMicrosoft SQL Server Flash Storage
Microsoft SQL Server Flash Storage
Mark Ginnebaugh
 
San Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetingsSan Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetings
Mark Ginnebaugh
 
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Kent Abendroth LSI Nytro VAR channel manager
 
Which Flash is Best for MS-SQL?
Which Flash is Best for MS-SQL?Which Flash is Best for MS-SQL?
Which Flash is Best for MS-SQL?
Storage Switzerland
 
SQL High Availability solutions E Book
SQL High Availability solutions E BookSQL High Availability solutions E Book
SQL High Availability solutions E Book
Kesavan Munuswamy
 
Application_Benchmark_into_Virtualization
Application_Benchmark_into_VirtualizationApplication_Benchmark_into_Virtualization
Application_Benchmark_into_VirtualizationKhai Le
 
Geek Sync | Guide to Understanding and Monitoring Tempdb
Geek Sync | Guide to Understanding and Monitoring TempdbGeek Sync | Guide to Understanding and Monitoring Tempdb
Geek Sync | Guide to Understanding and Monitoring Tempdb
IDERA Software
 

Viewers also liked (10)

Lsi Nytro Flash 101 May 2012
Lsi Nytro Flash 101 May 2012Lsi Nytro Flash 101 May 2012
Lsi Nytro Flash 101 May 2012
 
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
 
tempdb and Performance Keys
tempdb and Performance Keystempdb and Performance Keys
tempdb and Performance Keys
 
Microsoft SQL Server Flash Storage
Microsoft SQL Server Flash StorageMicrosoft SQL Server Flash Storage
Microsoft SQL Server Flash Storage
 
San Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetingsSan Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetings
 
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
 
Which Flash is Best for MS-SQL?
Which Flash is Best for MS-SQL?Which Flash is Best for MS-SQL?
Which Flash is Best for MS-SQL?
 
SQL High Availability solutions E Book
SQL High Availability solutions E BookSQL High Availability solutions E Book
SQL High Availability solutions E Book
 
Application_Benchmark_into_Virtualization
Application_Benchmark_into_VirtualizationApplication_Benchmark_into_Virtualization
Application_Benchmark_into_Virtualization
 
Geek Sync | Guide to Understanding and Monitoring Tempdb
Geek Sync | Guide to Understanding and Monitoring TempdbGeek Sync | Guide to Understanding and Monitoring Tempdb
Geek Sync | Guide to Understanding and Monitoring Tempdb
 

Similar to LSI Spring Agent Open House 2014

Raising the Bar on End User Monitoring
Raising the Bar on End User MonitoringRaising the Bar on End User Monitoring
Raising the Bar on End User Monitoring
ThousandEyes
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
Sophos Benelux
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Bill Burns
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
WeDo Technologies
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
centralohioissa
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
Softchoice Corporation
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
Priyanka Aash
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
Asociación de Marketing Bancario Argentino
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
Peter Coffee
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
Marco Antonio Agnese
 

Similar to LSI Spring Agent Open House 2014 (20)

Raising the Bar on End User Monitoring
Raising the Bar on End User MonitoringRaising the Bar on End User Monitoring
Raising the Bar on End User Monitoring
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

LSI Spring Agent Open House 2014

  • 1. 1 www.linesystems.com VOICE l DATA l CLOUD Welcome! LSI Spring Agent Open House May 8, 2014
  • 2. 2 www.linesystems.com VOICE l DATA l CLOUD Thank you!
  • 3. 3 May 29 Diving Into The Cloud Webinar Series www.linesystems.com VOICE l DATA l CLOUD “Show Me The Money!” Is Cloud Computing Really Cost Effective? #DIVINGINTOTHECLOUD Part 1: 6 Most Commonly Asked Questions About The Cloud Part 2: Public, Private, or Hybrid Cloud – Which is Right For You? Part 3: The “As a Service” Trend: Explained & Compared Part 4: 5 Tips to Keep Your Data Secure on the Cloud
  • 4. 4 www.linesystems.com VOICE l DATA l CLOUD NEW Agent Portal Survey Results: Ranking #1: Pricing & Quote Generation #2: Pre-Qualification #3: Client Activity #4: Commission Integration #5: Marketing Collateral #6: Agent Documents #7: Product Training Material #8: Sales Activity Reporting/Dashboards #9: Contact Us, Escalation List, Chat Features #10: Social Media Integration
  • 5. 5 www.linesystems.com VOICE l DATA l CLOUD Q2 Promotions Contact your LSI Channel Manager for more information
  • 6. 6 Eric Brunswick, Channel Account Executive Pennsylvania Sophos Security made Simple
  • 7. 7 Agenda • How Sophos solves Security Problems “Simply” • How to find a Security Project
  • 9. 9 “Complex solutions aren’t solutions. We make security for the real world – for the pragmatic enterprise. Simple security is better security.” Kris Hagerman, CEO Sophos
  • 12. 12 Web Servers Are Under Constant Attack Every 2 Seconds Another New Malicious URL Appears 30,000 malicious URLs seen each day. This is almost a new malicious URL every 2 seconds 80% of malicious URLs are actually legitimate sites that have been compromised Source: SophosLabs 2013
  • 13. 13 Professionalism, Crimeware “Monetization”: Bulk of Threats Are Automated, Coordinated & Professional 50% 75% 88% Welcome to the Age of Personalized Malware 50% of our detections are based on only 19 malware identities. 75% of unique pieces of malware are targeted attacks (i.e., are not seen beyond the organization targeted). 88% of malware found in fewer than 10 other organizations. Source: SophosLabs 2013
  • 15. 15 IT Challenges 20% 23% 32% 37% 44% 48% 0% 10% 20% 30% 40% 50% 60% Maintaining security and compliance Lack of people/resources to do everything that is being asked Finding enough budget to refresh hardware and end point devices Application/OS patching and updates Supporting a wide range of devices Managing users across remote locations % of respondents who answered 1 or 2 What are the biggest challenges your IT organization faces in managing end users? Ranked in order with 1 being the biggest challenge Source: Spiceworks Community Survey
  • 16. 16 Smaller Enterprises Lack IT Security Staff Average Number of People in Organization Dedicated to IT Security 0 1 3 8 50 0 10 20 30 40 50 60 100-499 Employees 500-999 Employees 1000-4,999 Employees 5000-19,999 Employees 20,000+ Employees 50% of IT Security Spend Challenged by Complexity Limited by Resources
  • 17. 17 Complicated by Security Challenges Corporate Owned and BYOD Protect My Data Go Wireless Users Are Everywhere What About Securing My Servers? Can’t Control Users via Brute Force Downtime Unacceptable “Console Proliferation” & “Agent Pollution” Transition to the Cloud Regulations & Compliance Help Desk Queries New Attack Surfaces (Android, iOS) 250,000 New Threats Will Appear Today Polymorphic Threats Affect Everyone Macs Are No Longer Immune Not Just A “Big Company” Problem IT Systems Are The Lifeblood for Any Size Org
  • 19. 19 Complete Security Deployed How You Want Made Simple Wherever the user is, whatever device they use On premise, as a service or as a hardware or virtual appliance Easy setup, managed via Cloud, etc. Complete Security Can Be Made Simple
  • 20. 20 Complete Security, Made Simple Complete Security… Made Simple. Network DevicesServers Simple Deployment Simple Protection Simple Management • On premise • Virtual • Cloud • User self provision • Active Protection – real-time protection powered by SophosLabs • Live lookups via the Cloud • SophosLabs experts tune the protection so you don’t have to Next Gen Firewall Anti- malware and IPS URL Filtering Network Access Control Wireless VPN Anti-Spam Email Encryption Anti- Malware Mobile Encryption Patch Assessment Application Control Device Control Encryption for Cloud Endpoint Web Protection Anti-Malware Webserver Protection Virtualization Intuitive consoles: On Premise or From the Cloud Backed by expert support
  • 21. 21 • Do your end-users have mobile devices? How many users, how many devices? • What are you using today for Endpoint and MDMD? How is it licensed? What is it costing you over 3 years? • Wouldn’t it make sense to just pay once for all platforms and devices? • Wouldn’t it make sense to get all the protection you need for Windows, Macs, phones and tablets in one license? • Wouldn’t it be great if you didn’t have to count devices? • Wouldn’t it be great to get it all from one vendor with support specifically focused on business?
  • 22. 22 www.linesystems.com VOICE l DATA l CLOUD Questions?
  • 23. 23 www.linesystems.com VOICE l DATA l CLOUD Thank you!