SlideShare a Scribd company logo
1 of 6
Reducing the Cost of Defence

                  Lionel Medina
                Medina Networks
                  866-865-5307
Agenda
 Why Managed Anti-virus?
 What is a Managed Anti-virus Offering?
 Benefits
 Q&A
Why Managed Anti-virus?
Research of the SMB market has shown that:

 Cyber attacks were rated the second highest priority right after data loss
 66% said that security is an area they would like to improve in the next 12
  months (currently spending $25,000/annum on security)
 74% experienced cyber attacks last year
 25% saw an increase in attacks last year
 53% cited lost productivity as the largest cost of these attacks
 27% cited a direct loss in revenue
What is Managed Anti-virus?
 A services-based offering
 Includes proactive, comprehensive monitoring, management and reporting
  of desktop/laptop/server anti-virus by the IT experts at Medina Networks
     Features                                     Standard Anti-virus           Managed Anti-virus
     Anti-Virus                                         Included                     Included
     Anti-Spyware                                       Included                     Included
     Anti-Malware                                       Included                     Included
     Anti-spam                                             No                        Included
     Intrusion Detection                                   No                        Included
     Firewall                                              No                        Included
     Content Filtering                                     No                        Included
     Supported by our Network Operations Center            No                        Included
     Asset discovery and reporting                         No                        Included
     Device monitoring                                     No                        Included
     Device management                                     No                        Included
     Attended & unattended remote control                  No                        Included
     Automated patch management                            No                        Included

     Cost                                         $40 per seat per year   Medina Networks will match your
                                                                                   current cost
Benefits
 Fully managed solution for the same price as a software purchase
 Reduced operating costs
 Protects business integrity
 Improved productivity
 Safeguards business information
 Real-time decision making
 Low TCO, fast ROI
 Detection of targeted attacks and malware
 Detailed reporting information
 Monitored Anti-virus solution by the experts
Managed Anti-virus




     Lionel Medina
Lmedina@medinanet.com
  Tel: (866) 865-5307

More Related Content

What's hot

Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials Qonex
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016Marketing Team
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 

What's hot (20)

What is NAC
What is NACWhat is NAC
What is NAC
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Security policies
Security policiesSecurity policies
Security policies
 
ManagedAntiVirus
ManagedAntiVirusManagedAntiVirus
ManagedAntiVirus
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Nac market
Nac marketNac market
Nac market
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
PCI presentation
PCI presentationPCI presentation
PCI presentation
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 

Viewers also liked

101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Downloading Youtube Videos for Use in Your Presentation
Downloading Youtube Videos for Use in Your PresentationDownloading Youtube Videos for Use in Your Presentation
Downloading Youtube Videos for Use in Your PresentationAl Bonner
 
6 Tools and Software you should use to filter the internet for content curati...
6 Tools and Software you should use to filter the internet for content curati...6 Tools and Software you should use to filter the internet for content curati...
6 Tools and Software you should use to filter the internet for content curati...Brian Fanzo
 
Internet Explorer PPT
Internet Explorer PPTInternet Explorer PPT
Internet Explorer PPTokmomwalking
 
Firewall
FirewallFirewall
FirewallApo
 
Computer Languages....ppt
Computer Languages....pptComputer Languages....ppt
Computer Languages....ppthashgeneration
 
Programming languages
Programming languagesProgramming languages
Programming languagesAsmasum
 
Lect 1. introduction to programming languages
Lect 1. introduction to programming languagesLect 1. introduction to programming languages
Lect 1. introduction to programming languagesVarun Garg
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Viewers also liked (20)

Hack and virus
Hack and virusHack and virus
Hack and virus
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Google Earth overview
Google Earth overviewGoogle Earth overview
Google Earth overview
 
LAN.
LAN.LAN.
LAN.
 
Downloading Youtube Videos for Use in Your Presentation
Downloading Youtube Videos for Use in Your PresentationDownloading Youtube Videos for Use in Your Presentation
Downloading Youtube Videos for Use in Your Presentation
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
6 Tools and Software you should use to filter the internet for content curati...
6 Tools and Software you should use to filter the internet for content curati...6 Tools and Software you should use to filter the internet for content curati...
6 Tools and Software you should use to filter the internet for content curati...
 
Internet Explorer PPT
Internet Explorer PPTInternet Explorer PPT
Internet Explorer PPT
 
Computer languages
Computer languagesComputer languages
Computer languages
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Firewall
FirewallFirewall
Firewall
 
Computer Languages....ppt
Computer Languages....pptComputer Languages....ppt
Computer Languages....ppt
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
Computer Languages.
Computer Languages.Computer Languages.
Computer Languages.
 
Firewall
Firewall Firewall
Firewall
 
Lect 1. introduction to programming languages
Lect 1. introduction to programming languagesLect 1. introduction to programming languages
Lect 1. introduction to programming languages
 
Networking
NetworkingNetworking
Networking
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Search Engine Demystified
Search Engine DemystifiedSearch Engine Demystified
Search Engine Demystified
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similar to Managed Anti Virus Presentation

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Giaspace Managed Services
Giaspace Managed ServicesGiaspace Managed Services
Giaspace Managed ServicesRobert Giannini
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Shielding Digital Fortresses: VAPT Solutions in Gurgaon
Shielding Digital Fortresses: VAPT Solutions in GurgaonShielding Digital Fortresses: VAPT Solutions in Gurgaon
Shielding Digital Fortresses: VAPT Solutions in Gurgaonkhushihc2003
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxBluechipComputerSyst
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentPrahlad Reddy
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
computer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems auditcomputer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems auditaaditya
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionMark J. Feldman
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 

Similar to Managed Anti Virus Presentation (20)

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
Giaspace Managed Services
Giaspace Managed ServicesGiaspace Managed Services
Giaspace Managed Services
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Shielding Digital Fortresses: VAPT Solutions in Gurgaon
Shielding Digital Fortresses: VAPT Solutions in GurgaonShielding Digital Fortresses: VAPT Solutions in Gurgaon
Shielding Digital Fortresses: VAPT Solutions in Gurgaon
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Isms3
Isms3Isms3
Isms3
 
computer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems auditcomputer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems audit
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware Solution
 
Ta Security
Ta SecurityTa Security
Ta Security
 

Managed Anti Virus Presentation

  • 1. Reducing the Cost of Defence Lionel Medina Medina Networks 866-865-5307
  • 2. Agenda  Why Managed Anti-virus?  What is a Managed Anti-virus Offering?  Benefits  Q&A
  • 3. Why Managed Anti-virus? Research of the SMB market has shown that:  Cyber attacks were rated the second highest priority right after data loss  66% said that security is an area they would like to improve in the next 12 months (currently spending $25,000/annum on security)  74% experienced cyber attacks last year  25% saw an increase in attacks last year  53% cited lost productivity as the largest cost of these attacks  27% cited a direct loss in revenue
  • 4. What is Managed Anti-virus?  A services-based offering  Includes proactive, comprehensive monitoring, management and reporting of desktop/laptop/server anti-virus by the IT experts at Medina Networks Features Standard Anti-virus Managed Anti-virus Anti-Virus Included Included Anti-Spyware Included Included Anti-Malware Included Included Anti-spam No Included Intrusion Detection No Included Firewall No Included Content Filtering No Included Supported by our Network Operations Center No Included Asset discovery and reporting No Included Device monitoring No Included Device management No Included Attended & unattended remote control No Included Automated patch management No Included Cost $40 per seat per year Medina Networks will match your current cost
  • 5. Benefits  Fully managed solution for the same price as a software purchase  Reduced operating costs  Protects business integrity  Improved productivity  Safeguards business information  Real-time decision making  Low TCO, fast ROI  Detection of targeted attacks and malware  Detailed reporting information  Monitored Anti-virus solution by the experts
  • 6. Managed Anti-virus Lionel Medina Lmedina@medinanet.com Tel: (866) 865-5307