SlideShare a Scribd company logo
welcome
Confidential Information
welcome
marconet.com
Managed IT Services
Focus on what matters
to the business
I just want technology to
work for our employees
I want to focus on what
matters (our business)
– not IT
When technology isn’t
working, it affects our
bottom line
WHAT WE HEAR
Confidential Information *Indeed Survey of 101,465 Employees - September 2017 – September 2019
I am not confident we
are secure
We don’t know how to
protect our business from
hackers
Mitigating risk to our
organization is difficult
in IT
Hard to staff
IT positions
Technology sector
unemployment is at
<1.3% (20-year low)
Average technology
sector base salary:
$70,697* (True Cost 1.25x
- 1.4x)
Invest in training - then
they leave for higher pay!
Avoiding unexpected
costs are difficult with IT
I want IT costs to be
predictable
I need a trusted partner
to help us plan for IT
expenditures
When technology isn’t
working, it affects our
bottom line
Concerned about
getting hacked
SUPPORT
MANAGED IT SERVICES
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Email and Web
Security
Remote Management
and Monitoring
Anti-Malware
Protection
TOOLS
MANAGED IT SERVICES
Confidential Information
Triage | 24/7 live-call answer by Marco employees
 98% of calls answered within 10 seconds
Remediation | Monday - Friday 8:00 AM – 5:00 PM
 98% of issues resolved remotely
 24/7 remediation uplift available
Support Teams
 Rapid Resolution - Front line support team to remediate
issues faster
 Color Care Teams - Tier 1, Tier 2, and team supervisor
 Escalation - Advance Security Team, Advance Network
Team, Field Services
BIG COMPANY RESOURCES
Unlimited Support Desk
Confidential Information
SMALL COMPANY FEEL
Triage | 24/7 live-call answer by Marco employees
 98% of calls answered within 10 seconds
Remediation | Monday - Friday 8:00 AM – 5:00 PM
 98% of issues resolved remotely
 24/7 remediation uplift available
Support Teams
 Rapid Resolution - Front line support team to remediate
issues faster
 Color Care Teams - Tier 1, Tier 2, and team supervisor
 Escalation - Advance Security Team, Advance Network
Team, Field Services
Unlimited Support Desk
MANAGED IT SERVICES
MANAGED IT SERVICES
Confidential Information
Immediate Client Feedback
Client Business Reviews
 Service metrics
 User feedback review
95.6%
2.7% 1.6%
Positive
Negative
Neutral
Client Business Review Process
MANAGED IT SERVICES
Confidential Information
Field Services
 59 Marco locations
 750+ certified systems engineers
and technical representatives
Marco Extended Support Network
 For areas we can’t reach, we are members of a
national support network of “smart hands”
Unlimited On-Site Support
On-Site Visits
 Regularly scheduled
maintenance visits
 Recurring health checks
Proactive On-Site Visits
Third Party Software Support
(Requires active support contract)
MANAGED IT SERVICES
Confidential Information
Budgeting & Planning
Client Business Review Process
Client Business Reviews
 Service metrics
 User feedback review
 Hardware lifecycle management
 Budgeting and planning services
MANAGED IT SERVICES
Confidential Information
Security Operations Center (SOC) Network Operations Center (NOC)
Security Operations Center Services
 Security analysts who monitor your
network by leveraging an IDS (Intrusion
Detection System)
 24/7 network monitoring
 IDS leverages multiple best-in-breed
threat feeds
Network Operations Center (NOC)
 Tool & software administration, proactive
monitoring and alerting
 Patching: operating systems (Windows / Mac)
and 3rd party software
 Secret Server – encrypting and securing our
client data repository
EXPERIENCE MATTERS
End-User
Surveys
(immediate feedback)
Geographic
Call Routing
(small company feel)
Call
Recording
(quality control)
Confidential Information
Security
Focused
(reduce risk)
IT is never
“Out of the Office”
(increase productivity)
Over 10 Years of
MIT Experience
(mature processes)
Rapid Resolution
Team
(1st call remediation)
Unlimited
Support
(issues get resolved)
Warm Call
Handoff
(no repeating yourself)
Vendor
Facilitation
(no finger pointing)
MEASUREMENTS MATTER
Confidential Information
SECURITY AT HOME
Video Surveillance
Lock
Front Door
Alarm
System
Glass Break
Sensors
Human’s
Monitoring
IDENTIFY PROTECT RESPOND
DETECT RECOVER
SECURITY MATTERS
www.nist.gov/about-nist
Confidential Information
Asset management
Business environment
Governance
Risk assessment
Risk management
strategy
Anomalies and events
Security continuous
monitoring
Detection processes
Response planning
Communications
Analysis
Mitigation
Improvements
Recovery planning
Improvements
Communications
Access control
Awareness and
training
Data security
Information protection
process and
procedures
Maintenance
Protective technology
NIST Framework | National Institute of Standards and Technology
The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
SECURITY AT WORK
Video Surveillance
Lock
Front Door
Alarm
System
Glass Break
Sensors
Human’s
Monitoring
SECURITY AT WORK
Anti-Virus /
Anti-Malware
Firewall
Monitoring and Alerting
Detection
and Response
Platform
Network Sensors
Security Operations
Center (SOC)
SUPPORT
MANAGED IT SERVICES
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Email and Web
Security
Remote Management
and Monitoring
Anti-Malware
Protection
TOOLS
SECURITY AT WORK
Anti-Malware Protection
Anti-Virus / Anti-Malware
Threat Detection and Response
Firewall
Remote Management and Monitoring
Monitoring & Alerting
Email & Web Security
Detection and Response Platform
Secure Managed Network
Network Sensors
Security Training and Phishing
Security Operations Center (SOC)
IDENTIFY PROTECT RESPOND
DETECT RECOVER
NIST Framework | Marco Resources
MANAGED IT SERVICES
Confidential Information
Threat Detection
and Response
Security Operations
Center
Anti-Malware Protection
Network Operations
Center
Email & Web Security
Unlimited Support Desk
Secure Client Repository
Anti-Malware Protection
Patching (OS & 3rd Party)
Security Training and
Phishing
Unlimited Support Desk
Rapid Resolution Team
Threat Detection and
Response
Anti-Malware Protection
Unlimited On-site Support
Client Business Review
Process
Onboarding Process
Secure Managed Network
Remote Management
and Monitoring
Marco Assessments
Proactive On-site Visits
Managed Backup (Optional)
Comprehensive IT Partner
Over 10 Years of MIT
Experience
Unlimited On-site Support
The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
MANAGED IT SERVICES
Confidential Information
PER USER PRICING MODEL
$84/USER
Marco Assessments
Email and Web
Security
Rapid Resolution
Team
Comprehensive IT
Partner
WHY MARCO?
Confidential Information
Unlimited
Support Desk
Unlimited On-site
Support
Proactive
On-site Visits
Client Business
Review Process
Security Operations
Center
Security Training
and Phishing
Network
Operations Center
Secure Managed
Network
Threat Detection
and Response
Remote Management
and Monitoring
Anti-Malware
Protection
Onboarding Process Predictable Cost Big Company Resources
Small Company Feel
Secure Client Repository
Over 10 Years of
MIT Experience
IT is never
“Out of the Office”
WHAT TO EXPECT
KICK-OFF MEETING
SEMI-ANNUAL
BUSINESS REVIEW
Confidential Information
1
PROJECT PLAN
2
CREATE TIMELINE
3
AGENT LOAD
4
SITE DISCOVERIES
5
COMPLETE
DOCUMENTATION
6
TRAINING
7
GO-LIVE
8
DAILY/WEEKLY
STATUS
UPDATES
9
MONTHLY
SERVICE
REVIEWS
Our extensive onboarding process provides a feeling on go-live day. It’s as if we've been your IT support forever!
 End-User Support Desk
 Network Management
 Desktop Management
 Software Subscriptions
Copiers & Printers
IT Projects Managed Services
Managed IT Cloud Voice
Cloud Solutions
 Data Center
 Security
 Unified Communications
 Network Infrastructure
 Audio Visual
 Software
 Document Management
 Cloud Migration Services
 VaaS
 UCaaS
Connectivity
 Managed SD-WAN
 Carrier Services
 Private Cloud
 Public Cloud
 Multi Cloud
 Managed Print Services
 Digital Printing Press
 Wide Format Printers
 Print Software Applications
 Copiers, Printers &
Multi-function Devices
 Shredding Services
Confidential Information
MARCO SOLUTIONS
Managed it   business leader ppt

More Related Content

What's hot

20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 
ITSM and ITOM Coming Together
ITSM and ITOM Coming TogetherITSM and ITOM Coming Together
ITSM and ITOM Coming Together
OpsRamp
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
Len Moncrieffe
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

What's hot (20)

IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Managed IT Services: Overview, Importance, Business Benefits
Managed IT Services: Overview, Importance, Business BenefitsManaged IT Services: Overview, Importance, Business Benefits
Managed IT Services: Overview, Importance, Business Benefits
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed Services
 
Managed Services Support
Managed Services SupportManaged Services Support
Managed Services Support
 
ITSM and ITOM Coming Together
ITSM and ITOM Coming TogetherITSM and ITOM Coming Together
ITSM and ITOM Coming Together
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
 
Managed IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation SlidesManaged IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation Slides
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
 
24/7 Outsourced NOC Services
24/7 Outsourced NOC Services24/7 Outsourced NOC Services
24/7 Outsourced NOC Services
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 

Similar to Managed it business leader ppt

Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation Bni
Funkmaster
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
My Tech Team Managed Services
My Tech Team Managed ServicesMy Tech Team Managed Services
My Tech Team Managed Services
MyTechTeam
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
Carolyn Tarrant
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
patmisasi
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 

Similar to Managed it business leader ppt (20)

CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
Managed Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canadaManaged Antivirus Support Solutions in canada
Managed Antivirus Support Solutions in canada
 
Managed Initial Presentation Bni
Managed Initial Presentation BniManaged Initial Presentation Bni
Managed Initial Presentation Bni
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
NSI Net Factor Advantage
NSI Net Factor AdvantageNSI Net Factor Advantage
NSI Net Factor Advantage
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
My Tech Team Managed Services
My Tech Team Managed ServicesMy Tech Team Managed Services
My Tech Team Managed Services
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Managed it business leader ppt

  • 2. Focus on what matters to the business I just want technology to work for our employees I want to focus on what matters (our business) – not IT When technology isn’t working, it affects our bottom line WHAT WE HEAR Confidential Information *Indeed Survey of 101,465 Employees - September 2017 – September 2019 I am not confident we are secure We don’t know how to protect our business from hackers Mitigating risk to our organization is difficult in IT Hard to staff IT positions Technology sector unemployment is at <1.3% (20-year low) Average technology sector base salary: $70,697* (True Cost 1.25x - 1.4x) Invest in training - then they leave for higher pay! Avoiding unexpected costs are difficult with IT I want IT costs to be predictable I need a trusted partner to help us plan for IT expenditures When technology isn’t working, it affects our bottom line Concerned about getting hacked
  • 3. SUPPORT MANAGED IT SERVICES Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Email and Web Security Remote Management and Monitoring Anti-Malware Protection TOOLS
  • 4. MANAGED IT SERVICES Confidential Information Triage | 24/7 live-call answer by Marco employees  98% of calls answered within 10 seconds Remediation | Monday - Friday 8:00 AM – 5:00 PM  98% of issues resolved remotely  24/7 remediation uplift available Support Teams  Rapid Resolution - Front line support team to remediate issues faster  Color Care Teams - Tier 1, Tier 2, and team supervisor  Escalation - Advance Security Team, Advance Network Team, Field Services BIG COMPANY RESOURCES Unlimited Support Desk
  • 5. Confidential Information SMALL COMPANY FEEL Triage | 24/7 live-call answer by Marco employees  98% of calls answered within 10 seconds Remediation | Monday - Friday 8:00 AM – 5:00 PM  98% of issues resolved remotely  24/7 remediation uplift available Support Teams  Rapid Resolution - Front line support team to remediate issues faster  Color Care Teams - Tier 1, Tier 2, and team supervisor  Escalation - Advance Security Team, Advance Network Team, Field Services Unlimited Support Desk MANAGED IT SERVICES
  • 6. MANAGED IT SERVICES Confidential Information Immediate Client Feedback Client Business Reviews  Service metrics  User feedback review 95.6% 2.7% 1.6% Positive Negative Neutral Client Business Review Process
  • 7. MANAGED IT SERVICES Confidential Information Field Services  59 Marco locations  750+ certified systems engineers and technical representatives Marco Extended Support Network  For areas we can’t reach, we are members of a national support network of “smart hands” Unlimited On-Site Support On-Site Visits  Regularly scheduled maintenance visits  Recurring health checks Proactive On-Site Visits Third Party Software Support (Requires active support contract)
  • 8. MANAGED IT SERVICES Confidential Information Budgeting & Planning Client Business Review Process Client Business Reviews  Service metrics  User feedback review  Hardware lifecycle management  Budgeting and planning services
  • 9. MANAGED IT SERVICES Confidential Information Security Operations Center (SOC) Network Operations Center (NOC) Security Operations Center Services  Security analysts who monitor your network by leveraging an IDS (Intrusion Detection System)  24/7 network monitoring  IDS leverages multiple best-in-breed threat feeds Network Operations Center (NOC)  Tool & software administration, proactive monitoring and alerting  Patching: operating systems (Windows / Mac) and 3rd party software  Secret Server – encrypting and securing our client data repository
  • 10. EXPERIENCE MATTERS End-User Surveys (immediate feedback) Geographic Call Routing (small company feel) Call Recording (quality control) Confidential Information Security Focused (reduce risk) IT is never “Out of the Office” (increase productivity) Over 10 Years of MIT Experience (mature processes) Rapid Resolution Team (1st call remediation) Unlimited Support (issues get resolved) Warm Call Handoff (no repeating yourself) Vendor Facilitation (no finger pointing)
  • 12. SECURITY AT HOME Video Surveillance Lock Front Door Alarm System Glass Break Sensors Human’s Monitoring
  • 13. IDENTIFY PROTECT RESPOND DETECT RECOVER SECURITY MATTERS www.nist.gov/about-nist Confidential Information Asset management Business environment Governance Risk assessment Risk management strategy Anomalies and events Security continuous monitoring Detection processes Response planning Communications Analysis Mitigation Improvements Recovery planning Improvements Communications Access control Awareness and training Data security Information protection process and procedures Maintenance Protective technology NIST Framework | National Institute of Standards and Technology The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
  • 14. SECURITY AT WORK Video Surveillance Lock Front Door Alarm System Glass Break Sensors Human’s Monitoring
  • 15. SECURITY AT WORK Anti-Virus / Anti-Malware Firewall Monitoring and Alerting Detection and Response Platform Network Sensors Security Operations Center (SOC)
  • 16. SUPPORT MANAGED IT SERVICES Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Email and Web Security Remote Management and Monitoring Anti-Malware Protection TOOLS
  • 17. SECURITY AT WORK Anti-Malware Protection Anti-Virus / Anti-Malware Threat Detection and Response Firewall Remote Management and Monitoring Monitoring & Alerting Email & Web Security Detection and Response Platform Secure Managed Network Network Sensors Security Training and Phishing Security Operations Center (SOC)
  • 18. IDENTIFY PROTECT RESPOND DETECT RECOVER NIST Framework | Marco Resources MANAGED IT SERVICES Confidential Information Threat Detection and Response Security Operations Center Anti-Malware Protection Network Operations Center Email & Web Security Unlimited Support Desk Secure Client Repository Anti-Malware Protection Patching (OS & 3rd Party) Security Training and Phishing Unlimited Support Desk Rapid Resolution Team Threat Detection and Response Anti-Malware Protection Unlimited On-site Support Client Business Review Process Onboarding Process Secure Managed Network Remote Management and Monitoring Marco Assessments Proactive On-site Visits Managed Backup (Optional) Comprehensive IT Partner Over 10 Years of MIT Experience Unlimited On-site Support The NIST Cybersecurity Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
  • 19. MANAGED IT SERVICES Confidential Information PER USER PRICING MODEL $84/USER
  • 20. Marco Assessments Email and Web Security Rapid Resolution Team Comprehensive IT Partner WHY MARCO? Confidential Information Unlimited Support Desk Unlimited On-site Support Proactive On-site Visits Client Business Review Process Security Operations Center Security Training and Phishing Network Operations Center Secure Managed Network Threat Detection and Response Remote Management and Monitoring Anti-Malware Protection Onboarding Process Predictable Cost Big Company Resources Small Company Feel Secure Client Repository Over 10 Years of MIT Experience IT is never “Out of the Office”
  • 21. WHAT TO EXPECT KICK-OFF MEETING SEMI-ANNUAL BUSINESS REVIEW Confidential Information 1 PROJECT PLAN 2 CREATE TIMELINE 3 AGENT LOAD 4 SITE DISCOVERIES 5 COMPLETE DOCUMENTATION 6 TRAINING 7 GO-LIVE 8 DAILY/WEEKLY STATUS UPDATES 9 MONTHLY SERVICE REVIEWS Our extensive onboarding process provides a feeling on go-live day. It’s as if we've been your IT support forever!
  • 22.  End-User Support Desk  Network Management  Desktop Management  Software Subscriptions Copiers & Printers IT Projects Managed Services Managed IT Cloud Voice Cloud Solutions  Data Center  Security  Unified Communications  Network Infrastructure  Audio Visual  Software  Document Management  Cloud Migration Services  VaaS  UCaaS Connectivity  Managed SD-WAN  Carrier Services  Private Cloud  Public Cloud  Multi Cloud  Managed Print Services  Digital Printing Press  Wide Format Printers  Print Software Applications  Copiers, Printers & Multi-function Devices  Shredding Services Confidential Information MARCO SOLUTIONS

Editor's Notes

  1. Add NIST copy