SlideShare a Scribd company logo
UMBRELLA FOR 1_Title (1)
MSPS:
Leveraging Cloud Security
to be the Virtual CIO

Umbrella Confidential
WEBINAR AGENDA

!   UMBRELLA FOR MSPs INTRO
!   LEVERAGING CLOUD SECURITY
WITH JIM LANCASTER

!   REPORTING VALUE TO CUSTOMERS
!   VCIO: EXPOSING KEY TRENDS

YOUR PRESENTER:
DIMA KUMETS
PRODUCT MANAGER

!   PREVIEW: REPORTING ONLY ROLE
!   Q&A
GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS

#2 #2Ÿ

4-Dec-13 Ÿ Umbrella Confidential
COMPANY BACKGROUND

GLOBAL SECURITY
NETWORK
208.67.220.220

!   50M+ ACTIVE USERS DAILY
!   19 DATA CENTER LOCATIONS
1_Light Title
Only
!   ZERO DOWNTIME, SINCE 2006

208.67.222.222

!   50B+ REQUESTS DAILY
!   160+ COUNTRIES W/USERS
!   ZERO NET NEW LATENCY

EUROPE, MIDDLE
EAST & AFRICA

AMERICAS
#3 #3Ÿ

4-Dec-13 Ÿ Umbrella Confidential

ASIA-PACIFIC
CLOUD SECURITY SERVICE
1_Light Title
Only
With Reporting Integration into

#4 #4Ÿ

4-Dec-13 Ÿ Umbrella Confidential
INFECTED DEVICES IMPACT MSP MARGINS

MALWARE COSTS

YOUR
ENGINEER’S
TIME
#5 #5Ÿ

4-Dec-13 Ÿ Umbrella Confidential

CLIENTS’
EMPLOYEE
DOWNTIME
DECREASE MALWARE CLEAN UP EXPENSES

WEB

(PORTS ???)

ANY
PORT

WEB &
ANY
1_Light Title
PROTOCOL
NON-WEB

Only

WEB

ç THE INTERNET

ANY
APP

PREVENTS
MALWARE

CONTAINS
BOTNETS

BLOCKS

PHISHING ATTEMPTS &
INAPPROPRIATE USAGE

YOUR CUSTOMERSè
CLOUD SERVICE
WITH ZERO ADDED LATENCY

#6 #6Ÿ

4-Dec-13 Ÿ Umbrella Confidential
#7 #7Ÿ

4-Dec-13 Ÿ Umbrella Confidential
LEVERAGING
CLOUD SECURITY
#8 #8Ÿ

4-Dec-13 Ÿ Umbrella Confidential
JIM LANCASTER, CTO, SAGISS

•  Background
•  Managed Service Provider/monthly model
•  Over 20 years in business
•  Serving Dallas and surrounding areas

•  Jim Lancaster
•  Founder and CTO

#9 #9Ÿ

4-Dec-13 Ÿ Umbrella Confidential

GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS
JIM LANCASTER, CTO, SAGISS

•  Role of security in Managed Service
•  Key to growth: Standardizing
•  Sagiss’ Security Stack
•  Criteria for adding a product
•  Impact of OpenDNS on business

#10 Ÿ
#10

4-Dec-13 Ÿ Umbrella Confidential

GUEST PRESENTER:
JIM LANCASTER
CTO, SAGISS
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#11 Ÿ
#11

4-Dec-13 Ÿ Umbrella Confidential
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#12 Ÿ
#12

4-Dec-13 Ÿ Umbrella Confidential
SECURITY STRATEGY TO STAY AHEAD

OF RAPID CHANGE

#13
Changing workplace

WORK USED TO BE A PLACE YOU GO

1_Light Title
Only

#14 Ÿ
#14

4-Dec-13 Ÿ Umbrella Confidential
NETWORK PERIMITER HAS CHANGED

SECURITY WAS BUILDING A BETTER MOAT
AROUND YOUR CASTLE

1_Light Title
Only

#15 Ÿ
#15

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

WORK IS NO LONGER A PLACE YOU GO,
WORK IS A THING YOU DO

1_Light Title
Only

#16 Ÿ
#16

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

WORK ANYWHERE

1_Light Title
Only

#17 Ÿ
#17

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

INTERNET EVERYWHERE

1_Light Title
Only

#18 Ÿ
#18

4-Dec-13 Ÿ Umbrella Confidential
CHANGING WORKPLACE

APPLIANCE AND UTM SECURITY DOESN’T PROTECT
OUTSIDE THE NETWORK PERIMITER

1_Light Title
Only

#19 Ÿ
#19

4-Dec-13 Ÿ Umbrella Confidential
SECURE EVERYWHERE

UMBRELLA ENABLES MSPs TO
!   PROTECT WORKERS ON AND OFF THE NETWORK
!   COVERAGE FOR BYOD AND UNMANAGED DEVICES

#20 Ÿ
#20

4-Dec-13 Ÿ Umbrella Confidential
SIMPLE DEPLOYMENT

NETWORK-LEVEL
PROVISIONING

LIGHTWEIGHT AGENT
PROTECTS EVERYWHERE

(ALL DEVICES ON NETWORK
INCLUDING BYOD AND UNMANAGED)

(EASY SCRIPTED DEPLOYMENT VIA RMM)

CLIENT-A:155.21.1.1/28
CLIENT-B: 214.41.3.1/32
CLIENT-C: 23.4.2.4/32

155.21.1.1/28
#21 Ÿ
#21

214.41.3.1/32

4-Dec-13 Ÿ Umbrella Confidential

23.4.2.4/32
IMPROVE RENEWALS AND RETENTION

IMPROVED UPTIME
!   FULL ON AND OFF NETWORK PROTECTION
!   PREDICTIVE PREVENTION AND CONTAINMENT
!   FEWER INFECTIONS = ALWAYS ON TECHNOLOGY
1_Light Title
have malware
Only

“I don’t
problems.
What am I paying for?”

#22 Ÿ
#22

4-Dec-13 Ÿ Umbrella Confidential
IMPROVING
RETENTION

#23 Ÿ
#23

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

VALUE REPORTS – OPENDNS DASHBOARD

1_Light Title
Only

• 
• 
• 
• 
• 
#24 Ÿ
#24

Custom date ranges
Customer-wide or filter by identity
Drill-down to see date-time activity
Download as CSV
Multi-tenant: Share access with customer

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

1_Light Title
Only

#25 Ÿ
#25

4-Dec-13 Ÿ Umbrella Confidential
SHOW EFFICACY

Exposing data within MSP Organization
• 
• 
• 

Everyone should be able to express value to customers
Service desk must be able to see efficacy
Data must be easy to access

Challenge:
•  Sales and Management
•  Don’t usually access outside systems
•  Need this data the most

#26 Ÿ
#26

4-Dec-13 Ÿ Umbrella Confidential
EXPOSING WITHIN MSP ORGANIZATION

Solution: Push data to ConnectWise
• 
• 
• 
• 

#27 Ÿ
#27

Custom Configuration Type
Automatically updated nightly
Allows anyone to show proactive protection
Roadmap: Botnet activity ticketing

4-Dec-13 Ÿ Umbrella Confidential
VCIO ROLE

Virtual CIO
•  Ensure operational efficiencies
•  Create IT strategy to stay ahead of change
•  Align technology strategy with business
•  Forecast IT budgets

#28 Ÿ
#28

4-Dec-13 Ÿ Umbrella Confidential
EASY ACCESS TO NETWORK USAGE

Network usage
•  Overview within ConnectWise
•  Detailed log in Umbrella Dashboard

#29 Ÿ
#29

4-Dec-13 Ÿ Umbrella Confidential
EASY ACCESS TO NETWORK USAGE

Network usage insights
Adobe Creative Cloud
Managed licensing?
Hardware upgrade?

Blocking Facebook so
employees are going to
twitter.

#30 Ÿ
#30

4-Dec-13 Ÿ Umbrella Confidential

Video Streaming
Increase bandwidth?
Upgrade to 802.11ac?
Filter?
UPSELL

#31 Ÿ
#31

4-Dec-13 Ÿ Umbrella Confidential
PROFITABLE WEB FILTER

WEB FILTER AS A VALUE ADDED SERVICE
!   60 CATEGORIES
!   GRANULAR WHITELIST/BLACKLIST
!   CUSTOM BLOCK PAGE

FEATURES TO CHARGE A PREMIUM PRICE
!   PER-COMPUTER POLICY
!   BYOD AND GUEST FILTERING
!   BLOCK PAGE BYPASS CODES

REPORTING AND MONITORING
!   REAL-TIME ACTIVITY REPORT
!   TOP DOMAINS/TOP CATEGORIES/TOP USERS
!   SAVED REPORTS WITH EXPORT
#32 Ÿ
#32

4-Dec-13 Ÿ Umbrella Confidential
CHALLENGES WITH WEB FILTERING

CHALLENGE: MOBILE
!   4G/LTE CONNECTIVITY ON EMPLOYEE OWNED DEVICES
!   EMPLOYEES AVOID CONNECTING TO FILTERED NETWORK

CHALLENGE: ARMS RACE
!   RESTRICTIVE POLICIES CHALLENGE TO PROBLEM EMPLOYEES
!   MAKES CIRCUMVENTING POLICIES A GAME

SOLUTION: WEB MONITORING AS A SERVICE
!   REAL-TIME ACTIVITY REPORT
!   ENABLE MANAGEMENT TO ENGAGE WITH EMPLOYEES

#33 Ÿ
#33

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

WEB MONITORING AS A SERVICE
!   TRUST BUT VERIFY
!   BLOCK CORE OFFENDING CONTENT (PORNOGRAPHY, P2P)
!   USE REAL-TIME ACTIVITY LOG TO SPOT OFFENDERS

!   EMPOWER THE CUSTOMER
!
!
!
!
!

#34 Ÿ
#34

  CATCH OFFENDERS IN THE ACT
  ENABLE BETTER MANAGEMENT
  CHANGE BEHAVIORS INSTEAD OF TECHNOLOGIES
  ENGAGE WITH THE CUSTOMER ON PROBLEM AREAS
  LIVE DEMO WITH CUSTOMERS

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

WEB MONITORING AS A SERVICE
!  TRUST BUT VERIFY

#35 Ÿ
#35

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

MSP View: Multi-tenant

#36 Ÿ
#36

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

MSP View: Multi-tenant

#37 Ÿ
#37

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

Customer View: Isolated

#38 Ÿ
#38

4-Dec-13 Ÿ Umbrella Confidential
PREVIEW:
REPORTING-ONLY
LIMITED CUSTOMER ROLE

#39
WEB MONITORING AS A SERVICE

BETA: REPORTING ONLY
ROADMAP: CO-BRAND
Full Admin

Reporting only

#40 Ÿ
#40

4-Dec-13 Ÿ Umbrella Confidential
WEB MONITORING AS A SERVICE

BETA: REPORTING ONLY

#41 Ÿ
#41

4-Dec-13 Ÿ Umbrella Confidential
#42 Ÿ
#42

4-Dec-13 Ÿ Umbrella Confidential
BUSINESS ALIGNED WITH MSPs
!   MONTHLY BILLING
!   AGGREGATE VOLUME PRICING
!   MANAGE SEATS ON-DEMAND
!   COMMITMENT TO PARTNER SUCCESS

#43 Ÿ
#43

4-Dec-13 Ÿ Umbrella Confidential
THANK YOU! ANY QUESTIONS?...

EMAIL QUESTIONS TO:
SALES@OPENDNS.COM

OR JUST TWEET
@GETUMBRELLA

#44 Ÿ
#44

4-Dec-13 Ÿ Umbrella Confidential

More Related Content

Similar to MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
SORACOM,INC
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial Institutions
Angelo Agatino Nicolosi
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services
RightScale
 
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
CA Technologies
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
OpenDNS
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
Cogeco Peer1
Cogeco Peer1Cogeco Peer1
Cogeco Peer1
Screen Pages
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
ITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
 
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the CloudNicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Software
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
Jisc
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Umbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-ableUmbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-able
OpenDNS
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
ThousandEyes
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
Zscaler
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Trend Micro
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
LaurenWendler
 

Similar to MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO (20)

TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial Institutions
 
Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services Pivoting to Cloud: How an MSP Brokers Cloud Services
Pivoting to Cloud: How an MSP Brokers Cloud Services
 
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...
 
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & ContainmentUmbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Cogeco Peer1
Cogeco Peer1Cogeco Peer1
Cogeco Peer1
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the CloudNicus Summit 2018_ American Family Insurance's Journey to the Cloud
Nicus Summit 2018_ American Family Insurance's Journey to the Cloud
 
Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Umbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-ableUmbrella for MSPs: Cloud Security via N-able
Umbrella for MSPs: Cloud Security via N-able
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 

More from OpenDNS

New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
OpenDNS
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
OpenDNS
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
OpenDNS
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...OpenDNS
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGP
OpenDNS
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
OpenDNS
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
OpenDNS
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
OpenDNS
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
OpenDNS
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNS
OpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and Docker
OpenDNS
 
Defcon
DefconDefcon
Defcon
OpenDNS
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
OpenDNS
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
OpenDNS
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...OpenDNS
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
OpenDNS
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
OpenDNS
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
OpenDNS
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker Webcast
OpenDNS
 

More from OpenDNS (20)

New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
 
Highly Available Docker Networking With BGP
Highly Available Docker Networking With BGPHighly Available Docker Networking With BGP
Highly Available Docker Networking With BGP
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
 
Security Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training ProgramSecurity Ninjas: An Open Source Application Security Training Program
Security Ninjas: An Open Source Application Security Training Program
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
 
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote SlidesOpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
 
Docker at OpenDNS
Docker at OpenDNSDocker at OpenDNS
Docker at OpenDNS
 
IP Routing, AWS, and Docker
IP Routing, AWS, and DockerIP Routing, AWS, and Docker
IP Routing, AWS, and Docker
 
Defcon
DefconDefcon
Defcon
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
 
Cryptolocker Webcast
Cryptolocker WebcastCryptolocker Webcast
Cryptolocker Webcast
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO

  • 1. UMBRELLA FOR 1_Title (1) MSPS: Leveraging Cloud Security to be the Virtual CIO Umbrella Confidential
  • 2. WEBINAR AGENDA !   UMBRELLA FOR MSPs INTRO !   LEVERAGING CLOUD SECURITY WITH JIM LANCASTER !   REPORTING VALUE TO CUSTOMERS !   VCIO: EXPOSING KEY TRENDS YOUR PRESENTER: DIMA KUMETS PRODUCT MANAGER !   PREVIEW: REPORTING ONLY ROLE !   Q&A GUEST PRESENTER: JIM LANCASTER CTO, SAGISS #2 #2Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 3. COMPANY BACKGROUND GLOBAL SECURITY NETWORK 208.67.220.220 !   50M+ ACTIVE USERS DAILY !   19 DATA CENTER LOCATIONS 1_Light Title Only !   ZERO DOWNTIME, SINCE 2006 208.67.222.222 !   50B+ REQUESTS DAILY !   160+ COUNTRIES W/USERS !   ZERO NET NEW LATENCY EUROPE, MIDDLE EAST & AFRICA AMERICAS #3 #3Ÿ 4-Dec-13 Ÿ Umbrella Confidential ASIA-PACIFIC
  • 4. CLOUD SECURITY SERVICE 1_Light Title Only With Reporting Integration into #4 #4Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 5. INFECTED DEVICES IMPACT MSP MARGINS MALWARE COSTS YOUR ENGINEER’S TIME #5 #5Ÿ 4-Dec-13 Ÿ Umbrella Confidential CLIENTS’ EMPLOYEE DOWNTIME
  • 6. DECREASE MALWARE CLEAN UP EXPENSES WEB (PORTS ???) ANY PORT WEB & ANY 1_Light Title PROTOCOL NON-WEB Only WEB ç THE INTERNET ANY APP PREVENTS MALWARE CONTAINS BOTNETS BLOCKS PHISHING ATTEMPTS & INAPPROPRIATE USAGE YOUR CUSTOMERSè CLOUD SERVICE WITH ZERO ADDED LATENCY #6 #6Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 7. #7 #7Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 8. LEVERAGING CLOUD SECURITY #8 #8Ÿ 4-Dec-13 Ÿ Umbrella Confidential
  • 9. JIM LANCASTER, CTO, SAGISS •  Background •  Managed Service Provider/monthly model •  Over 20 years in business •  Serving Dallas and surrounding areas •  Jim Lancaster •  Founder and CTO #9 #9Ÿ 4-Dec-13 Ÿ Umbrella Confidential GUEST PRESENTER: JIM LANCASTER CTO, SAGISS
  • 10. JIM LANCASTER, CTO, SAGISS •  Role of security in Managed Service •  Key to growth: Standardizing •  Sagiss’ Security Stack •  Criteria for adding a product •  Impact of OpenDNS on business #10 Ÿ #10 4-Dec-13 Ÿ Umbrella Confidential GUEST PRESENTER: JIM LANCASTER CTO, SAGISS
  • 11. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #11 Ÿ #11 4-Dec-13 Ÿ Umbrella Confidential
  • 12. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #12 Ÿ #12 4-Dec-13 Ÿ Umbrella Confidential
  • 13. SECURITY STRATEGY TO STAY AHEAD OF RAPID CHANGE #13
  • 14. Changing workplace WORK USED TO BE A PLACE YOU GO 1_Light Title Only #14 Ÿ #14 4-Dec-13 Ÿ Umbrella Confidential
  • 15. NETWORK PERIMITER HAS CHANGED SECURITY WAS BUILDING A BETTER MOAT AROUND YOUR CASTLE 1_Light Title Only #15 Ÿ #15 4-Dec-13 Ÿ Umbrella Confidential
  • 16. CHANGING WORKPLACE WORK IS NO LONGER A PLACE YOU GO, WORK IS A THING YOU DO 1_Light Title Only #16 Ÿ #16 4-Dec-13 Ÿ Umbrella Confidential
  • 17. CHANGING WORKPLACE WORK ANYWHERE 1_Light Title Only #17 Ÿ #17 4-Dec-13 Ÿ Umbrella Confidential
  • 18. CHANGING WORKPLACE INTERNET EVERYWHERE 1_Light Title Only #18 Ÿ #18 4-Dec-13 Ÿ Umbrella Confidential
  • 19. CHANGING WORKPLACE APPLIANCE AND UTM SECURITY DOESN’T PROTECT OUTSIDE THE NETWORK PERIMITER 1_Light Title Only #19 Ÿ #19 4-Dec-13 Ÿ Umbrella Confidential
  • 20. SECURE EVERYWHERE UMBRELLA ENABLES MSPs TO !   PROTECT WORKERS ON AND OFF THE NETWORK !   COVERAGE FOR BYOD AND UNMANAGED DEVICES #20 Ÿ #20 4-Dec-13 Ÿ Umbrella Confidential
  • 21. SIMPLE DEPLOYMENT NETWORK-LEVEL PROVISIONING LIGHTWEIGHT AGENT PROTECTS EVERYWHERE (ALL DEVICES ON NETWORK INCLUDING BYOD AND UNMANAGED) (EASY SCRIPTED DEPLOYMENT VIA RMM) CLIENT-A:155.21.1.1/28 CLIENT-B: 214.41.3.1/32 CLIENT-C: 23.4.2.4/32 155.21.1.1/28 #21 Ÿ #21 214.41.3.1/32 4-Dec-13 Ÿ Umbrella Confidential 23.4.2.4/32
  • 22. IMPROVE RENEWALS AND RETENTION IMPROVED UPTIME !   FULL ON AND OFF NETWORK PROTECTION !   PREDICTIVE PREVENTION AND CONTAINMENT !   FEWER INFECTIONS = ALWAYS ON TECHNOLOGY 1_Light Title have malware Only “I don’t problems. What am I paying for?” #22 Ÿ #22 4-Dec-13 Ÿ Umbrella Confidential
  • 24. SHOW EFFICACY VALUE REPORTS – OPENDNS DASHBOARD 1_Light Title Only •  •  •  •  •  #24 Ÿ #24 Custom date ranges Customer-wide or filter by identity Drill-down to see date-time activity Download as CSV Multi-tenant: Share access with customer 4-Dec-13 Ÿ Umbrella Confidential
  • 25. SHOW EFFICACY 1_Light Title Only #25 Ÿ #25 4-Dec-13 Ÿ Umbrella Confidential
  • 26. SHOW EFFICACY Exposing data within MSP Organization •  •  •  Everyone should be able to express value to customers Service desk must be able to see efficacy Data must be easy to access Challenge: •  Sales and Management •  Don’t usually access outside systems •  Need this data the most #26 Ÿ #26 4-Dec-13 Ÿ Umbrella Confidential
  • 27. EXPOSING WITHIN MSP ORGANIZATION Solution: Push data to ConnectWise •  •  •  •  #27 Ÿ #27 Custom Configuration Type Automatically updated nightly Allows anyone to show proactive protection Roadmap: Botnet activity ticketing 4-Dec-13 Ÿ Umbrella Confidential
  • 28. VCIO ROLE Virtual CIO •  Ensure operational efficiencies •  Create IT strategy to stay ahead of change •  Align technology strategy with business •  Forecast IT budgets #28 Ÿ #28 4-Dec-13 Ÿ Umbrella Confidential
  • 29. EASY ACCESS TO NETWORK USAGE Network usage •  Overview within ConnectWise •  Detailed log in Umbrella Dashboard #29 Ÿ #29 4-Dec-13 Ÿ Umbrella Confidential
  • 30. EASY ACCESS TO NETWORK USAGE Network usage insights Adobe Creative Cloud Managed licensing? Hardware upgrade? Blocking Facebook so employees are going to twitter. #30 Ÿ #30 4-Dec-13 Ÿ Umbrella Confidential Video Streaming Increase bandwidth? Upgrade to 802.11ac? Filter?
  • 31. UPSELL #31 Ÿ #31 4-Dec-13 Ÿ Umbrella Confidential
  • 32. PROFITABLE WEB FILTER WEB FILTER AS A VALUE ADDED SERVICE !   60 CATEGORIES !   GRANULAR WHITELIST/BLACKLIST !   CUSTOM BLOCK PAGE FEATURES TO CHARGE A PREMIUM PRICE !   PER-COMPUTER POLICY !   BYOD AND GUEST FILTERING !   BLOCK PAGE BYPASS CODES REPORTING AND MONITORING !   REAL-TIME ACTIVITY REPORT !   TOP DOMAINS/TOP CATEGORIES/TOP USERS !   SAVED REPORTS WITH EXPORT #32 Ÿ #32 4-Dec-13 Ÿ Umbrella Confidential
  • 33. CHALLENGES WITH WEB FILTERING CHALLENGE: MOBILE !   4G/LTE CONNECTIVITY ON EMPLOYEE OWNED DEVICES !   EMPLOYEES AVOID CONNECTING TO FILTERED NETWORK CHALLENGE: ARMS RACE !   RESTRICTIVE POLICIES CHALLENGE TO PROBLEM EMPLOYEES !   MAKES CIRCUMVENTING POLICIES A GAME SOLUTION: WEB MONITORING AS A SERVICE !   REAL-TIME ACTIVITY REPORT !   ENABLE MANAGEMENT TO ENGAGE WITH EMPLOYEES #33 Ÿ #33 4-Dec-13 Ÿ Umbrella Confidential
  • 34. WEB MONITORING AS A SERVICE WEB MONITORING AS A SERVICE !   TRUST BUT VERIFY !   BLOCK CORE OFFENDING CONTENT (PORNOGRAPHY, P2P) !   USE REAL-TIME ACTIVITY LOG TO SPOT OFFENDERS !   EMPOWER THE CUSTOMER ! ! ! ! ! #34 Ÿ #34   CATCH OFFENDERS IN THE ACT   ENABLE BETTER MANAGEMENT   CHANGE BEHAVIORS INSTEAD OF TECHNOLOGIES   ENGAGE WITH THE CUSTOMER ON PROBLEM AREAS   LIVE DEMO WITH CUSTOMERS 4-Dec-13 Ÿ Umbrella Confidential
  • 35. WEB MONITORING AS A SERVICE WEB MONITORING AS A SERVICE !  TRUST BUT VERIFY #35 Ÿ #35 4-Dec-13 Ÿ Umbrella Confidential
  • 36. WEB MONITORING AS A SERVICE MSP View: Multi-tenant #36 Ÿ #36 4-Dec-13 Ÿ Umbrella Confidential
  • 37. WEB MONITORING AS A SERVICE MSP View: Multi-tenant #37 Ÿ #37 4-Dec-13 Ÿ Umbrella Confidential
  • 38. WEB MONITORING AS A SERVICE Customer View: Isolated #38 Ÿ #38 4-Dec-13 Ÿ Umbrella Confidential
  • 40. WEB MONITORING AS A SERVICE BETA: REPORTING ONLY ROADMAP: CO-BRAND Full Admin Reporting only #40 Ÿ #40 4-Dec-13 Ÿ Umbrella Confidential
  • 41. WEB MONITORING AS A SERVICE BETA: REPORTING ONLY #41 Ÿ #41 4-Dec-13 Ÿ Umbrella Confidential
  • 42. #42 Ÿ #42 4-Dec-13 Ÿ Umbrella Confidential
  • 43. BUSINESS ALIGNED WITH MSPs !   MONTHLY BILLING !   AGGREGATE VOLUME PRICING !   MANAGE SEATS ON-DEMAND !   COMMITMENT TO PARTNER SUCCESS #43 Ÿ #43 4-Dec-13 Ÿ Umbrella Confidential
  • 44. THANK YOU! ANY QUESTIONS?... EMAIL QUESTIONS TO: SALES@OPENDNS.COM OR JUST TWEET @GETUMBRELLA #44 Ÿ #44 4-Dec-13 Ÿ Umbrella Confidential