26
Mastering the Secrets to Success in Managed Security Mastering the Secrets to Success in Managed Security Success Series of Webinars 1 Special Guest: David Castro, Kaseya Host: Michael Siggins, Publisher ChannelProMagazine

MSP Mastering the Secrets to Succuss in Managed Security

Embed Size (px)

DESCRIPTION

MSP best practices. How to deliver and sell IT managed security services. Presented by Kaseya and Channel Pro. September 2012.

Citation preview

Page 1: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Mastering the Secrets to Success

in Managed Security

Success Series of Webinars1

Special Guest: David Castro, Kaseya

Host: Michael Siggins, Publisher ChannelPro Magazine

Page 2: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

How to Participate: Audio Options

1. Turn on the volume on your computer.

To join the audio broadcast during an event, choose “Join

Audio Broadcasting” on the Communicate menu.

2. Dial in to our teleconference line.

Success Series of Webinars2

2. Dial in to our teleconference line.

Phone: 1-408-792-6300

Meeting Number: 660 618 127

If you are having difficulty with WebEx, please contact technical

support: 866-229-3239.

Page 3: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

How to Participate: Ask Questions

1. To ask questions of the panelists:

Submit your questions via the Q&A area in the bottom right

area of your screen.

2. To ask about technical issues:

Success Series of Webinars3

2. To ask about technical issues:

Use the Chat area in the middle right area of your screen.

Submit your questions to the Host, EH Publishing.

If you are having difficulty with WebEx, please contact technical

support: 866-229-3239.

Page 4: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Agenda

• Four keys to safe computing

• Common managed security challenges

• Five proven managed security best practices

• Choosing the right RMM tool

Success Series of Webinars4

• Choosing the right RMM tool

• Four examples of best practices in action

• Benefits of following best practices

Page 5: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

The Managed Security Opportunity

• Security is still a major issue for SMBs• Kaspersky Lab identified > 1 billion threats and ~89.5 million

malicious URLs in 2Q 2012 alone

• SMBs spend heavily on security• IDC says U.S. SMB security spending will top $5.6 billion in

Success Series of Webinars5

• IDC says U.S. SMB security spending will top $5.6 billion in 2015 and grow twice as fast as overall IT spending

• Spending on managed security services is growing fast

• Infonetics says global managed security service revenue grew 12% in 2011 to $11.7 billion and will reach nearly $18 billion by 2016

Page 6: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

What SMBs and MSPs Want from

Managed Security Services

SMBs:

– End-to-end protection

– Guaranteed service levels

– Minimal disruption to user productivity and core business processes

Success Series of Webinars6

business processes

MSPs:

– High customer satisfaction rates

– Low administrative expenses

– Strong profits

– A scalable foundation for long-term growth

Page 7: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

The Four Keys to Secure Computing

• Properly install reputable security software on every end point

• Keep the software up to date with the latest revisions and containments

Success Series of Webinars7

revisions and containments

• Ensure that the software performs system scans regularly

• Verify that the software successfully patches OS’s and applications

Page 8: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

• Inconsistent execution due to lack of centralized oversight and control

Multiple security products with different interfaces

complicate management

• Reactive technical processes

Why MSPs Struggle with Managed Security

Success Series of Webinars8

• Reactive technical processesSecurity software or vendor must notify MSP of problems

and new updates and patches

• Labor-intensive processesManual updating, installation, and patching—often in

person and device-by-device.

Page 9: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Managed Security Best Practices

How best-in-class managed security providers do business

1. Sell security, not security products• Business owners care about security, not tools

Success Series of Webinars9

• Business owners care about security, not tools

• Emphasize the end result—comprehensive security—

rather than the tools used to achieve it

2. Choose the security tools your customers use• Build it into you SLA

Page 10: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Managed Security Best Practices

3. Employ centralized, proactive security processes

– Manage all products through one console

– Actively confirm installations, updates, scans, and

patching

4. Automate your security processes wherever

Success Series of Webinars10

4. Automate your security processes wherever possible

5. Deliver thorough, regular reports

– Demonstrate value you add by listing updates,

patching, and scans

Page 11: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Features to Look For in an RMM Tool

• Extensive built-in automationSystem should search websites for updates and patches,

determine which devices need them, then install

automatically as instructed

Success Series of Webinars11

• Robust scriptingSystem should be capable of automating anything you

can do at the command line

Page 12: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Features to Look For in an RMM Tool

• Proactive security featuresSystem should actively confirm installs, updates, scans,

and patches rather than react to input from security

software

Success Series of Webinars12

• Tight integration with leading security products

Close, two-way communication, not just a click-through

• Strong reporting functionalityAbility to compile detailed data easily

Page 13: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Example 1: Patching a PC Running Msft Windows

1. Use RMM software to specify in advance:• Which patches to install on which PCs

• Installation dates and times

• How to handle issue like rebooting

2. Patch Windows devices automatically

Success Series of Webinars13

2. Patch Windows devices automatically

Results:

– Patch nearly unlimited Windows devices with minimal human intervention

– No WSUS required

Page 14: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Example 2: Applying an Anti-Virus Update

1. Use RMM software to find security updates automatically

2. Install them automatically through one console at the click of a button

Success Series of Webinars14

Results:

– No need to check websites yourself

– No need for manual installation

– More effectively keep clients current on latest updates

Page 15: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Example 3: Deploying a Malware Containment

1. Use RMM software to acquire new containments automatically as they appear

2. Install them automatically where and as you specify

Success Series of Webinars15

specify

Results:

– Faster response times to new threats

– No need for manual searches or installation

Page 16: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Example 4: Deploying Non-Microsoft, Non-Malware Update

1. Use RMM software to find updates for common technologies like Java, Flash, Zip, etc.

2. Install them automatically based on highly configurable policies

Success Series of Webinars16

configurable policies

Results:

– More comprehensive security

– Minimal incremental effort

Page 17: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

• Lower overheadCentralization + automation = major savings of time and effort

• Higher profitsLower overhead translates to a bigger bottom line

Benefits of Using Managed Security Best Practices

Success Series of Webinars17

Lower overhead translates to a bigger bottom line

• Better securityAutomated, proactive processes reduce human error, keep customers safer

• Reduced risk of SLA failureBetter security means fewer SLA violations

Page 18: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

• More time for strategic consulting and project work

Because you’re spending less time on routine security

maintenance

• Enhanced customer satisfaction

Benefits of Using Managed Security Best Practices

Success Series of Webinars18

• Enhanced customer satisfactionClients appreciate vendors who keep them secure and

provide strategic guidance

• Greater ability to scale your businessGrow customer base faster than payroll thanks to

automated processes

Page 19: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Summary

• Managed security is a significant opportunity if you deliver it efficiently and effectively

• Best-in-class MSPs use state-of-the-art RMM software to:

– Build their managed security practice around

Success Series of Webinars19

– Build their managed security practice around automated, centralized, and proactive security processes

– Sell security as an end result rather than a set of products

– Secure and satisfy their clients more completely

– Earn consistently high profits

Page 20: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

About Kaseya

• Enterprise-class IT systems management for everybody

• Key Facts– Founded 2000

– Privately held, no debt, no external capital requirements

33 offices worldwide in 20 countries with

Success Series of Webinars20

– 33 offices worldwide in 20 countries with 450+ employees• 12,000+ customers

• Millions of assets managed

– Patented IT service delivery process & remote IT management process• 24 patents pending

– Common Criteria (EAL2+) certified and FIPS 140-2 security compliant

– ITIL v2 and v3 compatible

Page 21: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

The Kaseya Topology

1 agent > 1 server > 1 web console

Success Series of Webinars21

On premise OR SaaS

Page 22: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

One web consoleCore

• Agent Monitoring

• Agent Procedures

• Audit and Inventory

• Backup

• Info Center

• Live Connect

• Mobile Device Management

Success Series of Webinars22

• Network Discovery

• Network Monitor

• Patch Management

• Policy Management

• PSA Integration

• Remote Control

• Ticketing

• Time Tracking

• Service Billing

Add On

Directory Services, Desktop Policy Management,

Desktop Migration, Service Desk, Data Backup,

Antivirus, Antimalware, Imaging and Deployment,

Software Deployment & Update, Endpoint Security

Page 23: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Kaseya’s Security SolutionBlended Protection/Unified Platform/Remediation/PartnersPatching

Operating

System

MS

Office

3r

d

Party

*

Software

Deployment

Anti-Virus

Kaseya

Antivirus

Kaseya

Endpoint

Security

Anti-Malware

Kaseya

AntiMalware

Partners

/

Remediation

Partners

Agent

Procedures

Monitoring

&

Mobile

Service

Desk

&

Reporting

Scheduling

&

Management

Success Series of Webinars23

Page 24: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Why MSPs Choose Kaseya

A single Kaseya user can proactively manage 1,000s of automated

IT systems and network tasks in the same amount of time required

by a team of technicians using other techniques

It’s the industry’s only patented server-agent architecture; MSPs

get enterprise-class capability that is easy to use and easy to afford

Success Series of Webinars24

With 60+% of top MSPs worldwide using Kaseya, they get access to

the most robust community available

And with so many ISVs plugging in to Kaseya via a seamless

integration process, they get an easy way to leverage their existing

strategic technology partnerships

Page 25: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

More Machines per Technician

60% of Kaseya

Success Series of Webinars25

25

60% of Kaseya

customers double the

productivity of their

technicians

Page 26: MSP Mastering the Secrets to Succuss in Managed Security

Mastering the Secrets to Success in Managed Security

Attendees – Q3 ’12 Get started with Kaseya

• Custom demo

– Eligible for free hosted POC (Kaseya EJS)

• Special Pricing

– Foundation $1995/Admin/yr

– Essentials starting @ $5.75/device/mo

Success Series of Webinars26

– Essentials starting @ $5.75/device/mo

• Promos*

– KSDU starting @ $5/device/mo

– KAV or KAM starting @ $6/device/yr

26@kaseyacorp/company/kaseya/KaseyaFan community.kaseya.com

*Other terms apply