Upload
david-castro
View
348
Download
0
Tags:
Embed Size (px)
DESCRIPTION
MSP best practices. How to deliver and sell IT managed security services. Presented by Kaseya and Channel Pro. September 2012.
Citation preview
Mastering the Secrets to Success in Managed Security
Mastering the Secrets to Success
in Managed Security
Success Series of Webinars1
Special Guest: David Castro, Kaseya
Host: Michael Siggins, Publisher ChannelPro Magazine
Mastering the Secrets to Success in Managed Security
How to Participate: Audio Options
1. Turn on the volume on your computer.
To join the audio broadcast during an event, choose “Join
Audio Broadcasting” on the Communicate menu.
2. Dial in to our teleconference line.
Success Series of Webinars2
2. Dial in to our teleconference line.
Phone: 1-408-792-6300
Meeting Number: 660 618 127
If you are having difficulty with WebEx, please contact technical
support: 866-229-3239.
Mastering the Secrets to Success in Managed Security
How to Participate: Ask Questions
1. To ask questions of the panelists:
Submit your questions via the Q&A area in the bottom right
area of your screen.
2. To ask about technical issues:
Success Series of Webinars3
2. To ask about technical issues:
Use the Chat area in the middle right area of your screen.
Submit your questions to the Host, EH Publishing.
If you are having difficulty with WebEx, please contact technical
support: 866-229-3239.
Mastering the Secrets to Success in Managed Security
Agenda
• Four keys to safe computing
• Common managed security challenges
• Five proven managed security best practices
• Choosing the right RMM tool
Success Series of Webinars4
• Choosing the right RMM tool
• Four examples of best practices in action
• Benefits of following best practices
Mastering the Secrets to Success in Managed Security
The Managed Security Opportunity
• Security is still a major issue for SMBs• Kaspersky Lab identified > 1 billion threats and ~89.5 million
malicious URLs in 2Q 2012 alone
• SMBs spend heavily on security• IDC says U.S. SMB security spending will top $5.6 billion in
Success Series of Webinars5
• IDC says U.S. SMB security spending will top $5.6 billion in 2015 and grow twice as fast as overall IT spending
• Spending on managed security services is growing fast
• Infonetics says global managed security service revenue grew 12% in 2011 to $11.7 billion and will reach nearly $18 billion by 2016
Mastering the Secrets to Success in Managed Security
What SMBs and MSPs Want from
Managed Security Services
SMBs:
– End-to-end protection
– Guaranteed service levels
– Minimal disruption to user productivity and core business processes
Success Series of Webinars6
business processes
MSPs:
– High customer satisfaction rates
– Low administrative expenses
– Strong profits
– A scalable foundation for long-term growth
Mastering the Secrets to Success in Managed Security
The Four Keys to Secure Computing
• Properly install reputable security software on every end point
• Keep the software up to date with the latest revisions and containments
Success Series of Webinars7
revisions and containments
• Ensure that the software performs system scans regularly
• Verify that the software successfully patches OS’s and applications
Mastering the Secrets to Success in Managed Security
• Inconsistent execution due to lack of centralized oversight and control
Multiple security products with different interfaces
complicate management
• Reactive technical processes
Why MSPs Struggle with Managed Security
Success Series of Webinars8
• Reactive technical processesSecurity software or vendor must notify MSP of problems
and new updates and patches
• Labor-intensive processesManual updating, installation, and patching—often in
person and device-by-device.
Mastering the Secrets to Success in Managed Security
Managed Security Best Practices
How best-in-class managed security providers do business
1. Sell security, not security products• Business owners care about security, not tools
Success Series of Webinars9
• Business owners care about security, not tools
• Emphasize the end result—comprehensive security—
rather than the tools used to achieve it
2. Choose the security tools your customers use• Build it into you SLA
Mastering the Secrets to Success in Managed Security
Managed Security Best Practices
3. Employ centralized, proactive security processes
– Manage all products through one console
– Actively confirm installations, updates, scans, and
patching
4. Automate your security processes wherever
Success Series of Webinars10
4. Automate your security processes wherever possible
5. Deliver thorough, regular reports
– Demonstrate value you add by listing updates,
patching, and scans
Mastering the Secrets to Success in Managed Security
Features to Look For in an RMM Tool
• Extensive built-in automationSystem should search websites for updates and patches,
determine which devices need them, then install
automatically as instructed
Success Series of Webinars11
• Robust scriptingSystem should be capable of automating anything you
can do at the command line
Mastering the Secrets to Success in Managed Security
Features to Look For in an RMM Tool
• Proactive security featuresSystem should actively confirm installs, updates, scans,
and patches rather than react to input from security
software
Success Series of Webinars12
• Tight integration with leading security products
Close, two-way communication, not just a click-through
• Strong reporting functionalityAbility to compile detailed data easily
Mastering the Secrets to Success in Managed Security
Example 1: Patching a PC Running Msft Windows
1. Use RMM software to specify in advance:• Which patches to install on which PCs
• Installation dates and times
• How to handle issue like rebooting
2. Patch Windows devices automatically
Success Series of Webinars13
2. Patch Windows devices automatically
Results:
– Patch nearly unlimited Windows devices with minimal human intervention
– No WSUS required
Mastering the Secrets to Success in Managed Security
Example 2: Applying an Anti-Virus Update
1. Use RMM software to find security updates automatically
2. Install them automatically through one console at the click of a button
Success Series of Webinars14
Results:
– No need to check websites yourself
– No need for manual installation
– More effectively keep clients current on latest updates
Mastering the Secrets to Success in Managed Security
Example 3: Deploying a Malware Containment
1. Use RMM software to acquire new containments automatically as they appear
2. Install them automatically where and as you specify
Success Series of Webinars15
specify
Results:
– Faster response times to new threats
– No need for manual searches or installation
Mastering the Secrets to Success in Managed Security
Example 4: Deploying Non-Microsoft, Non-Malware Update
1. Use RMM software to find updates for common technologies like Java, Flash, Zip, etc.
2. Install them automatically based on highly configurable policies
Success Series of Webinars16
configurable policies
Results:
– More comprehensive security
– Minimal incremental effort
Mastering the Secrets to Success in Managed Security
• Lower overheadCentralization + automation = major savings of time and effort
• Higher profitsLower overhead translates to a bigger bottom line
Benefits of Using Managed Security Best Practices
Success Series of Webinars17
Lower overhead translates to a bigger bottom line
• Better securityAutomated, proactive processes reduce human error, keep customers safer
• Reduced risk of SLA failureBetter security means fewer SLA violations
Mastering the Secrets to Success in Managed Security
• More time for strategic consulting and project work
Because you’re spending less time on routine security
maintenance
• Enhanced customer satisfaction
Benefits of Using Managed Security Best Practices
Success Series of Webinars18
• Enhanced customer satisfactionClients appreciate vendors who keep them secure and
provide strategic guidance
• Greater ability to scale your businessGrow customer base faster than payroll thanks to
automated processes
Mastering the Secrets to Success in Managed Security
Summary
• Managed security is a significant opportunity if you deliver it efficiently and effectively
• Best-in-class MSPs use state-of-the-art RMM software to:
– Build their managed security practice around
Success Series of Webinars19
– Build their managed security practice around automated, centralized, and proactive security processes
– Sell security as an end result rather than a set of products
– Secure and satisfy their clients more completely
– Earn consistently high profits
Mastering the Secrets to Success in Managed Security
About Kaseya
• Enterprise-class IT systems management for everybody
• Key Facts– Founded 2000
– Privately held, no debt, no external capital requirements
33 offices worldwide in 20 countries with
Success Series of Webinars20
– 33 offices worldwide in 20 countries with 450+ employees• 12,000+ customers
• Millions of assets managed
– Patented IT service delivery process & remote IT management process• 24 patents pending
– Common Criteria (EAL2+) certified and FIPS 140-2 security compliant
– ITIL v2 and v3 compatible
Mastering the Secrets to Success in Managed Security
The Kaseya Topology
1 agent > 1 server > 1 web console
Success Series of Webinars21
On premise OR SaaS
Mastering the Secrets to Success in Managed Security
One web consoleCore
• Agent Monitoring
• Agent Procedures
• Audit and Inventory
• Backup
• Info Center
• Live Connect
• Mobile Device Management
Success Series of Webinars22
• Network Discovery
• Network Monitor
• Patch Management
• Policy Management
• PSA Integration
• Remote Control
• Ticketing
• Time Tracking
• Service Billing
Add On
Directory Services, Desktop Policy Management,
Desktop Migration, Service Desk, Data Backup,
Antivirus, Antimalware, Imaging and Deployment,
Software Deployment & Update, Endpoint Security
Mastering the Secrets to Success in Managed Security
Kaseya’s Security SolutionBlended Protection/Unified Platform/Remediation/PartnersPatching
Operating
System
MS
Office
3r
d
Party
*
Software
Deployment
Anti-Virus
Kaseya
Antivirus
Kaseya
Endpoint
Security
Anti-Malware
Kaseya
AntiMalware
Partners
/
Remediation
Partners
Agent
Procedures
Monitoring
&
Mobile
Service
Desk
&
Reporting
Scheduling
&
Management
Success Series of Webinars23
Mastering the Secrets to Success in Managed Security
Why MSPs Choose Kaseya
A single Kaseya user can proactively manage 1,000s of automated
IT systems and network tasks in the same amount of time required
by a team of technicians using other techniques
It’s the industry’s only patented server-agent architecture; MSPs
get enterprise-class capability that is easy to use and easy to afford
Success Series of Webinars24
With 60+% of top MSPs worldwide using Kaseya, they get access to
the most robust community available
And with so many ISVs plugging in to Kaseya via a seamless
integration process, they get an easy way to leverage their existing
strategic technology partnerships
Mastering the Secrets to Success in Managed Security
More Machines per Technician
60% of Kaseya
Success Series of Webinars25
25
60% of Kaseya
customers double the
productivity of their
technicians
Mastering the Secrets to Success in Managed Security
Attendees – Q3 ’12 Get started with Kaseya
• Custom demo
– Eligible for free hosted POC (Kaseya EJS)
• Special Pricing
– Foundation $1995/Admin/yr
– Essentials starting @ $5.75/device/mo
Success Series of Webinars26
– Essentials starting @ $5.75/device/mo
• Promos*
– KSDU starting @ $5/device/mo
– KAV or KAM starting @ $6/device/yr
26@kaseyacorp/company/kaseya/KaseyaFan community.kaseya.com
*Other terms apply