SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
Mike Reinhart
Director of Product Marketing
AccelOps Inc.
September 2015
Evolve to Survive
Delivering Better Managed Security Services at Higher Margins
Polling Question - #1
Which best describes your area of interest in
this webinar?
Ø Currently offer Managed Security Services
Ø Considering offering Managed Security
Services
Ø General educational interest
Ø Other
3© Copyright 2015 AccelOps, Inc. All rights reserved.
Gartner: MSP “Key Issues”
Hyper Competition
MSP’s Must Change!
New Buyers =
New Opportunity + Challenges
1
2
3
4© Copyright 2015 AccelOps, Inc. All rights reserved.
Gartner: MSP Survival Strategies
Move from Implementer & Maintainer
to Managed “Service” Provider
Retention = Critical Success Factor
Value Articulation
1
2
3
5© Copyright 2015 AccelOps, Inc. All rights reserved.
Gartner: MSP Business Opportunities
Bi-Modal IT
Evolving Threat Landscape
Distributed Enterprise and Users
1
2
3
6© Copyright 2015 AccelOps, Inc. All rights reserved.
Mode 1 Mode 2
Reliability Goal Agility
Price for performance Value
Revenue, brand
customer experience
Waterfall, V-Model,
high-ceremony IID
Approach
Agile, kanban, low
ceremony ID
Plan-driven,
approval-based
Governance
Empirical, continuous,
process-based
Enterprise
suppliers, long-term
deals
Sourcing
Small, new vendors
short-term deals
Good at
conventional
process, projects
Talent
Good at new and
uncertain projects
IT-centric, removed
from customer
Culture
Business-centric,
close to customer
Long (months) Cycle Times Short (days, weeks)
Opportunity Trends – BiModal IT
Think
Marathon
Runner
Think
Sprinter
7© Copyright 2015 AccelOps, Inc. All rights reserved.
Opportunity Trends – Distributed Resources
8© Copyright 2015 AccelOps, Inc. All rights reserved.
Opportunity Trends – Evolving Threats
9© Copyright 2015 AccelOps, Inc. All rights reserved.
BlackHat: Future Threat Concerns
Which do you believe will be of greatest concern two years from now?
10© Copyright 2015 AccelOps, Inc. All rights reserved.
Polling Question - #2
What Percent of Businesses said they were
ready for these trends?
Ø 92%
Ø 73%
Ø 62%
Ø 27%
11© Copyright 2015 AccelOps, Inc. All rights reserved.
BlackHat: Business Readiness to Respond
73% = Insufficient Security Staff
Data: UBM survey of 460 security professionals, June 2015
51%
27%
17%
5%
No, we could use
a little help
No, we are
completely underwater
What staff?
Yes
The 2015 Black Hat
Attendee Survey
Does your organization have enough security staff
to defend itself against current threats?
12© Copyright 2015 AccelOps, Inc. All rights reserved.
Top 3 MSP “Must Haves”
Support for ALL Infrastructure Types
ID, Fix & Prevent - Faster
1
2
3
Integrated Monitoring and Analytics
© Copyright 2015 AccelOps, Inc. All rights reserved. 13
Support for All
Infrastructure Types
14© Copyright 2015 AccelOps, Inc. All rights reserved.
Support for All Infrastructure Types
Local
Remote
Office
Isolated
DMZ
Private Cloud
Hybrid Cloud
Public Cloud
15© Copyright 2015 AccelOps, Inc. All rights reserved.
AccelOps works with Google, AWS, & Rackspace
on the following HyperVisors:
VMware ESX(i)
RedHat Kernel
Virtualization Manager
(KVM)
Support for All Infrastructure Types – Continued
© Copyright 2015 AccelOps, Inc. All rights reserved. 16
Integrated Monitoring,
Analytics & Management
Tool
17© Copyright 2015 AccelOps, Inc. All rights reserved.
Integrated Monitoring, Analytics & Mgmt.
Security
Network
Monitoring
Performance
Monitoring
Change
Monitoring
Application
Monitoring
Security
Network
monitoring
Performance
availability
Change
monitoring
Application
monitoring
© Copyright 2015 AccelOps, Inc. All rights reserved. 18
Monitor-ID-Fix-Prevent
Quickly & Easily
19© Copyright 2015 AccelOps, Inc. All rights reserved.
CustomerMSP
AccelOps Cluster AccelOps Collector
Secure VPN
Monitor-ID-Fix-Prevent - Quickly &Easily
© Copyright 2015 AccelOps, Inc. All rights reserved. 20
Accelops Unified Network
Analytics – For MSP’s
21© Copyright 2015 AccelOps, Inc. All rights reserved.
MSP	
  Devices
Collector	
  
Multi-Tenant MSP Architecture
Customer D
Collector	
  
Customer E
MSP	
  Data	
  Center	
  
AccelOps	
  
Cluster	
  
Customer A
Customer B
Customer C
Customer	
  Devices	
  in	
  
MSP	
  data	
  Center	
  
© Copyright 2015 AccelOps, Inc. All rights reserved. 22
A Single Tool to Leverage
New Opportunities
23© Copyright 2015 AccelOps, Inc. All rights reserved.
Opportunity for MSP’s
“The information security market will grow
13.8% in revenue in 2015, with the IT security
outsourcing segment recording the fastest
growth — 24.9%.”
—
© Copyright 2015 AccelOps, Inc. All rights reserved. 24
Q&A
Mike Reinhart
Director of Product Marketing
www.accelops.com
1.408.510.5040
Mike.reinhart@accelops.com
@accelops
facebook.com/accelops
Request a demo
or free 30-day trial
info@accelops.com
© Copyright 2015 AccelOps, Inc. All rights reserved. 25
Appendix
26© Copyright 2015 AccelOps, Inc. All rights reserved.
Major Security/Compliance Breaches – 2015
Company Records Stolen Type
*Source - Bloomberg
80M
•  Email and Physical Addresses
•  SSN’s
109M
83M
145M
47,000
•  Credit Card Numbers
•  Email Addresses
•  Physical Addresses
•  Email Addresses
•  Email and Physical Addresses
•  Login Credentials
•  Proprietary Information
•  Employee Details
Major Data Breaches in the past 12 Months*
27© Copyright 2015 AccelOps, Inc. All rights reserved.
Impacts to Business Bottom Line
Average cost of 1 hour downtime
Cost of attracting a new customer
vs. retaining one
# of consumers with bad experiences
shared with more than 5 people
$100K
54%
7
Times
28© Copyright 2015 AccelOps, Inc. All rights reserved.
Opportunity for MSP’s
Governance, Strategy,
Assessment
Operations
and Assurance
Forensics
•  Architecture and Design
•  Business Continuity
•  Compliance Review
•  Data Security Program
•  Governance
•  Program Assessment
•  Policy Design
•  Risk Assessment
•  Strategy
– People-Centric Security
•  Application Vulnerability
Assessment
•  Secure Code Review
•  Vulnerability Scan
•  Configuration
Assessment
•  Device Security
•  Fraud, Identification and
Privacy
•  Incident Response
•  Network Pen Test
•  Remote Access
•  Threat Intelligence
•  Cybercrime and Data
Breach
•  E-Discovery and
Computer Forensics
•  Compliance and
Investigative Analytics
Security Consulting Services
Managed security services, auditing, project management, awareness (education) programs and training are
not part of the definition.
Source: Gartner (August 2015)
29© Copyright 2015 AccelOps, Inc. All rights reserved.
— MSP Mentor
Top Managed Services Offered
Remote monitoring (+2)
Cloud-based BDR (+3)
Patch management (+4)
Helpdesk/Service desk (+2)
Managed email/anti-spam (0)
Managed security (+5)
NOC services (+10)
Virtual Servers in the Cloud (+8)
Software license management (+7)
Mobile Device Management (+3)
Managed Compliance (+7)
30© Copyright 2015 AccelOps, Inc. All rights reserved.
Role Based Access
31© Copyright 2015 AccelOps, Inc. All rights reserved.
Role Based Access for Your Admins
Granular Roles can be applied.
Customer 1 Customer 2 Customer 3 Customer 4
MSP Admin 1
MSP Admin 2
MSP Admin 3
The Cloud MSP
Administrators/
Operators
Windows
Admin
Database
Admin
Firewall
Admin
32© Copyright 2015 AccelOps, Inc. All rights reserved.
Bundled Reports

Más contenido relacionado

La actualidad más candente

Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siemvictor bueno
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOARSiemplify
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlationfrantzyv
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSiemplify
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTawnia Beckwith
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Anton Chuvakin
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 

La actualidad más candente (20)

Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOAR
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management Provider
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 

Destacado

Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise International
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale Bernadette Hyland-Wood
 
Innovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamInnovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamMastek Ltd
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemMahindra Comviva
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions
 
Montos de contratación
Montos de contrataciónMontos de contratación
Montos de contrataciónDatapro
 
The Rise of the Mobile Web
The Rise of the Mobile WebThe Rise of the Mobile Web
The Rise of the Mobile WebZSL Mobile
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 PresentationEVault
 
Infographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business StatsInfographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business StatsExinda
 
How marketers can leverage Ektron DXH's Exact Target for better client engage...
How marketers can leverage Ektron DXH's Exact Target for better client engage...How marketers can leverage Ektron DXH's Exact Target for better client engage...
How marketers can leverage Ektron DXH's Exact Target for better client engage...Suyati Technologies Pvt Ltd
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comContrast Security
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsQuEST Global (erstwhile NeST Software)
 
Insperity Business Confidence Survey Q2 2015 [Infographic]
Insperity Business Confidence Survey Q2 2015 [Infographic]Insperity Business Confidence Survey Q2 2015 [Infographic]
Insperity Business Confidence Survey Q2 2015 [Infographic]Insperity
 
Data on demand flexible archiving in a big content world
Data on demand   flexible archiving in a big content worldData on demand   flexible archiving in a big content world
Data on demand flexible archiving in a big content worldActuate Corporation
 
Optimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseOptimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseComverse, Inc.
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalCal Net Technology Group
 

Destacado (20)

2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video Contest
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale
 
Innovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamInnovation management -by Sudhakar Ram
Innovation management -by Sudhakar Ram
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
 
Montos de contratación
Montos de contrataciónMontos de contratación
Montos de contratación
 
The Rise of the Mobile Web
The Rise of the Mobile WebThe Rise of the Mobile Web
The Rise of the Mobile Web
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 Presentation
 
Infographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business StatsInfographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business Stats
 
KServe Retail Outlet
KServe Retail OutletKServe Retail Outlet
KServe Retail Outlet
 
How marketers can leverage Ektron DXH's Exact Target for better client engage...
How marketers can leverage Ektron DXH's Exact Target for better client engage...How marketers can leverage Ektron DXH's Exact Target for better client engage...
How marketers can leverage Ektron DXH's Exact Target for better client engage...
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming Paradigms
 
Daily sheet
Daily sheetDaily sheet
Daily sheet
 
Insperity Business Confidence Survey Q2 2015 [Infographic]
Insperity Business Confidence Survey Q2 2015 [Infographic]Insperity Business Confidence Survey Q2 2015 [Infographic]
Insperity Business Confidence Survey Q2 2015 [Infographic]
 
Data on demand flexible archiving in a big content world
Data on demand   flexible archiving in a big content worldData on demand   flexible archiving in a big content world
Data on demand flexible archiving in a big content world
 
Optimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseOptimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected Universe
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-final
 
Ws wp-365 days of hr
Ws wp-365 days of hrWs wp-365 days of hr
Ws wp-365 days of hr
 

Similar a Msp deck v1.0

Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityitSMF UK
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...CA Technologies
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
The Business Justification for APM
The Business Justification for APMThe Business Justification for APM
The Business Justification for APMJonah Kowall
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
oa predictive asset management executive briefing v20
oa predictive asset management executive briefing v20oa predictive asset management executive briefing v20
oa predictive asset management executive briefing v20Ralph Overbeck
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesThousandEyes
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Enterprise Management Associates
 
The Business Case for SaaS Analytics for Salesforce.com
The Business Case for SaaS Analytics for Salesforce.comThe Business Case for SaaS Analytics for Salesforce.com
The Business Case for SaaS Analytics for Salesforce.comDarren Cunningham
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
5 must haves for MSPs webinar
5 must haves for MSPs webinar5 must haves for MSPs webinar
5 must haves for MSPs webinarAccelOps, Inc.
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summits
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 

Similar a Msp deck v1.0 (20)

Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
The Business Justification for APM
The Business Justification for APMThe Business Justification for APM
The Business Justification for APM
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
oa predictive asset management executive briefing v20
oa predictive asset management executive briefing v20oa predictive asset management executive briefing v20
oa predictive asset management executive briefing v20
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
The Business Case for SaaS Analytics for Salesforce.com
The Business Case for SaaS Analytics for Salesforce.comThe Business Case for SaaS Analytics for Salesforce.com
The Business Case for SaaS Analytics for Salesforce.com
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
5 must haves for MSPs webinar
5 must haves for MSPs webinar5 must haves for MSPs webinar
5 must haves for MSPs webinar
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWSAWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Msp deck v1.0

  • 1. Mike Reinhart Director of Product Marketing AccelOps Inc. September 2015 Evolve to Survive Delivering Better Managed Security Services at Higher Margins
  • 2. Polling Question - #1 Which best describes your area of interest in this webinar? Ø Currently offer Managed Security Services Ø Considering offering Managed Security Services Ø General educational interest Ø Other
  • 3. 3© Copyright 2015 AccelOps, Inc. All rights reserved. Gartner: MSP “Key Issues” Hyper Competition MSP’s Must Change! New Buyers = New Opportunity + Challenges 1 2 3
  • 4. 4© Copyright 2015 AccelOps, Inc. All rights reserved. Gartner: MSP Survival Strategies Move from Implementer & Maintainer to Managed “Service” Provider Retention = Critical Success Factor Value Articulation 1 2 3
  • 5. 5© Copyright 2015 AccelOps, Inc. All rights reserved. Gartner: MSP Business Opportunities Bi-Modal IT Evolving Threat Landscape Distributed Enterprise and Users 1 2 3
  • 6. 6© Copyright 2015 AccelOps, Inc. All rights reserved. Mode 1 Mode 2 Reliability Goal Agility Price for performance Value Revenue, brand customer experience Waterfall, V-Model, high-ceremony IID Approach Agile, kanban, low ceremony ID Plan-driven, approval-based Governance Empirical, continuous, process-based Enterprise suppliers, long-term deals Sourcing Small, new vendors short-term deals Good at conventional process, projects Talent Good at new and uncertain projects IT-centric, removed from customer Culture Business-centric, close to customer Long (months) Cycle Times Short (days, weeks) Opportunity Trends – BiModal IT Think Marathon Runner Think Sprinter
  • 7. 7© Copyright 2015 AccelOps, Inc. All rights reserved. Opportunity Trends – Distributed Resources
  • 8. 8© Copyright 2015 AccelOps, Inc. All rights reserved. Opportunity Trends – Evolving Threats
  • 9. 9© Copyright 2015 AccelOps, Inc. All rights reserved. BlackHat: Future Threat Concerns Which do you believe will be of greatest concern two years from now?
  • 10. 10© Copyright 2015 AccelOps, Inc. All rights reserved. Polling Question - #2 What Percent of Businesses said they were ready for these trends? Ø 92% Ø 73% Ø 62% Ø 27%
  • 11. 11© Copyright 2015 AccelOps, Inc. All rights reserved. BlackHat: Business Readiness to Respond 73% = Insufficient Security Staff Data: UBM survey of 460 security professionals, June 2015 51% 27% 17% 5% No, we could use a little help No, we are completely underwater What staff? Yes The 2015 Black Hat Attendee Survey Does your organization have enough security staff to defend itself against current threats?
  • 12. 12© Copyright 2015 AccelOps, Inc. All rights reserved. Top 3 MSP “Must Haves” Support for ALL Infrastructure Types ID, Fix & Prevent - Faster 1 2 3 Integrated Monitoring and Analytics
  • 13. © Copyright 2015 AccelOps, Inc. All rights reserved. 13 Support for All Infrastructure Types
  • 14. 14© Copyright 2015 AccelOps, Inc. All rights reserved. Support for All Infrastructure Types Local Remote Office Isolated DMZ Private Cloud Hybrid Cloud Public Cloud
  • 15. 15© Copyright 2015 AccelOps, Inc. All rights reserved. AccelOps works with Google, AWS, & Rackspace on the following HyperVisors: VMware ESX(i) RedHat Kernel Virtualization Manager (KVM) Support for All Infrastructure Types – Continued
  • 16. © Copyright 2015 AccelOps, Inc. All rights reserved. 16 Integrated Monitoring, Analytics & Management Tool
  • 17. 17© Copyright 2015 AccelOps, Inc. All rights reserved. Integrated Monitoring, Analytics & Mgmt. Security Network Monitoring Performance Monitoring Change Monitoring Application Monitoring Security Network monitoring Performance availability Change monitoring Application monitoring
  • 18. © Copyright 2015 AccelOps, Inc. All rights reserved. 18 Monitor-ID-Fix-Prevent Quickly & Easily
  • 19. 19© Copyright 2015 AccelOps, Inc. All rights reserved. CustomerMSP AccelOps Cluster AccelOps Collector Secure VPN Monitor-ID-Fix-Prevent - Quickly &Easily
  • 20. © Copyright 2015 AccelOps, Inc. All rights reserved. 20 Accelops Unified Network Analytics – For MSP’s
  • 21. 21© Copyright 2015 AccelOps, Inc. All rights reserved. MSP  Devices Collector   Multi-Tenant MSP Architecture Customer D Collector   Customer E MSP  Data  Center   AccelOps   Cluster   Customer A Customer B Customer C Customer  Devices  in   MSP  data  Center  
  • 22. © Copyright 2015 AccelOps, Inc. All rights reserved. 22 A Single Tool to Leverage New Opportunities
  • 23. 23© Copyright 2015 AccelOps, Inc. All rights reserved. Opportunity for MSP’s “The information security market will grow 13.8% in revenue in 2015, with the IT security outsourcing segment recording the fastest growth — 24.9%.” —
  • 24. © Copyright 2015 AccelOps, Inc. All rights reserved. 24 Q&A Mike Reinhart Director of Product Marketing www.accelops.com 1.408.510.5040 Mike.reinhart@accelops.com @accelops facebook.com/accelops Request a demo or free 30-day trial info@accelops.com
  • 25. © Copyright 2015 AccelOps, Inc. All rights reserved. 25 Appendix
  • 26. 26© Copyright 2015 AccelOps, Inc. All rights reserved. Major Security/Compliance Breaches – 2015 Company Records Stolen Type *Source - Bloomberg 80M •  Email and Physical Addresses •  SSN’s 109M 83M 145M 47,000 •  Credit Card Numbers •  Email Addresses •  Physical Addresses •  Email Addresses •  Email and Physical Addresses •  Login Credentials •  Proprietary Information •  Employee Details Major Data Breaches in the past 12 Months*
  • 27. 27© Copyright 2015 AccelOps, Inc. All rights reserved. Impacts to Business Bottom Line Average cost of 1 hour downtime Cost of attracting a new customer vs. retaining one # of consumers with bad experiences shared with more than 5 people $100K 54% 7 Times
  • 28. 28© Copyright 2015 AccelOps, Inc. All rights reserved. Opportunity for MSP’s Governance, Strategy, Assessment Operations and Assurance Forensics •  Architecture and Design •  Business Continuity •  Compliance Review •  Data Security Program •  Governance •  Program Assessment •  Policy Design •  Risk Assessment •  Strategy – People-Centric Security •  Application Vulnerability Assessment •  Secure Code Review •  Vulnerability Scan •  Configuration Assessment •  Device Security •  Fraud, Identification and Privacy •  Incident Response •  Network Pen Test •  Remote Access •  Threat Intelligence •  Cybercrime and Data Breach •  E-Discovery and Computer Forensics •  Compliance and Investigative Analytics Security Consulting Services Managed security services, auditing, project management, awareness (education) programs and training are not part of the definition. Source: Gartner (August 2015)
  • 29. 29© Copyright 2015 AccelOps, Inc. All rights reserved. — MSP Mentor Top Managed Services Offered Remote monitoring (+2) Cloud-based BDR (+3) Patch management (+4) Helpdesk/Service desk (+2) Managed email/anti-spam (0) Managed security (+5) NOC services (+10) Virtual Servers in the Cloud (+8) Software license management (+7) Mobile Device Management (+3) Managed Compliance (+7)
  • 30. 30© Copyright 2015 AccelOps, Inc. All rights reserved. Role Based Access
  • 31. 31© Copyright 2015 AccelOps, Inc. All rights reserved. Role Based Access for Your Admins Granular Roles can be applied. Customer 1 Customer 2 Customer 3 Customer 4 MSP Admin 1 MSP Admin 2 MSP Admin 3 The Cloud MSP Administrators/ Operators Windows Admin Database Admin Firewall Admin
  • 32. 32© Copyright 2015 AccelOps, Inc. All rights reserved. Bundled Reports