SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Safeguard your Business
$
~ OR ~
How to Take Cut IT Costs and
Boost Productivity WITHOUT
Exposing Your Company to
Security Breaches, Damaging
Litigation and Rogue (or Careless)
Employees
Who the Heck is
Denis Wilson and
Why Should I
Listen to Him?
“I am a veteran technology strategist who
specializes in developing highly effective
network and computing systems for small
businesses that provide professional services
or manufacture high-technology products.”
 Been working with Microsoft and their clients for
over 20 years
 Certified by Microsoft on cloud computing and
hybrid systems
 Very knowledgeable in vertical markets like
construction, engineering, architecture,
manufacturing, and the like
 Author and speaker on the subject of SMB
technology for SCORE, SBDC, EDCs, SBA, and
a variety of business associations
Slide Deck
Availability
Available at:
Slide Share: www.slideshare.net/dwpia
I also have over 15 presentations that are posted at
the same location for your perusal.
Ask me to connect with you on Facebook, LinkedIn or
Twitter if you would like to get my blog posts, and
curated posts on small business technology and
processes.
What We Are Going to Cover
PART 2 How technology can help you
PART 3 How to get started
PART 1 How to safeguard your business
Ultimately: We Are Going to Cover…
How To Be Smart, Strategic And Intentional With Your IT
Decisions To Maximize Profits, Boost Productivity, Fuel
Growth, Minimize Waste And Significantly Reduce Your
Exposure To Risk
(Versus Taking A Random And Haphazard Approach, Which Is What MOST
Businesses Do)
1. A No-Obligation
Strategic Network
Security
Assessment and
Report (Keep the
Report, It’s Yours)
2. And a Microsoft
Office 365 Business
Premium 30-day
trial
(A $300 Value)
Absolutely FREE.
Bonus!
Hang On Until The End And Get
This FREE!
Protect and control
your data
Be prepared for the
unexpected
The manageable
side of risk
management.
Our data has
to be secure.
What does
my modern
business need?
We need to reopen our
business quickly after an
emergency.
40% of businesses
hit by disaster
never reopen
FEMA 2013
60% SMB technology leaders
cited data security or privacy
as a concern
Boston Consulting Group study
Controlling
access
Protecting data
Managing
mobile devices
Backing up
your files
Ready for the
unexpected
Solutions for safeguarding your business
One of your team loses their
mobile device. You can:
• Lock the device to restrict
access
• Reset a user’s PIN to enable
access once it’s been found
• Wipe data from a device that
can’t be located
Manage and
protect
mobile devices.
PIN Reset
12__
Remote Data Wipe
Remote Lock
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
• Choose the level of security
and privacy you need
• Customize security by user, by
device and by location
Secure what
matters most.
Salesperson. Mobile worker. Access price
quotes, orders, inventory, customer data,
expense report forms
Human resources manager.
In the office. Access to
personnel files, benefits
information, resumes
Branch office manager. On
location. Access to budget
updates, time sheets,
inventory, scheduling
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
• Get to important applications
and information wherever you
are
• Keep company data on the
server, where it is backed up
and up to date
Control access
to your
business data.
HR
CRM
Easy remote access to on-site
applications
Sensitive data stays safe because it’s
on the server and not on a device
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Engineers protected
when on the roof or in
the street
“It was like an invisible and
impenetrable Iron Curtain
that allowed me to sleep at
night”
Tim McCarthy, CEO, TR2 Inc.
Data protection enables a more mobile workforce
without compromising security
TR2 has 2-3 engineers working all around
the U.S. every day. Company and client
critical information is on their laptops and
smartphones. They need to secure that data
without creating inefficiencies for their
engineers.
DWP Information Architects brought in
MaaS360 mobile device management to
secure all laptops, tablets and smartphones,
no matter the operating system.
The result: TR2 could be sure that their
client data was absolutely secure while
their engineers weren’t required to do
anything different.
5 employees | Architectural Engineering | www.tr2.comControllingaccess
Remote Wipe and Device Encryption protected lost
devices
All existing devices could be protected, so they did
not have to spend additional capital.
• Take advantage of a single
platform and easy-to-use
tools to proactively manage
desktops and devices
• Get dependable support from
experts
Simplify
management.
Products like Microsoft Intune and
IBM’s MaaS360 provide PC, mobile
device and application
management across popular
platforms (Windows, Windows
phone, iOS, and Android)
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Manage policies and devices with
ease with Office
Avoid spam and viruses with
continuously updated protection
Guard PCs and devices with
built-in device security like
BitLocker and encryption
Get automatic,
always-on
protection.
Full device encryption, like
BitLocker technology
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Fingerprint login
Protect against viruses, phishing, and malware, like with
Windows Defender, SmartScreen, and Malwarebytes
• Help ensure your data
remains private and secure
• Comply with industry
standards and data privacy
rules
Meet privacy
and security
standards.
Design for deep, multi-
level security through
encryption,
authentication and data
privacy rules.
Meet requirements
specified in
ISO27001, EU
Model Clauses,
HIPAA and more
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
• Threats are complex
• Design for attacks at all
stages of their life cycle
• And enable quick and
accurate mitigation
Protect data at
multiple stages
in the attack
lifecycle
Solutions focused on
one stage may fail,
especially when new or
unknown techniques
are used. An effective
prevention strategy
includes technologies
that detect and prevent
across each stage,
easily block known
threat components,
and hone in on evasive
behavior to ultimately
stop attackers from
reaching their end goal.
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Though prevention is
preferable, mitigation
and remediation cycles
continue to be an
important part of each
organization’s
cybersecurity strategy,
and when there’s an
infection, every minute
counts.
Advanced persistent
threats (APTs) are
designed to be evasive
in order to bypass
security defenses. It’s
incredibly easy to
fragment a payload into
several packets, change
a malicious file hash, or
spoof an email header.
Credit union keeps
business moving.
“With data
encryption, we no
longer worry
about data security
if the device is lost
or stolen.”
Mark Malinowski, Vice President
of Accounting
Data protection enables a more mobile workforce
without compromising security
Responsive performance and modern hardware
improves customer perception
Live Tiles increase the speed of publishing interest
rates and other real-time information
When natural disasters impacted their
ability to serve customers, RBFCU realized
they needed to increase mobility while
meeting financial industry standards for
data security.
We helped them move from desktop
Windows XP PCs to mobile Windows 10
ultrabooks and tablets.
The result: RBFCU improved customer
service and data security at the same time.
33 employees | Financial Services | www.rbfcu.coop
Protect&ControlYourData
Protect your files AND minimize
business disruption
Keep a replica of your entire server
and keep it updated frequently
Get your applications and
services back up and
running in minutes
Protect your files quickly and simply
– the first line of defense
Save copies of your files to a
second location
Quickly restore your files when
accidentally deleted or lost
Backup vs. Disaster Recovery
What’s the difference?
Together, two complementary layers of protection for your business
Disaster RecoveryBackup
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Get to your latest files from
anywhere when the unexpected
happens and never miss a step.
Never lose your
latest files –
even if you lose
your laptop or
device.Back up to a second location or
the cloud
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
File share and sync
stores files in the
cloud, keeping them
available
Environment engineers
took their data to the
cloud
“It just worked. It was so
much easier than what we
did before. And we’ve had
no outages”
Lisa Maturkanic, Office Manager, Meridian
Consultants LLC
Meridian got unlimited storage in the cloud and
shared to all of their employees no matter where they
were
Meridian Consultants had an over
abundance of graphic data files that
bogged down their server but the users
needed immediate access.
DWP Information Architects created a cloud
file share and sync network that backed up
to the network-attached storage on-site
The result: They got immediate results
while knowing that their “server” wasn’t
going down on them and having all their
files backed up on-site.
20 employees | Environmental engineers | www.meridianconsultantsllc.comBepreparedfortheunexpected
The critical files were backed up on-site so their
access was immediate and local
Version control was maintained when multiple
engineers accessed the file.
Get your critical
business apps
back up and
running in
minutes.
Keep your business running—
even in the event of a disaster
such as fire, break-in, or flood.
A modern server replicates apps
on your virtual machine to a
second virtualized host server at
a second site or in the cloud
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
• Ask for a financially-backed
99.9% uptime guarantee
• Ask for 24/7 support system
for business-critical issues
Count on the
reliability of
the cloud.
Look for continuous data backup
in globally-distributed data
centers
Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
Legal firm sails through
tornado with Windows
Server
IT at the Law Offices of Aaron I. Katsman couldn’t
keep up with the firm’s growth. Slow
performance and the need to frequently restart
servers significantly reduced productivity.
DWP Information Architects deployed Windows
Server 2012, using Hyper-V to create virtual
servers and desktop computers. They set up
automatic backup and failover capabilities to
guard against disaster.
The result: During tornado, employees
served customers from home – without
even realizing they were using the failover
system.
Bepreparedfortheunexpected
“Our computers are
our lifeline. When
tornado hit, Hyper-V
Replica saved our
business.”
Aaron I. Katsman, Owner, Law Offices
of Aaron I. Katsman
Delivered uninterrupted customer service despite a natural
disaster that could have impacted business continuity
Increased IT agility and reduced costs with virtual servers
desktops running on consolidated hardware
Gained time to focus on growing the business by reducing
IT hassles and improving system performance
30 employees | Law | www.katsmanlaw.com
ModernBiz
Choose your own path to modern,
with flexible, familiar, and trusted
solutions for your business – desktop
to mobile, server to cloud.
$
Next steps
Contact your favorite IT consultant
Take a guided tours products and
services to educate yourself
Sign up for a free trial
Get Your No-Obligation
Strategic Network Security
Assessment and Report (Keep
the Report, It’s Yours)
We are a vendor to business only, so we just ask
that the assessment call be for your small business
of 5 -100 PCs, and up to several servers. Offer good
until November 30th.
Denis Wilson
denis@dwpia.com
dwpia.com
Your Microsoft Partner in San Fernando Valley, West LA, and Ventura County
Optimize. Reinvigorate. Profit.

Más contenido relacionado

La actualidad más candente

Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
Bn 1023 demo network security
Bn 1023 demo  network securityBn 1023 demo  network security
Bn 1023 demo network securityconline training
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 

La actualidad más candente (18)

Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
About easySERVICE
About easySERVICEAbout easySERVICE
About easySERVICE
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Software-Brochure-2
Software-Brochure-2Software-Brochure-2
Software-Brochure-2
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Bn 1023 demo network security
Bn 1023 demo  network securityBn 1023 demo  network security
Bn 1023 demo network security
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 

Destacado (12)

SEO: How to Get More People to Your Website
SEO: How to Get More People to Your WebsiteSEO: How to Get More People to Your Website
SEO: How to Get More People to Your Website
 
SEO and SEM
SEO and SEMSEO and SEM
SEO and SEM
 
What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%What is the Cloud: and how does it reduce cost by 50%
What is the Cloud: and how does it reduce cost by 50%
 
Continuum / Channelnomics Webcast
Continuum / Channelnomics WebcastContinuum / Channelnomics Webcast
Continuum / Channelnomics Webcast
 
Connect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and TricksConnect With Customers: and Office 2013 Tips and Tricks
Connect With Customers: and Office 2013 Tips and Tricks
 
Office 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this techOffice 365: Why 98% of the Fortune 100 have adopted this tech
Office 365: Why 98% of the Fortune 100 have adopted this tech
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Modern Workplace: Office 2016
 Modern Workplace: Office 2016 Modern Workplace: Office 2016
Modern Workplace: Office 2016
 
ModernBiz CRM
ModernBiz CRMModernBiz CRM
ModernBiz CRM
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
Windows 10: Ease-of-use, multiple platforms, and security (plus fun stuff).
 
ModernBiz: Business Anywhere
ModernBiz: Business AnywhereModernBiz: Business Anywhere
ModernBiz: Business Anywhere
 

Similar a Safeguard Your Business

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITintellectittechnology
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcparnoldvilleneuve
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 

Similar a Safeguard Your Business (20)

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Key Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect ITKey Features of Managed IT Services - Intellect IT
Key Features of Managed IT Services - Intellect IT
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcp
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Dstca
DstcaDstca
Dstca
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 

Más de DWP Information Architects Inc.

Más de DWP Information Architects Inc. (7)

DWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdfDWP-Cybersecurity-2023.pdf
DWP-Cybersecurity-2023.pdf
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
SCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small BusinessSCORE Whitepaper: Disaster Impact on Small Business
SCORE Whitepaper: Disaster Impact on Small Business
 
Microsoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the CloudMicrosoft Whitepaper: Running Your Business in the Cloud
Microsoft Whitepaper: Running Your Business in the Cloud
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
Microsoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy GuideMicrosoft Whitepaper: Cloud Privacy Guide
Microsoft Whitepaper: Cloud Privacy Guide
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Safeguard Your Business

  • 1. Safeguard your Business $ ~ OR ~ How to Take Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breaches, Damaging Litigation and Rogue (or Careless) Employees
  • 2. Who the Heck is Denis Wilson and Why Should I Listen to Him? “I am a veteran technology strategist who specializes in developing highly effective network and computing systems for small businesses that provide professional services or manufacture high-technology products.”  Been working with Microsoft and their clients for over 20 years  Certified by Microsoft on cloud computing and hybrid systems  Very knowledgeable in vertical markets like construction, engineering, architecture, manufacturing, and the like  Author and speaker on the subject of SMB technology for SCORE, SBDC, EDCs, SBA, and a variety of business associations
  • 3. Slide Deck Availability Available at: Slide Share: www.slideshare.net/dwpia I also have over 15 presentations that are posted at the same location for your perusal. Ask me to connect with you on Facebook, LinkedIn or Twitter if you would like to get my blog posts, and curated posts on small business technology and processes.
  • 4. What We Are Going to Cover PART 2 How technology can help you PART 3 How to get started PART 1 How to safeguard your business
  • 5. Ultimately: We Are Going to Cover… How To Be Smart, Strategic And Intentional With Your IT Decisions To Maximize Profits, Boost Productivity, Fuel Growth, Minimize Waste And Significantly Reduce Your Exposure To Risk (Versus Taking A Random And Haphazard Approach, Which Is What MOST Businesses Do)
  • 6. 1. A No-Obligation Strategic Network Security Assessment and Report (Keep the Report, It’s Yours) 2. And a Microsoft Office 365 Business Premium 30-day trial (A $300 Value) Absolutely FREE. Bonus! Hang On Until The End And Get This FREE!
  • 7. Protect and control your data Be prepared for the unexpected The manageable side of risk management.
  • 8. Our data has to be secure. What does my modern business need? We need to reopen our business quickly after an emergency. 40% of businesses hit by disaster never reopen FEMA 2013 60% SMB technology leaders cited data security or privacy as a concern Boston Consulting Group study
  • 9. Controlling access Protecting data Managing mobile devices Backing up your files Ready for the unexpected Solutions for safeguarding your business
  • 10. One of your team loses their mobile device. You can: • Lock the device to restrict access • Reset a user’s PIN to enable access once it’s been found • Wipe data from a device that can’t be located Manage and protect mobile devices. PIN Reset 12__ Remote Data Wipe Remote Lock Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 11. • Choose the level of security and privacy you need • Customize security by user, by device and by location Secure what matters most. Salesperson. Mobile worker. Access price quotes, orders, inventory, customer data, expense report forms Human resources manager. In the office. Access to personnel files, benefits information, resumes Branch office manager. On location. Access to budget updates, time sheets, inventory, scheduling Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 12. • Get to important applications and information wherever you are • Keep company data on the server, where it is backed up and up to date Control access to your business data. HR CRM Easy remote access to on-site applications Sensitive data stays safe because it’s on the server and not on a device Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 13. Engineers protected when on the roof or in the street “It was like an invisible and impenetrable Iron Curtain that allowed me to sleep at night” Tim McCarthy, CEO, TR2 Inc. Data protection enables a more mobile workforce without compromising security TR2 has 2-3 engineers working all around the U.S. every day. Company and client critical information is on their laptops and smartphones. They need to secure that data without creating inefficiencies for their engineers. DWP Information Architects brought in MaaS360 mobile device management to secure all laptops, tablets and smartphones, no matter the operating system. The result: TR2 could be sure that their client data was absolutely secure while their engineers weren’t required to do anything different. 5 employees | Architectural Engineering | www.tr2.comControllingaccess Remote Wipe and Device Encryption protected lost devices All existing devices could be protected, so they did not have to spend additional capital.
  • 14. • Take advantage of a single platform and easy-to-use tools to proactively manage desktops and devices • Get dependable support from experts Simplify management. Products like Microsoft Intune and IBM’s MaaS360 provide PC, mobile device and application management across popular platforms (Windows, Windows phone, iOS, and Android) Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Manage policies and devices with ease with Office
  • 15. Avoid spam and viruses with continuously updated protection Guard PCs and devices with built-in device security like BitLocker and encryption Get automatic, always-on protection. Full device encryption, like BitLocker technology Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Fingerprint login Protect against viruses, phishing, and malware, like with Windows Defender, SmartScreen, and Malwarebytes
  • 16. • Help ensure your data remains private and secure • Comply with industry standards and data privacy rules Meet privacy and security standards. Design for deep, multi- level security through encryption, authentication and data privacy rules. Meet requirements specified in ISO27001, EU Model Clauses, HIPAA and more Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 17. • Threats are complex • Design for attacks at all stages of their life cycle • And enable quick and accurate mitigation Protect data at multiple stages in the attack lifecycle Solutions focused on one stage may fail, especially when new or unknown techniques are used. An effective prevention strategy includes technologies that detect and prevent across each stage, easily block known threat components, and hone in on evasive behavior to ultimately stop attackers from reaching their end goal. Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected Though prevention is preferable, mitigation and remediation cycles continue to be an important part of each organization’s cybersecurity strategy, and when there’s an infection, every minute counts. Advanced persistent threats (APTs) are designed to be evasive in order to bypass security defenses. It’s incredibly easy to fragment a payload into several packets, change a malicious file hash, or spoof an email header.
  • 18. Credit union keeps business moving. “With data encryption, we no longer worry about data security if the device is lost or stolen.” Mark Malinowski, Vice President of Accounting Data protection enables a more mobile workforce without compromising security Responsive performance and modern hardware improves customer perception Live Tiles increase the speed of publishing interest rates and other real-time information When natural disasters impacted their ability to serve customers, RBFCU realized they needed to increase mobility while meeting financial industry standards for data security. We helped them move from desktop Windows XP PCs to mobile Windows 10 ultrabooks and tablets. The result: RBFCU improved customer service and data security at the same time. 33 employees | Financial Services | www.rbfcu.coop Protect&ControlYourData
  • 19. Protect your files AND minimize business disruption Keep a replica of your entire server and keep it updated frequently Get your applications and services back up and running in minutes Protect your files quickly and simply – the first line of defense Save copies of your files to a second location Quickly restore your files when accidentally deleted or lost Backup vs. Disaster Recovery What’s the difference? Together, two complementary layers of protection for your business Disaster RecoveryBackup Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 20. Get to your latest files from anywhere when the unexpected happens and never miss a step. Never lose your latest files – even if you lose your laptop or device.Back up to a second location or the cloud Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected File share and sync stores files in the cloud, keeping them available
  • 21. Environment engineers took their data to the cloud “It just worked. It was so much easier than what we did before. And we’ve had no outages” Lisa Maturkanic, Office Manager, Meridian Consultants LLC Meridian got unlimited storage in the cloud and shared to all of their employees no matter where they were Meridian Consultants had an over abundance of graphic data files that bogged down their server but the users needed immediate access. DWP Information Architects created a cloud file share and sync network that backed up to the network-attached storage on-site The result: They got immediate results while knowing that their “server” wasn’t going down on them and having all their files backed up on-site. 20 employees | Environmental engineers | www.meridianconsultantsllc.comBepreparedfortheunexpected The critical files were backed up on-site so their access was immediate and local Version control was maintained when multiple engineers accessed the file.
  • 22. Get your critical business apps back up and running in minutes. Keep your business running— even in the event of a disaster such as fire, break-in, or flood. A modern server replicates apps on your virtual machine to a second virtualized host server at a second site or in the cloud Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 23. • Ask for a financially-backed 99.9% uptime guarantee • Ask for 24/7 support system for business-critical issues Count on the reliability of the cloud. Look for continuous data backup in globally-distributed data centers Controlling access Protecting dataManaging mobile devices Backing up your files Ready for the unexpected
  • 24. Legal firm sails through tornado with Windows Server IT at the Law Offices of Aaron I. Katsman couldn’t keep up with the firm’s growth. Slow performance and the need to frequently restart servers significantly reduced productivity. DWP Information Architects deployed Windows Server 2012, using Hyper-V to create virtual servers and desktop computers. They set up automatic backup and failover capabilities to guard against disaster. The result: During tornado, employees served customers from home – without even realizing they were using the failover system. Bepreparedfortheunexpected “Our computers are our lifeline. When tornado hit, Hyper-V Replica saved our business.” Aaron I. Katsman, Owner, Law Offices of Aaron I. Katsman Delivered uninterrupted customer service despite a natural disaster that could have impacted business continuity Increased IT agility and reduced costs with virtual servers desktops running on consolidated hardware Gained time to focus on growing the business by reducing IT hassles and improving system performance 30 employees | Law | www.katsmanlaw.com
  • 25. ModernBiz Choose your own path to modern, with flexible, familiar, and trusted solutions for your business – desktop to mobile, server to cloud. $
  • 26. Next steps Contact your favorite IT consultant Take a guided tours products and services to educate yourself Sign up for a free trial
  • 27. Get Your No-Obligation Strategic Network Security Assessment and Report (Keep the Report, It’s Yours) We are a vendor to business only, so we just ask that the assessment call be for your small business of 5 -100 PCs, and up to several servers. Offer good until November 30th.
  • 28. Denis Wilson denis@dwpia.com dwpia.com Your Microsoft Partner in San Fernando Valley, West LA, and Ventura County