Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
BalaBit Shell Control Box
Privileged Identity Management Enterprise Password Vault
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Secure SharePoint mobile connectivity
 61% of people reuse the same password on multiple sites.  44% change their password only once a year or less.  Password theft increased by 300% in.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
New Data Regulation Law 201 CMR TJX Video.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Information Security Technological Security Implementation and Privacy Protection.
Information Security as a Business Enabler Panos Dimitriou, MSc InfoSec, CISSP,CISM Director, Managed Security Services 2007.
Unify and Simplify: Security Management
Dell Connected Security Solutions Simplify & unify.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
·
Identity on Force.com & Benefits of SSO Nick Simha.
Protect Manage Optimize Why LastPass Enterprise?
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Frontline Enterprise Security
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
User and Device Management
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Welcome to today’s educational webinar for password management solution.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
Phase 4: Manage Deployment
The time to address enterprise mobility is now
Protect Manage Optimize Why LastPass Enterprise? Protect Manage Optimize.
Reduce Risk Across Hybrid IT
Transforming business
Data and database administration
Hybrid Management and Security
Identity and Access Management
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Reduce Risk Across Hybrid IT
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Cloud Connect Seamlessly
Access and Information Protection Product Overview October 2013
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
The MobileIron® Threat Detection difference:
GRC - A Strategic Approach
Agenda The current Windows XP and Windows XP Desktop situation
Modern benefits administration and HR software, supported by us.
Presentation transcript:

Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE

Overview About Us/Our Story Incremental Downtime Small Business Pain Incremental Downtime Cost Cost Savings & ROI What is Secure Sign On (SSO)? Benefits to our Customers Q&A

Our Story (MSP personalizes) We work with companies that are trying to manage unpredictable networks, soaring IT costs and are thinking about outsourcing their network support. Most of the companies we work with used to have issues like: Who owns the network, issues and problems? Staff acting as the Help-Desk Management involvement on network issues Provisioning and deprovisioning users Password management and handling multiple login credentials Achieving compliance and meeting regulations Mobile and application management in the new BYOD world We helped them analyze the benefits and cost savings of moving into a managed network support model.

What is Secure Sign On? Cloud-Based Secure Sign On Each user needs only one password for all applications and tools regardless of device Multifactor Authentication Ensures the highest level of security Mobile Device Management Manage, provision or remove any device, anywhere, anytime Active Directory Support Make Office 365 support easy & secure Highly Flexible Policy Management Customizable policy for single users or groups of users can be applied to BYOD devices

Small Business Customer Benefits Better Security With 80% of security breaches being password related, SSO provides Multi-Factor, SAML based security that greatly reduces the chance of losing valuable company data. AVG Business SSO direct integration with Active Directory is the most secure in the industry. Control of Mobile Devices Mobile devices have become an essential part of business. AVG Business SSO includes integrated cross-platform Mobile Device Management and enables us to lock, wipe and locate mobile devices, protecting all your clients devices in one place. Mobile Application Management Employees now enjoy single sign-on to all the applications they need to do their job, across all their devices, while respecting end user privacy on BYOD and personal data. Compliance and Auditing Every major compliance regulation (HIPAA, PCI, FISMA etc.) requires organizations to link access controls, role-based privileges, and user activity to named users. AVG Business SSO tracks and maintains these in audit logs.

Small Business Pain Mobile Management No control over iOS, OSX, Android Traditional MDM/EMM systems are hard to use and require technical skills Security No control of cloud and mobile applications on your staff’s mobile devices Staff on BYOD devices interacting with data and your network Non-compliant Password management Employees leaving with access company apps and data Compliance Hard time meeting regulatory requirements (like HIPAA, FISMA, PCI etc) Productivity Users don’t have the access and applications across all their devices Forgotten passwords

Incremental Downtime Overview Internet is completely down Server/Network device crashed No access to a critical LOB (line of business application) Back-up failure Security breach Virus / Malware Projects and network support Procurement assistance Asset disposal and recycling services High-end troubleshooting etc. etc. etc… Catastrophic Downtime Non productive/work related internet use Social media, and video Dating sites, Adult sites, etc. Network latency/page load issues Staff helping staff with Help desk related issues Management’s involvement with IT Mobile and Application Management Network/Application password resets Staff and management dealing with 3rd party MDM vendors Provisioning and deprovisioning users Incremental Downtime Reasons why our clients reach out to us Inefficiencies that are rarely considered downtime … and typically dealt with internally by management

Insert Calculator Slide Here Insert copy of.xls calculator slide that is customized for your customer’s number of employees and cost savings. Then replace figures below with cost figures.

Incremental Downtime Cost Your staff must enter a username and password with every login for every app and on every device Risk & Threat User frustration, writing down of passwords, reusing/sharing passwords Average downtime cost, $4,800 annually Passwords need to be changed approximately every 90 days Risk & Threat Inconsistent security policy across applications, reuse of passwords, compliancy issues and, good passwords are easy to forget Typical Downtime Cost $85 annually

When staff forgets their passwords or locks their accounts, they reach out to management Risk & Threat: Passwords reused, written down, user avoids working within an application, user and management frustration Average downtime cost, $ When your staff calls us for forgotten passwords or locked accounts, it takes much longer to resolve, and they’re not working Risk & Threat: Increased helpdesk calls/costs, frustrated business owners, lost productivity Average downtime cost, $ annually Incremental Downtime Cost

Manually provisioned and deprovisioned staff access to both web, and mobile based applications Risk & Threat: Expensive admin time, repetitive and error prone, not timely for on/off boarding employees Average downtime cost, $1, annually Separate MDM (Mobile Device Management) solutions Risk & Threat: Multiple vendors, multiple tools/skillsets, separate controls and visibility Average cost, $1, annually Incremental Downtime Cost

Small Business Cost For 50 employees and 5 applications daily Current Annual Cost Cost of logging into applications $4583 Helpdesk costs associated with lost passwords $3600 Cost of employee downtime due to lost passwords $600 Cost of provisioning or de-provisioning users $900 Annual cost w/o SSO$9683

Average annual small business cost: $9683 Typical annual savings... $4,883 Cost Savings with our SSO Program

MDM the way it should be… AVG Business SSO is truly managing Devices, Data and People… Active Directory Control extended across all users’ devices Users login with Multi-Factor Authentication Standards based secure, single sign-on across all devices and apps Policy Based Management of cloud and mobile applications Secure SOC 2, ISO platform

Questions & Answers