msp deck v1.0

Post on 08-Apr-2017

365 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Mike Reinhart Director of Product Marketing AccelOps Inc.

September 2015

Evolve to Survive Delivering Better Managed Security Services at Higher Margins

Polling Question - #1

Which best describes your area of interest in this webinar?

Ø Currently offer Managed Security Services Ø Considering offering Managed Security

Services Ø General educational interest Ø Other

3 © Copyright 2015 AccelOps, Inc. All rights reserved.

Gartner: MSP “Key Issues”

Hyper Competition

MSP’s Must Change!

New Buyers = New Opportunity + Challenges

1

2

3

4 © Copyright 2015 AccelOps, Inc. All rights reserved.

Gartner: MSP Survival Strategies

Move from Implementer & Maintainer to Managed “Service” Provider

Retention = Critical Success Factor

Value Articulation

1

2

3

5 © Copyright 2015 AccelOps, Inc. All rights reserved.

Gartner: MSP Business Opportunities

Bi-Modal IT

Evolving Threat Landscape

Distributed Enterprise and Users

1

2

3

6 © Copyright 2015 AccelOps, Inc. All rights reserved.

Mode 1 Mode 2

Reliability Goal Agility

Price for performance Value Revenue, brand customer experience

Waterfall, V-Model, high-ceremony IID Approach Agile, kanban, low

ceremony ID

Plan-driven, approval-based Governance Empirical, continuous,

process-based

Enterprise suppliers, long-term

deals Sourcing Small, new vendors

short-term deals

Good at conventional

process, projects Talent Good at new and

uncertain projects

IT-centric, removed from customer Culture Business-centric,

close to customer

Long (months) Cycle Times Short (days, weeks)

Opportunity Trends – BiModal IT

Think Marathon Runner

Think Sprinter

7 © Copyright 2015 AccelOps, Inc. All rights reserved.

Opportunity Trends – Distributed Resources

8 © Copyright 2015 AccelOps, Inc. All rights reserved.

Opportunity Trends – Evolving Threats

9 © Copyright 2015 AccelOps, Inc. All rights reserved.

BlackHat: Future Threat Concerns Which do you believe will be of greatest concern two years from now?

10 © Copyright 2015 AccelOps, Inc. All rights reserved.

Polling Question - #2

What Percent of Businesses said they were ready for these trends?

Ø 92% Ø 73% Ø 62% Ø 27%

11 © Copyright 2015 AccelOps, Inc. All rights reserved.

BlackHat: Business Readiness to Respond

73% = Insufficient Security Staff

Data: UBM survey of 460 security professionals, June 2015

51%

27%

17% 5%

No, we could use a little help

No, we are completely underwater

What staff?

Yes

The 2015 Black Hat Attendee Survey

Does your organization have enough security staff to defend itself against current threats?

12 © Copyright 2015 AccelOps, Inc. All rights reserved.

Top 3 MSP “Must Haves”

Support for ALL Infrastructure Types

ID, Fix & Prevent - Faster

1

2

3

Integrated Monitoring and Analytics

© Copyright 2015 AccelOps, Inc. All rights reserved. 13

Support for All

Infrastructure Types

14 © Copyright 2015 AccelOps, Inc. All rights reserved.

Support for All Infrastructure Types

Local

Remote Office

Isolated DMZ

Private Cloud

Hybrid Cloud

Public Cloud

15 © Copyright 2015 AccelOps, Inc. All rights reserved.

AccelOps works with Google, AWS, & Rackspace on the following HyperVisors:

VMware ESX(i)

RedHat Kernel Virtualization Manager (KVM)

Support for All Infrastructure Types – Continued

© Copyright 2015 AccelOps, Inc. All rights reserved. 16

Integrated Monitoring,

Analytics & Management Tool

17 © Copyright 2015 AccelOps, Inc. All rights reserved.

Integrated Monitoring, Analytics & Mgmt.

Security Network

Monitoring Performance Monitoring

Change Monitoring

Application Monitoring

Security

Network monitoring

Performance availability

Change monitoring

Application monitoring

© Copyright 2015 AccelOps, Inc. All rights reserved. 18

Monitor-ID-Fix-Prevent

Quickly & Easily

19 © Copyright 2015 AccelOps, Inc. All rights reserved.

Customer MSP AccelOps Cluster AccelOps Collector

Secure VPN

Monitor-ID-Fix-Prevent - Quickly &Easily

© Copyright 2015 AccelOps, Inc. All rights reserved. 20

Accelops Unified Network

Analytics – For MSP’s

21 © Copyright 2015 AccelOps, Inc. All rights reserved.

MSP  Devices

Collector  

Multi-Tenant MSP Architecture

Customer D

Collector  

Customer E

MSP  Data  Center  

AccelOps  Cluster  

Customer A

Customer B

Customer C

Customer  Devices  in  MSP  data  Center  

© Copyright 2015 AccelOps, Inc. All rights reserved. 22

A Single Tool to Leverage New Opportunities

23 © Copyright 2015 AccelOps, Inc. All rights reserved.

Opportunity for MSP’s

“The information security market will grow 13.8% in revenue in 2015, with the IT security outsourcing segment recording the fastest growth — 24.9%.”

© Copyright 2015 AccelOps, Inc. All rights reserved. 24

Q&A Mike Reinhart

Director of Product Marketing

www.accelops.com

1.408.510.5040

Mike.reinhart@accelops.com

@accelops

facebook.com/accelops

Request a demo or free 30-day trial info@accelops.com

© Copyright 2015 AccelOps, Inc. All rights reserved. 25

Appendix

26 © Copyright 2015 AccelOps, Inc. All rights reserved.

Major Security/Compliance Breaches – 2015 Company Records Stolen Type

*Source - Bloomberg

80M •  Email and Physical Addresses •  SSN’s

109M

83M

145M

47,000

•  Credit Card Numbers •  Email Addresses

•  Physical Addresses •  Email Addresses

•  Email and Physical Addresses •  Login Credentials

•  Proprietary Information •  Employee Details

Major Data Breaches in the past 12 Months*

27 © Copyright 2015 AccelOps, Inc. All rights reserved.

Impacts to Business Bottom Line

Average cost of 1 hour downtime

Cost of attracting a new customer vs. retaining one

# of consumers with bad experiences shared with more than 5 people

$100K

54%

7 Times

28 © Copyright 2015 AccelOps, Inc. All rights reserved.

Opportunity for MSP’s

Governance, Strategy, Assessment

Operations and Assurance Forensics

•  Architecture and Design •  Business Continuity •  Compliance Review •  Data Security Program •  Governance •  Program Assessment •  Policy Design •  Risk Assessment •  Strategy

– People-Centric Security

•  Application Vulnerability Assessment

•  Secure Code Review

•  Vulnerability Scan

•  Configuration Assessment

•  Device Security

•  Fraud, Identification and Privacy

•  Incident Response

•  Network Pen Test

•  Remote Access

•  Threat Intelligence

•  Cybercrime and Data Breach

•  E-Discovery and Computer Forensics

•  Compliance and Investigative Analytics

Security Consulting Services

Managed security services, auditing, project management, awareness (education) programs and training are not part of the definition.

Source: Gartner (August 2015)

29 © Copyright 2015 AccelOps, Inc. All rights reserved.

— MSP Mentor Top Managed Services Offered

Remote monitoring (+2)

Cloud-based BDR (+3)

Patch management (+4)

Helpdesk/Service desk (+2)

Managed email/anti-spam (0)

Managed security (+5)

NOC services (+10)

Virtual Servers in the Cloud (+8)

Software license management (+7)

Mobile Device Management (+3)

Managed Compliance (+7)

30 © Copyright 2015 AccelOps, Inc. All rights reserved.

Role Based Access

31 © Copyright 2015 AccelOps, Inc. All rights reserved.

Role Based Access for Your Admins Granular Roles can be applied.

Customer 1 Customer 2 Customer 3 Customer 4

MSP Admin 1

MSP Admin 2

MSP Admin 3

The Cloud MSP Administrators/Operators

Windows Admin

Database Admin

Firewall Admin

32 © Copyright 2015 AccelOps, Inc. All rights reserved.

Bundled Reports

top related