lsi spring agent open house 2014
DESCRIPTION
TRANSCRIPT
1 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
Welcome!LSI Spring Agent Open House
May 8, 2014
2 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
Thank you!
3
May 29
Diving Into The Cloud Webinar Series
www.linesystems.com VOICE l DATA l CLOUD 855.733.1000
“Show Me The Money!”Is Cloud Computing Really Cost
Effective?#DIVINGINTOTHECLOUD
Part 1: 6 Most Commonly Asked Questions About The Cloud
Part 2: Public, Private, or Hybrid Cloud – Which is Right For You?
Part 3: The “As a Service” Trend: Explained & Compared
Part 4: 5 Tips to Keep Your Data Secure on the Cloud
4 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
NEW Agent Portal
Survey Results: Ranking #1: Pricing & Quote Generation
#2: Pre-Qualification
#3: Client Activity
#4: Commission Integration
#5: Marketing Collateral
#6: Agent Documents
#7: Product Training Material
#8: Sales Activity Reporting/Dashboards
#9: Contact Us, Escalation List, Chat Features
#10: Social Media Integration
5 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
Q2 Promotions
Contact your LSI Channel Manager for more information
6
Eric Brunswick, Channel Account ExecutivePennsylvania
SophosSecurity made Simple
7
Agenda
• How Sophos solves Security Problems “Simply”
• How to find a Security Project
88
About Sophos
9
“Complex solutions aren’t solutions. We make security for the real world – for the pragmatic enterprise. Simple security is better security.”
Kris Hagerman, CEO Sophos
1010
The IT Security Challenge
11
Threat Volume1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
0
10,000,000
20,000,000
30,000,000
40,000,000
50,000,000
60,000,000
70,000,000
80,000,000
TotalMalware
250,000previously unseen files received each day within SophosLabs
Source: SophosLabs 2013
12
Web Servers Are Under Constant AttackEvery 2 Seconds Another New Malicious URL Appears
30,000malicious URLs seen each day. This is almost a new malicious URL every 2 seconds
80%of malicious URLs are actually legitimate sites that have been compromised
Source: SophosLabs 2013
13
Professionalism, Crimeware“Monetization”: Bulk of Threats Are Automated, Coordinated & Professional
50% 75% 88%
Welcome to the Age of Personalized Malware
50% of our detections are based on only 19 malware identities.
75% of unique pieces of malware are targeted attacks (i.e., are not seen beyond the organization targeted).
88% of malware found in fewer than 10 other organizations.
Source: SophosLabs 2013
14
14
Anyone can develop malware
15
IT Challenges
0% 10% 20% 30% 40% 50% 60%
20%
23%
32%
37%
44%
48%Maintaining security and compliance
Lack of people/resources to do everything that is being asked
Finding enough budget to refresh hardware and end point devices
Application/OS patching and updates
Supporting a wide range of devices
Managing users across remote locations
% of respondents who answered 1 or 2
What are the biggest challenges your IT organization faces in managing end users?Ranked in order with 1 being the biggest challenge
Source: Spiceworks Community Survey
16
Smaller Enterprises Lack IT Security StaffAverage Number of People in Organization Dedicated to IT Security
100-499Employees
500-999Employees
1000-4,999Employees
5000-19,999Employees
20,000+Employees
0
10
20
30
40
50
60
0 1 38
50
50% of IT Security Spend
Challenged by ComplexityLimited by Resources
17
Complicated by Security Challenges
Corporate Owned and
BYOD
Protect My Data
Go Wireless
Users Are Everywhere
What About Securing My
Servers?
Can’t Control Users via
Brute Force
Downtime Unacceptable
“Console Proliferation”
& “Agent Pollution”
Transition to the Cloud
Regulations & Compliance
Help Desk Queries
New Attack Surfaces
(Android, iOS)
250,000 New Threats Will
Appear Today
Polymorphic Threats Affect
Everyone
Macs Are No Longer
Immune
Not Just A “Big Company” Problem
IT Systems Are The Lifeblood
for Any Size Org
1818
How Sophos Helps
19
Complete Security
Deployed How You Want
Made Simple
Wherever the user is, whatever device they use
On premise, as a service or as a hardware or virtual appliance
Easy setup, managed via Cloud, etc.
Complete Security Can Be Made Simple
20
Complete Security, Made SimpleComplete Security…
Made Simple.
Network DevicesServers
Simple Deployment Simple Protection Simple Management
• On premise• Virtual• Cloud• User self provision
• Active Protection – real-time protection powered by SophosLabs
• Live lookups via the Cloud• SophosLabs experts tune the
protection so you don’t have to
Next GenFirewall
Anti-malware and IPS
URLFiltering
NetworkAccess Control
Wireless VPN Anti-Spam EmailEncryption
Anti-Malware
Mobile Encryption PatchAssessment
Application Control
Device Control
Encryption for Cloud
Endpoint WebProtection
Anti-Malware
Webserver Protection
Virtualization
Intuitive consoles: On Premise or
From the Cloud
Backed by expert support
21
• Do your end-users have mobile devices? How many users, how many devices?
• What are you using today for Endpoint and MDMD? How is it licensed? What is it costing you over 3 years?
• Wouldn’t it make sense to just pay once for all platforms and devices?
• Wouldn’t it make sense to get all the protection you need for Windows, Macs, phones and tablets in one license?
• Wouldn’t it be great if you didn’t have to count devices?
• Wouldn’t it be great to get it all from one vendor with support specifically focused on business?
22 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
Questions?
23 www.linesystems.com VOICE l DATA l CLOUD
855.733.1000
Thank you!