SlideShare a Scribd company logo
1
www.linesystems.com VOICE l DATA l CLOUD
Welcome!
LSI Spring Agent Open House
May 8, 2014
2
www.linesystems.com VOICE l DATA l CLOUD
Thank you!
3
May 29
Diving Into The Cloud Webinar Series
www.linesystems.com VOICE l DATA l CLOUD
“Show Me The Money!”
Is Cloud Computing Really Cost
Effective?
#DIVINGINTOTHECLOUD
Part 1: 6 Most Commonly Asked Questions About The Cloud
Part 2: Public, Private, or Hybrid Cloud – Which is Right For You?
Part 3: The “As a Service” Trend: Explained & Compared
Part 4: 5 Tips to Keep Your Data Secure on the Cloud
4
www.linesystems.com VOICE l DATA l CLOUD
NEW Agent Portal
Survey Results: Ranking
#1: Pricing & Quote Generation
#2: Pre-Qualification
#3: Client Activity
#4: Commission Integration
#5: Marketing Collateral
#6: Agent Documents
#7: Product Training Material
#8: Sales Activity Reporting/Dashboards
#9: Contact Us, Escalation List, Chat Features
#10: Social Media Integration
5
www.linesystems.com VOICE l DATA l CLOUD
Q2 Promotions
Contact your LSI Channel Manager
for more information
6
Eric Brunswick, Channel Account Executive
Pennsylvania
Sophos
Security made Simple
7
Agenda
• How Sophos solves Security Problems “Simply”
• How to find a Security Project
88
About Sophos
9
“Complex solutions aren’t solutions. We
make security for the real world – for the
pragmatic enterprise. Simple security is
better security.”
Kris Hagerman, CEO Sophos
1010
The IT Security
Challenge
11
Threat Volume
0
10,000,000
20,000,000
30,000,000
40,000,000
50,000,000
60,000,000
70,000,000
80,000,000
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
Total
Malware
250,000
previously unseen
files received each
day within
SophosLabs
Source: SophosLabs 2013
12
Web Servers Are Under Constant Attack
Every 2 Seconds Another New Malicious URL Appears
30,000
malicious URLs seen
each day. This is almost
a new malicious URL
every 2 seconds
80%
of malicious URLs are
actually legitimate
sites that have been
compromised
Source: SophosLabs 2013
13
Professionalism, Crimeware
“Monetization”: Bulk of Threats Are Automated, Coordinated & Professional
50% 75% 88%
Welcome to the Age of Personalized Malware
50% of our detections
are based on only 19
malware identities.
75% of unique pieces of
malware are targeted
attacks (i.e., are not
seen beyond the
organization targeted).
88% of malware found
in fewer than 10 other
organizations.
Source: SophosLabs 2013
14
14
Anyonecandevelopmalware
15
IT Challenges
20%
23%
32%
37%
44%
48%
0% 10% 20% 30% 40% 50% 60%
Maintaining security and compliance
Lack of people/resources to do
everything that is being asked
Finding enough budget to refresh
hardware and end point devices
Application/OS patching and updates
Supporting a wide range of devices
Managing users across
remote locations
% of respondents who answered 1 or 2
What are the biggest challenges your IT organization faces in managing end users?
Ranked in order with 1 being the biggest challenge
Source: Spiceworks Community Survey
16
Smaller Enterprises Lack IT Security Staff
Average Number of People in Organization Dedicated to IT Security
0 1
3
8
50
0
10
20
30
40
50
60
100-499
Employees
500-999
Employees
1000-4,999
Employees
5000-19,999
Employees
20,000+
Employees
50% of IT Security Spend
Challenged by Complexity
Limited by Resources
17
Complicated by Security Challenges
Corporate
Owned and
BYOD
Protect My
Data
Go Wireless
Users Are
Everywhere
What About
Securing My
Servers?
Can’t Control
Users via
Brute Force
Downtime
Unacceptable
“Console
Proliferation”
& “Agent
Pollution”
Transition to
the Cloud
Regulations &
Compliance
Help Desk
Queries
New Attack
Surfaces
(Android, iOS)
250,000 New
Threats Will
Appear Today
Polymorphic
Threats Affect
Everyone
Macs Are No
Longer
Immune
Not Just A “Big
Company”
Problem
IT Systems Are
The Lifeblood
for Any Size Org
1818
How Sophos Helps
19
Complete
Security
Deployed How
You Want
Made Simple
Wherever the user is,
whatever device they use
On premise, as a service or
as a hardware or virtual
appliance
Easy setup, managed via
Cloud, etc.
Complete Security Can Be Made Simple
20
Complete Security, Made Simple
Complete Security…
Made Simple.
Network DevicesServers
Simple Deployment Simple Protection Simple Management
• On premise
• Virtual
• Cloud
• User self provision
• Active Protection – real-time
protection powered by SophosLabs
• Live lookups via the Cloud
• SophosLabs experts tune the
protection so you don’t have to
Next Gen
Firewall
Anti-
malware
and IPS
URL
Filtering
Network
Access Control
Wireless VPN Anti-Spam Email
Encryption
Anti-
Malware
Mobile Encryption Patch
Assessment
Application
Control
Device
Control
Encryption
for Cloud
Endpoint Web
Protection
Anti-Malware
Webserver
Protection
Virtualization
Intuitive consoles:
On Premise or
From the Cloud
Backed by expert support
21
• Do your end-users have mobile devices? How many users, how many
devices?
• What are you using today for Endpoint and MDMD? How is it licensed?
What is it costing you over 3 years?
• Wouldn’t it make sense to just pay once for all platforms and devices?
• Wouldn’t it make sense to get all the protection you need for Windows,
Macs, phones and tablets in one license?
• Wouldn’t it be great if you didn’t have to count devices?
• Wouldn’t it be great to get it all from one vendor with support specifically
focused on business?
22
www.linesystems.com VOICE l DATA l CLOUD
Questions?
23
www.linesystems.com VOICE l DATA l CLOUD
Thank you!

More Related Content

PDF
Managing Mobile Business Insecurities
PPTX
Threat Exposure Management - Reduce your Risk of a Breach
PPTX
How Healthcare CISOs Can Secure Mobile Devices
PPTX
The Internet of Security Things (A Story about Change)
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PPTX
Be the Hunter
PPTX
The Future of Mobile Application Security
PDF
The Case For Next Generation IAM
Managing Mobile Business Insecurities
Threat Exposure Management - Reduce your Risk of a Breach
How Healthcare CISOs Can Secure Mobile Devices
The Internet of Security Things (A Story about Change)
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Be the Hunter
The Future of Mobile Application Security
The Case For Next Generation IAM

What's hot (20)

PDF
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
PPTX
Three ways-zero-trust-security-redefines-partner-access-v8
PPT
You Can't Spell Enterprise Security without MFA
PPTX
The cyber house of horrors - securing the expanding attack surface
PPTX
Zscaler mondi webinar
PPTX
Three ways-zero-trust-security-redefines-partner-access-ch
PDF
The Motives, Means and Methods of Cyber-Adversaries
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Alpha & Omega's Managed Security
PDF
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PPTX
Ma story then_now_webcast_10_17_18
PPTX
What Comes After VPN?
PPTX
INFINITY Presentation
PDF
Acunetix Training and ScanAssist
PDF
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
PPTX
3 reasons-sdp-is-replacing-vpn-in-2019
PPTX
Fragments-Plug the vulnerabilities in your App
PPTX
Faster, simpler, more secure remote access to apps in aws
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
Three ways-zero-trust-security-redefines-partner-access-v8
You Can't Spell Enterprise Security without MFA
The cyber house of horrors - securing the expanding attack surface
Zscaler mondi webinar
Three ways-zero-trust-security-redefines-partner-access-ch
The Motives, Means and Methods of Cyber-Adversaries
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Alpha & Omega's Managed Security
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Adopting A Zero-Trust Model. Google Did It, Can You?
Stop Account Takeover Attacks, Right in their Tracks
Ma story then_now_webcast_10_17_18
What Comes After VPN?
INFINITY Presentation
Acunetix Training and ScanAssist
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
3 reasons-sdp-is-replacing-vpn-in-2019
Fragments-Plug the vulnerabilities in your App
Faster, simpler, more secure remote access to apps in aws
Ad

Viewers also liked (10)

PDF
Lsi Nytro Flash 101 May 2012
PPTX
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
PDF
tempdb and Performance Keys
PDF
Microsoft SQL Server Flash Storage
PDF
San Francisco Bay Area SQL Server July 2013 meetings
PDF
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
PPTX
Which Flash is Best for MS-SQL?
PDF
SQL High Availability solutions E Book
PPTX
Application_Benchmark_into_Virtualization
PPTX
Geek Sync | Guide to Understanding and Monitoring Tempdb
Lsi Nytro Flash 101 May 2012
An Introduction to the Emulex Network Xceleration Solution – FastStack™ Sniff...
tempdb and Performance Keys
Microsoft SQL Server Flash Storage
San Francisco Bay Area SQL Server July 2013 meetings
Lsi Nytro flash ssd PCIe controllers product training value proposition and k...
Which Flash is Best for MS-SQL?
SQL High Availability solutions E Book
Application_Benchmark_into_Virtualization
Geek Sync | Guide to Understanding and Monitoring Tempdb
Ad

Similar to LSI Spring Agent Open House 2014 (20)

PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Securing with Sophos - Sophos Day Belux 2014
PPTX
Consider Sophos - Security Made Simple
PPTX
Sophos Cloud - breaking the stereotypes
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
Endpoint Protection
PPT
dataProtection_p3.ppt
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PPTX
8 Top Cybersecurity Tools.pptx
PDF
Introduction to Cybersecurity
PDF
THE SIGNIFICANCE OF CYBERSECURITY
PDF
Cybersecurity Concerns You Should be Thinking About
PDF
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
PDF
8 Top Cybersecurity Tools.pdf
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PPTX
Security Threat Presentation
PPTX
technical overview - endpoint protection 10.3.3
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
Addressing the cyber kill chain
Security: more important than ever - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Consider Sophos - Security Made Simple
Sophos Cloud - breaking the stereotypes
Anatomy of an Attack - Sophos Day Belux 2014
Endpoint Protection
dataProtection_p3.ppt
“8th National Biennial Conference on Medical Informatics 2012”
8 Top Cybersecurity Tools.pptx
Introduction to Cybersecurity
THE SIGNIFICANCE OF CYBERSECURITY
Cybersecurity Concerns You Should be Thinking About
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
8 Top Cybersecurity Tools.pdf
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Security Threat Presentation
technical overview - endpoint protection 10.3.3
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Addressing the cyber kill chain

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars

LSI Spring Agent Open House 2014

  • 1. 1 www.linesystems.com VOICE l DATA l CLOUD Welcome! LSI Spring Agent Open House May 8, 2014
  • 2. 2 www.linesystems.com VOICE l DATA l CLOUD Thank you!
  • 3. 3 May 29 Diving Into The Cloud Webinar Series www.linesystems.com VOICE l DATA l CLOUD “Show Me The Money!” Is Cloud Computing Really Cost Effective? #DIVINGINTOTHECLOUD Part 1: 6 Most Commonly Asked Questions About The Cloud Part 2: Public, Private, or Hybrid Cloud – Which is Right For You? Part 3: The “As a Service” Trend: Explained & Compared Part 4: 5 Tips to Keep Your Data Secure on the Cloud
  • 4. 4 www.linesystems.com VOICE l DATA l CLOUD NEW Agent Portal Survey Results: Ranking #1: Pricing & Quote Generation #2: Pre-Qualification #3: Client Activity #4: Commission Integration #5: Marketing Collateral #6: Agent Documents #7: Product Training Material #8: Sales Activity Reporting/Dashboards #9: Contact Us, Escalation List, Chat Features #10: Social Media Integration
  • 5. 5 www.linesystems.com VOICE l DATA l CLOUD Q2 Promotions Contact your LSI Channel Manager for more information
  • 6. 6 Eric Brunswick, Channel Account Executive Pennsylvania Sophos Security made Simple
  • 7. 7 Agenda • How Sophos solves Security Problems “Simply” • How to find a Security Project
  • 9. 9 “Complex solutions aren’t solutions. We make security for the real world – for the pragmatic enterprise. Simple security is better security.” Kris Hagerman, CEO Sophos
  • 12. 12 Web Servers Are Under Constant Attack Every 2 Seconds Another New Malicious URL Appears 30,000 malicious URLs seen each day. This is almost a new malicious URL every 2 seconds 80% of malicious URLs are actually legitimate sites that have been compromised Source: SophosLabs 2013
  • 13. 13 Professionalism, Crimeware “Monetization”: Bulk of Threats Are Automated, Coordinated & Professional 50% 75% 88% Welcome to the Age of Personalized Malware 50% of our detections are based on only 19 malware identities. 75% of unique pieces of malware are targeted attacks (i.e., are not seen beyond the organization targeted). 88% of malware found in fewer than 10 other organizations. Source: SophosLabs 2013
  • 15. 15 IT Challenges 20% 23% 32% 37% 44% 48% 0% 10% 20% 30% 40% 50% 60% Maintaining security and compliance Lack of people/resources to do everything that is being asked Finding enough budget to refresh hardware and end point devices Application/OS patching and updates Supporting a wide range of devices Managing users across remote locations % of respondents who answered 1 or 2 What are the biggest challenges your IT organization faces in managing end users? Ranked in order with 1 being the biggest challenge Source: Spiceworks Community Survey
  • 16. 16 Smaller Enterprises Lack IT Security Staff Average Number of People in Organization Dedicated to IT Security 0 1 3 8 50 0 10 20 30 40 50 60 100-499 Employees 500-999 Employees 1000-4,999 Employees 5000-19,999 Employees 20,000+ Employees 50% of IT Security Spend Challenged by Complexity Limited by Resources
  • 17. 17 Complicated by Security Challenges Corporate Owned and BYOD Protect My Data Go Wireless Users Are Everywhere What About Securing My Servers? Can’t Control Users via Brute Force Downtime Unacceptable “Console Proliferation” & “Agent Pollution” Transition to the Cloud Regulations & Compliance Help Desk Queries New Attack Surfaces (Android, iOS) 250,000 New Threats Will Appear Today Polymorphic Threats Affect Everyone Macs Are No Longer Immune Not Just A “Big Company” Problem IT Systems Are The Lifeblood for Any Size Org
  • 19. 19 Complete Security Deployed How You Want Made Simple Wherever the user is, whatever device they use On premise, as a service or as a hardware or virtual appliance Easy setup, managed via Cloud, etc. Complete Security Can Be Made Simple
  • 20. 20 Complete Security, Made Simple Complete Security… Made Simple. Network DevicesServers Simple Deployment Simple Protection Simple Management • On premise • Virtual • Cloud • User self provision • Active Protection – real-time protection powered by SophosLabs • Live lookups via the Cloud • SophosLabs experts tune the protection so you don’t have to Next Gen Firewall Anti- malware and IPS URL Filtering Network Access Control Wireless VPN Anti-Spam Email Encryption Anti- Malware Mobile Encryption Patch Assessment Application Control Device Control Encryption for Cloud Endpoint Web Protection Anti-Malware Webserver Protection Virtualization Intuitive consoles: On Premise or From the Cloud Backed by expert support
  • 21. 21 • Do your end-users have mobile devices? How many users, how many devices? • What are you using today for Endpoint and MDMD? How is it licensed? What is it costing you over 3 years? • Wouldn’t it make sense to just pay once for all platforms and devices? • Wouldn’t it make sense to get all the protection you need for Windows, Macs, phones and tablets in one license? • Wouldn’t it be great if you didn’t have to count devices? • Wouldn’t it be great to get it all from one vendor with support specifically focused on business?
  • 22. 22 www.linesystems.com VOICE l DATA l CLOUD Questions?
  • 23. 23 www.linesystems.com VOICE l DATA l CLOUD Thank you!