Hi {{ session.user.profile.firstName }}

Asóciese con Canonical y Zentyal y aumente su negocio de servicios gestionados

Manage webcast
Ignacio Correas, Director Gerente de Zentyal y Alex Hartwig Pérez, Director de Servicios Corporativos de Canonical
¿Quiere entrar en el mercado de servicios gestionados y hacer crecer su negocio en 2012? Apuntese a este webinario y aprenda cómo puede satisfacer todas las necesidades de sus pequeños y medianos clientes.

Ignacio Correas, Director Gerente de Zentyal y Alex Hartwig Pérez, Director de Servicios Corporativos de Canonical, explicarán los nuevos servicios que puede ofrecer a sus clientes asociandose con Canonical y Zentyal. Aprenderá cómo atraer más clientes, cómo su soporte técnico será más eficiente, así como de qué manera puede convertirse en Partner Autorizado Zentyal-Ubuntu en su region.

Durante la sesión se explicará:

* ¿Cómo añadir servicios lucrativos a su cartera, sin una gran inversión inicial?
* Todos los beneficios que ofrece el acuerdo de partenariado con Zentyal-Canonical
* Cómo convertise en un Partner Autorizado Zentyal-Ubuntu en su región

Este seminario es ideal para:

* Cualquier proveedor de servicios TIC que ofrecen a las pymes en la actualidad servicios de infraestructura bajo el modelo de soporte break-fix y que quiera convertirse en un proveedor de servicios gestionados más eficiente y escalable.
* Cualquier MSP recién fundado en proceso de elección de la tecnología que utilizarán para proveer servicios gestionados. Aprendará como una única tecnología y punto de contacto con el fabricante le permitirá ofrecer soluciones y servicios TIC para todos sus clientes pymes.
Apr 26 2012
37 mins
Asóciese con Canonical y Zentyal y aumente su negocio de servicios gestionados
More from this community:

IT Security

  • Date
  • Rating
  • Views
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Cloud Access Security Brokers (CASBs) are one of the hottest new security technologies on the market. Recommended by Gartner, they provide visibility and control in a new IT world now based in public cloud applications and corporate data being accessed by employee BYOD devices.
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency
  • As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.

    On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:

    - different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
    - how companies have used BitSight Security Ratings to notify key vendors of security incidents
    - how vendor ratings can allow for more effective communication and thus greater transparency

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Asóciese con Canonical y Zentyal y aumente su negocio de servicios gestionados
  • Live at: Apr 26 2012 9:00 am
  • Presented by: Ignacio Correas, Director Gerente de Zentyal y Alex Hartwig Pérez, Director de Servicios Corporativos de Canonical
  • From:
Your email has been sent.
or close
You must be logged in to email this