Cloud Security for SMB Managed Service Providers

Charles Weaver, Luke Walling, Kevin Kilpatrick
IT security has long been a problem at the enterprise and mid-market levels. MSPs have been actively assisting these organizations prepare for and deal with internal and external security threats. But, what about the small business?

Small businesses and organizations with employees under 100 have traditionally been left to fend for themselves. Larger MSPs historically do not focus on these smaller opportunities, leaving these organizations vulnerable to many cyber threats that are just as damaging to them as to larger enterprises. So, what is to be done?

Attend this free webcast and hear the business case for providing cost effective, efficient, and secure, cloud based security offerings specifically to those organizations that are currently not protected from all the dangers facing them.
Apr 11 2013
65 mins
Cloud Security for SMB Managed Service Providers
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (138)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • Virtualizing The Network Edge – New Opportunities & Profitability for MSPs Recorded: Jun 24 2014 62 mins
    Are you (MSP) looking to increase managed services revenue by 4X, reduce managed services expenses by as much as 10X, rapidly grow managed subscriber count and better retain existing subscribers? Then attend this webinar to explore how new virtualization and SDN technologies can realize these lofty goals.

    MSPs have had their eyes on the growing SMB market for years, but most have found it a challenge to provide IT services that could both meet the budget constraints of these customers and provide an attractive profit to the MSP. Virtualized Networks is the new game-changing opportunity.

    Guest panel speakers will highlight how the benefits of virtualized networking:

    • Provides an extensible platform for new services to be deployed
    • Enables MSPs to deploy a managed service with no truck roll required
    • Gives you a Touch, Trial and Commit offering
    • Overlays your existing physical network infrastructure
    • Creates a highly profitable new service offering
    • Can virtually grow your customer reach outside your physical region

    Join our MSP panel for a riveting discussion!
  • Data Center Technology for Today’s MSP Recorded: Mar 12 2014 62 mins
    Today’s Service Providers have unique technology business needs.
    The technology in your data center can position you to address these needs and help you stay nimble and competitive.

    Join us on March 12, to hear from today’s leading technology providers who understand the unique needs of an MSP. Hear from a speaker panel of experts who understand the MSP space and how technology can help you stay relevant and a step ahead of the competition.

    Experts from global IT companies IBM and Insight will talk about:
    · How technology can help MSP’s compete, grow and differentiate

    · The resources, programs and sourcing options to make leading technology more accessible

    · The latest technology solutions that address the unique IT needs of Managed Service Providers
  • The Most Dangerous Security Risks Facing Your MSP Practice in 2014 Recorded: Mar 11 2014 62 mins
    MSPs face many security challenges, both directly and on behalf of their customers. Sometimes, these security risks change so rapidly it seems difficult to tell which are more serious than others.

    This webcast will feature a roundtable discussion of MSP business owners and hear their thoughts on the top security risks they face and how they protect their clients.
  • 5 Techniques for Effectively Selling Backup & Storage Managed Services Offerings Recorded: Jan 16 2014 62 mins
    There are many types of managed service provider who deliver a variety of managed offerings to their customers. However, one of the more popular managed offerings in the last several years has been backup and storage solutions. Yet, with all the popularity surrounding backup and storage offerings, it has become increasingly difficult for MSPs to differentiate their backup services to customers.

    This webcast will feature real life perspectives from MSPs and other managed services professionals who will attempt to offer practical and beneficial techniques for you to improve the marketing, messaging surrounding your managed backup offerings, including closing more deals!

    Webcast Highlights:

    - Sales techniques that work for MSPs
    - Marketing to distinguish your backup service offering
    - Vertical markets open to backup solutions
    - Building a backup offering into your managed services practice

    Speakers:

    Steve Rutkovitz founded Choice Technologies in 1995 with the vision of developing a hands-on group of individuals who could pool their knowledge and excitement about IT to deliver proactive, full-service solutions to companies that weren’t quite sure how to get the technology results they needed. The company began as a small, local network integration business to help small companies utilize technology efficiently.

    Chris Groot joined GFI in 2013 as Vice President, Sales & Business Development responsible for helping GFI’s cloud backup platform become the pervasive technology choice for MSPs and resellers. Chris Groot’s background in SAAS-based software companies is extensive, both as an entrepreneur and in leadership roles at a publicly traded company. Chris has been involved with a range of cloud based technologies over the past 13 years and is a graduate of the University of Calgary MBA program.
  • A Service Provider’s Guide to the Changing Threat of IT Security Recorded: Nov 6 2013 63 mins
    Cloud & managed service providers (and their customers) are facing a constantly changing array of threats to the IT network. The old ways of protecting IT are no longer sufficient. New methods for protecting devices, applications, and customer data, must be explored in order to remain on the cutting edge of managing security.

    This webcast will explore some of the more common threats facing IT today, as well as helpful solutions for safeguarding against those threats.

    Webcast Highlights:
    BYOD policies to protect customer data while allowing for maximum user productivity
    Web based threats
    The changing nature of the network perimeter
    Learn how to develop a comprehensive IT security framework for your users
    Cloud security that blends both public and private cloud environments

    Who should attend?
    VARs
    MSPs
    Break/Fix Providers
    Hosting companies
    Data Centers
    ISPs

    Join our panel of managed services experts and learn how to take protect your cloud and managed services practice!
  • Achieve Managed Services Growth Without Risking Large Capital Expenditures Recorded: Oct 24 2013 61 mins
    Today’s Managed Service Providers and end-users are facing the traditional IT purchasing challenges of difficulty predicting capacity requirements, constrained IT budgets, and long procurement cycles. Attendees of this webcast will learn about Infrastructure as a Service best practices that can help MSPs (and your customers) cut up-front expenses and rapidly adjust to dynamic business demands. Learn how to manage growing server and storage capacity requirements without it negatively impacting your cash flow.

    Webcast Highlights:

    · Learn to mitigate the risks associated with starting and/or extending a hosting services business.
    · Offer customers an affordable and secure way to realize many of the benefits of private cloud computing.
    · Improve asset utilization: move away from fixed towards usage based payments, resulting in a significant cost savings.
    · Simplify growth planning logistics by including a buffer for growth so extra capacity is always available onsite.
    · OPEX vs. CAPEX creates an operating expense environment eliminating the need for up-front capital expenditure.
    · All-inclusive payments: learn how to make invoicing and payments for your customers very easy leveraging monthly payments including service fees, install, maintenance, break/fix, and capacity planning.

    Who should attend?
    · VARs
    · MSPs
    · Break/Fix Providers
    · Hosting companies
    · Data Centers
    · ISPs

    Join our panel of managed services experts and learn how to take your cloud and managed services practice to the next level!
  • Good Cloud, Bad Cloud: 5 Ways You Can Distinguish Your Services Practice Recorded: Sep 25 2013 62 mins
    Summary:

    Public cloud vendors are taking a beating. Accusations of government surveillance, unplanned outages, and other highly embarrassing revelations have been the talk of major media groups all around the world. Yet, these public cloud vendors do not represent the vast majority of managed service providers (including cloud) who strive each day to secure their customers’ data and privacy needs.

    Join a panel of experts who will explore ways to educate, market, and sell backup and other cloud-based solutions in private cloud environments. During this online event, you will learn how to:
    · Educate your customer on the difference between your services and public cloud!
    · Understand the existing and pending regulations affecting data storage
    · Understand the true value of your technology partners
    · Make sure your sales and marketing teams are properly trained on data regulations
    · Have proper audit and transparency documentation for highly regulated customers

    Who should attend?
    · VARs
    · MSPs
    · Break/Fix Providers
    · Hosting companies
    · Data Centers
    · ISPs

    This webcast will be moderated by Charles Weaver. Take control of your managed services and cloud future!
  • An MSPs Guide to Cloud Computing Profitability Recorded: Sep 10 2013 65 mins
    September 10th, 2013: 11:00 AM - 12:00 PM
    It is undeniable that cloud computing will play a role for many customers; both today and in the future. But, what is the best approach to integrating a cloud offering in your managed services practice?

    Attend this free webcast and participate in an interactive roundtable discussion of cloud and MSP experts who will offer guidance of the following topics:

    Striking the perfect blend of public and private cloud offerings
    Developing a cloud strategy
    Financing your cloud growth
    How does cloud fit into a managed services strategy?
    Formulating a profitable cloud architecture
    Building a cloud platform that can last
    Who should attend?

    VARs
    MSPs
    Break/Fix Providers
    Hosting companies
    Data Centers
    ISPs
    Join our panel of experts, moderated by Charles Weaver, and take control of your cloud future!

    This free webcast is brought to you by ThinkGrid
  • What is my Managed Services Company Worth? Recorded: Jul 16 2013 60 mins
    You spent years building up your MSP and now have decide it the time to work on an exit plan. In this webinar we will cover the basics of M&A in the MSP space, which is unique from other business.

    Topics to be discussed include:

    - What are the typical characteristics that factor into your valuation?
    - Are my financials in order?
    - What does an investor or buyer expect me to divulge?
    - If I am contacted about selling how should I respond?
    - How should I leverage my accountant and lawyer?
    - Should I sell now or hold for another month, quarter, year?
    - What will a typical deal structure look like?
    - What is the difference between a business broker and intermediary?

    In this webinar Charles Weaver and Gene Fay industry experts in the MSP and MSP M&A field will explain these questions and many more.
  • Tips on Selling Cloud Backup Services The Right Way Recorded: Jun 5 2013 61 mins
    Successful managed services providers (MSPs) have the luxury of boasting about their secret for success. Do you? Discover how you can achieve success in selling cloud backup to your clients. In this webinar, you will hear from MSPs who have expanded their business by selling smart data storage and protection solutions.

    Here’s a sneak peak at some of those tips...

    · Avoid commodity positioning

    · Don't compare your pricing with other MSPs

    · Educate your customer on the difference between your services and public cloud!

    · Understand and identify with whom you are selling too

    · Make sure your sales and marketing teams are properly trained

    · Go vertical, work less!

    This webinar is ideal for MSPs looking to sell or improve their backup and recovery service offerings. It is also ideal for VARs looking to expand their business by selling cloud backup services.
  • Cloud & MSP Certification: Building Trust & Transparency with your Customers Recorded: May 22 2013 63 mins
    Over the years true MSPs have had to work diligently to differentiate themselves from companies that are at best, not true MSPs and at worst, are shady fly-by-night operators. This is where the Unified Certification Standard or (UCS) for Cloud & Managed Service Providers comes in.

    The UCS was created by a team of dedicated MSPs to address the shortfalls of existing standards like ISO 27001, ITIL, CoBIT, SSAE 16, which were never intended for managed services organizations and offered little in the way of consumer protection.

    CASE IN POINT: Many MSPs do NOT fail because of technical deficiencies, but due to financial risk. Because of this, customers have very little insight into the service provider's business practices and financial strengths and capabilities.

    Attend this webcast and you will hear from real MSP executives on how the UCS certification and audit has helped them to:

    - Win new business
    - Provide needed transparency to customers
    - Achieve compliance objectives
    - Quickly develop trust with customers and prospects
    - Provide documentation on how those MSPs deliver their services
    - And much more...

    Both Cloud and Managed Service Providers should attend this webcast and at least begin to follow the standards necessary to achieve managed services and cloud computing excellence.
  • Cloud Security for SMB Managed Service Providers Recorded: Apr 11 2013 65 mins
    IT security has long been a problem at the enterprise and mid-market levels. MSPs have been actively assisting these organizations prepare for and deal with internal and external security threats. But, what about the small business?

    Small businesses and organizations with employees under 100 have traditionally been left to fend for themselves. Larger MSPs historically do not focus on these smaller opportunities, leaving these organizations vulnerable to many cyber threats that are just as damaging to them as to larger enterprises. So, what is to be done?

    Attend this free webcast and hear the business case for providing cost effective, efficient, and secure, cloud based security offerings specifically to those organizations that are currently not protected from all the dangers facing them.
International Associations of Cloud & Managed Service Providers
News and education for the global managed services and cloud computing profession.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Security for SMB Managed Service Providers
  • Live at: Apr 11 2013 6:00 pm
  • Presented by: Charles Weaver, Luke Walling, Kevin Kilpatrick
  • From:
Your email has been sent.
or close
You must be logged in to email this