Monthly Archives: May 2015

trend-micro

How to Win the Cloud Security Game by Balancing Risk with Agility

The cloud is changing the way organisations around the world do I.T. Attracted by lower costs, improved efficiency and faster development and deployment times for apps, users everywhere are migrating to this new computing model in droves, with or without the blessing of I.T. Yet security is a top concern due to the loss of control of a physical infrastructure.

The challenge of balancing that greater business agility with security risk while keeping costs down is not an easy job. But it’s one that cloud managers will have to confront to be successful. And just like in a game of football, a winning strategy must be built on solid defence.

Shared responsibility

To articulate the challenges of cloud security, Trend Micro recently commissioned Forrester Consulting to survey I.T. professionals tasked with public cloud security projects. 70 percent said the public cloud was an integral part of the product or service they offered to customers.

It’s no surprise that security was a concern to three-quarters (76 percent) of them. In the public cloud, security is a shared responsibility. The cloud service provider will secure up to the hypervisor (including data centre and infrastructure), while the customer must take care of securing the OS, apps, users and data.

Kicking off

When determining how to best augment the secure infrastructure of their cloud provider, cloud managers should start by considering three aspects:

  1. Time to value – This is all-important to developers. It’s why two of the top three barriers to adopting best practice cloud security were given as “too time intensive” (43 percent) and “would slow down cloud usage” (36 percent). Forrester believes cloud resources must be made available in under 15 minutes, automated and out of sight, or developers may look to circumvent IT controls.
  2. Security risks – Cutting down on security in order to speed time to value will expose organisations to the risk of a data breach, including the financial penalties, damage to brand, legal costs, and consumer trust issues this could bring. Adding protection like data encryption, monitoring and logging, intrusion detection/prevention and patch management and other controls to cloud workloads provides multi-layered protection that reduces security risks.
  3. Cost – Applying maximum levels of security to every workload will drive up cost unnecessarily, impacting one of the main reasons of migrating to the cloud. It could also force developers to bypass security. But if you don’t add enough security, you become an easy target for hackers, leading to expensive data breaches. It’s a delicate balance.

Deep Security for the win!

Forrester believes the answer lies with security solutions offering pre-made templates with different levels of security to match the needs of individual workloads:

Optimal cloud security controls would be:

  • Automated: so when a developer launches a workload, it is automatically protected.
  • Personalized: with policies that fit the workload type, sensitivity and regulatory context.
  • Pre-built in a template: so the developer doesn’t have to know what the right security is for their workloads.

With Trend Micro Deep Security, we believe we have the best solution: enabling automated, comprehensive security that won’t get in your way. What’s more, Deep Security can protect your entire organisation – across physical, virtual and cloud environments and includes comprehensive protection in a single product and agent. Making management easier and lowering costs.

Contact our sales team today on 0118 9898 222 to find out more about Trend Micro Security Solutions.

selective swip 1

 

 

 

 

Originally published by AppRiver

New Mobile Device Management (MDM) features are coming home to AppRiver Office 365 Plus, including the ability to selectively wipe mobile devices. Selective wipe of mobile units allows an administrator to revoke access to and delete corporate email that has been synced to a device, as well as specific data associated with Office 365 apps on the device, while retaining any unassociated personal data.

admin 1

Selective wipe will work across a diverse range of phones and tablets, including iOS, Android and Windows Phone devices and is included at no additional cost for all AppRiver Office 365 Plus plans. The addition of the selective wipe capability and MDM features listed below to the already robust Office 365 Plus arsenal ensures that your Office 365 experience remains easy, effective and affordable

mobile device management 1

Mobile Device Management options include:

Selective wipe

Ability to perform either a full remote wipe of a corporate smartphone or tablet or a selective wipe of Office 365 company data from an employee’s device while leaving any personal data in place.

Conditional access

Set up security policies to ensure that Office 365 corporate email and documents can be accessed only on phones and tablets that are managed by your company and that are compliant with your IT policies.

Device management

Set and manage security policies, such as device-level pin lock and jailbreak or root detection, to help prevent unauthorized users from accessing corporate email and data on a lost or stolen device. 

Mobile Device Management Options introduced to AppRiver Office 365 Plus

Cloud-based management for devices that run on iOS (iPhone, iPad), Android and Windows Phone will be supported and the roll out for these capabilities will be completed in 4-6 weeks. All features will be included with all AppRiver Office 365 Plus and bundle licenses.

Contact our Sales Team today on  0118 9898 222 to find out more about Office 365

comptia-logo

The managed service best practice offerings template is intended to provide a list of the most common offerings that are currently being deployed by newly formed managed service practices.

The list has been developed based on the experience of IPED consultants, research conduct with numerous channel partners and direct discussions with partners that have successfully built an MSP practice. Although the customer offerings vary from MSP to MSP, most of the solution providers that have built a successful MSP practice have started their practice with one or more of a variety of managed services.  You can read the CompTIA Managed Service Best Practice Offerings study here.

Need more help with finding the right solutions for your MSP business? Call our sales team today on 0118 9898 222.

 

 

LabTech logo

Originally published on the LabTech Software blog

As a managed service provider (MSP), chances are you have a desire to take your business to the next level. The MSPs that are successful in this endeavour have a key ingredient in common: they are armed with the right tools for growth. The most critical tool for success in this business is a powerful remote monitoring and management (RMM) solution.

So the question is, what should you be looking for when you purchase an RMM tool, and why are those features important to your business?

The right RMM tool impacts your business success with five key benefits. With a powerful and feature-rich RMM solution in place, you can:

  1. Automate any IT process or task.
  2. Work on multiple machines at once.
  3. Solve issues without interrupting clients.
  4. Integrate smoothly into a professional services automation (PSA) tool.
  5. Manage everything from one control centre.

To better understand why these features are so influential, let’s talk a little more about each of them.

 Automate Any IT Process or Task

Imagine being able to determine a potential incident before your client feels the pain and fix it in advance to avoid that negative business impact. Being able to automate any IT process gives you the proactive service model you need to keep your clients happy for the long haul.

Work on Multiple Machines at Once

To solve complex issues, an MSP must be able to work on all the machines that make up a system. If you are attempting to navigate this maze via a series of webpages, it is hard to keep up with progress and makes it easy to miss a critical item during the diagnosis. Having the ability to work on multiple machines at once is paramount to developing your business model and maximizing your returns.

Solve Issues without Interrupting Clients

One of the biggest challenges that MSPs face is fixing issues without impacting their clients’ ability to work. With the wrong tools in place, the solution can be nearly as disruptive as the issue it’s meant to fix. The right tool must allow a technician to connect behind the scenes, troubleshoot and remediate the problem without impacting the client’s ability to work.

Integrate Smoothly Into a PSA Tool

Two-way integration between your RMM and PSA solutions eliminates bottlenecks and allows data to flow smoothly between the tools. The goal of integration is to enable you to respond more quickly to client needs as well as capture and store historical information that leads to easier root cause analysis.

A solid integration will also increase sales by turning data into actionable items that result in quotes and add-on solutions. The key areas to examine when looking at how a PSA and RMM integrate are:

  • Managing tickets and tasks
  • Capturing billable time
  • Assigning incidents based on device and technician
  • Scheduling and automating tasks
  • Identifying and managing sales opportunities
  • Managing and reporting on client configuration information

A solid integration into a PSA will create an end-to-end unified solution to help your more effectively run your IT business.

Manage Everything from One Control Centre

The control centre for your RMM solution should be the cockpit for your service delivery. Having the ability to manage aspects that are directly related to service delivery such as backup and antivirus from the same control centre keeps your technicians working within a familiar environment and speeds service delivery. Also, it cuts down on associated training costs by limiting their activities to the things that matter on a day-to-day basis.

 

Success means equipping your business with the right features and functionality to save your technicians time while increasing your revenue and profit margins. Selecting an RMM solution that solves for these five influential features is the key to getting started down the path to success. What are you waiting for?

 

Contact our Sales Team today on 0118 9898 222 for a demonstration of RMM software.

Malware attacks, security breaches and data corruption- just a few of the problems that business owners would prefer not to happen. Knowing these disasters cause businesses to lose money and sometimes their livelihoods, MSPs need to think about their customer’s disaster recovery plans and how long will it take for them to recover if the worst does happen?

The big questions are:

How quickly would they need to recover? This is the recovery time objective (RTO).  How much data can they afford to lose? That’s their recovery point objective (RPO).

Your RTO is a calculation of how quickly business processes need to be restored and resumed after a disaster—the maximum allowable downtime after which the consequences become unacceptable. Reduce the gap between the RTO and your recovery time actual (RTA), the time it actually takes the I.T. team to get servers functioning and that’s money in your customer’s pocket!

Your RPO is the maximum amount of data over time that could be lost. How much data can they afford to lose (or have the time to re-enter into the database)? A couple days’ worth of data? A few hours’ worth? Even less?

Whatever the answers are to these questions, having a disaster recovery solution that helps their businesses recover quickly is important to protect them against the worst happening.

Call our Sales Team today on 0118 9898 222 to find out about the best backup and recovery solutions for your business