SlideShare a Scribd company logo
The Top 7 Causes of Major
Security Breaches
Meet Our Speakers
Cynthia James
Director Business Development, CISSP
Jason Dettbarn
Senior Technology Strategist
Moderator:
Alex Brandt
VP Americas
The Power of Layered Security
• Founded in 1997; largest private anti-malware company –
100% focused on anti-malware
• Over $700M annual revenues
• Presence in 19 countries
• #1 vendor in Germany, France, Spain, Eastern Europe
• Protecting over 300 million end points
About our Expert Speakers:
Kaspersky
Today’s Agenda
 The Cybercrime Comprehension Gap
 The Top 7 Causes of Security Breaches
 5 Cybercrime Facts People Don’t Know
 Security Solution Overview
 3 Tips for CyberSafety at Home
 Giveaway
 Questions & Answers
• 200k unique malware samples PER YEAR were
identified in 2006; 2M in 2007…now it’s up to 200K
malware samples PER DAY.
• The quality of malware improves every year.
| June 5, 2013PAGE 6 |
Cybercrime Threatscape:
Malware Growth
• Recent years have seen exponential growth in malware.
• Anyone can enter the cybercrime game.
• Cybercriminals earn over $100B a year.
• Cybercrime will never stop.
The Current Malware
Comprehension Gap
| June 5, 2013Kaspersky Lab PresentationPAGE 7 |
Where most employees/end users
think we still are
Where we really
are today (2013)
Over 200K
Per DAY
#1: End User Error & Malice
#2: There’s No Perimeter to Protect
#3: Mobile Devices Are Ideal
Entry Points
Speaking of Mobile
Threats…the Latest
 Malware is downloaded based on the device/platform
 “Crackers” are widely available: open app, insert malware,
repost it
 Google removed 100 malicious apps from their store…but
not before one was downloaded 260K times
 Mobile malware steals transaction authentication numbers
associated with banking + personal data
 Advertisers receive the same information we provide the
app (geolocation apps for example)
#4: Loss of Mobile Devices
#5: Lack of Layered Defense
#6: Cybercriminals Are Vastly
Underestimated
#7: Users Don’t Keep Up With
New Tactics
1. (Incredible volume; low barrier to entry;
earnings are huge)
2. 60% of companies take 3 months
or longer to discover they were breached
3. First cell phone botnet was discovered in 2012
4. AV is not a product, and all AV is not created equal
5. 80% of burglars use Facebook and personal
websites to select victims
5 Facts 90% of people don’t
know about cybercrime
1. End User error or malice
2. There’s no perimeter to protect
3. Mobile devices are ideal entry points
4. Loss of mobile devices (mobile workforce)
5. Lack of layered defense (patching, end point AV,
gateway AV, policy enforcement)
6. Cybercriminals are vastly underestimated
7. Users don’t keep up on new tactics
The Top Seven
Layered Security:
Let’s Take a Look…
 1. Personal banking:
 ATM skimming on the rise
(cover the keypad)
 Log on after your AV is updated
 2. Never use an unknown USB!!!
 3. Turn off geolocators on kids’ cell phones
3 Tips for Home CyberSafety
| June 5, 2013Kaspersky Lab PresentationPAGE 19 |
Conclusion: Layered Security with
Kaseya & Kaspersky
 Kaspersky KLAB Digest IT
- Free Security Bulletin
 Free Kaseya Security Bundle Trial
Special Giveaways
| June 5, 2013Kaspersky Lab PresentationPAGE 21 |
Interested? Just respond to the Poll located on the
right bottom corner of your Webex platform!
Industry standard for
IT automation
Solutions & Services
Who are we?
Our solutions empower people to
proactively manage and control
IT assets remotely, easily and
efficiently from one integrated
Web-based platform
Who are we?
The Top 7 Causes of Major Security Breaches
Why Kaseya?
A single Kaseya user can proactively
manage 1,000s of automated IT
systems tasks in the same amount of
time required by a team of technicians
using other techniques.
www.kaseya.com
Discover the State of IT
• Systems
• Assets
• Mobile Devices
• Network Devices
Manage the State of IT
• Scheduling
• Procedures
• API/Messaging
Automate the State of
IT
• Reporting
• Dashboards
• Interactive Data Views
IT Configuration Management
Asset Management
Security
Business Continuity
Service Delivery
Systems Monitoring
• Remote Management
• Software Deployment
• Power Management
• Image Deployment
• Desktop Migration
• Mobile Device Management
• Network Discover & AD
• Hardware/Software
• Asset Management
• Virtual Machine Management
• AntiVirus
• AntiMalware
• Patch Management
• Software Updates
• Image Backup
• Image Virtualization
• File & Folder Backup
• Service Desk/Ticketing
• Policy Management
• Service Billing
• Policy Compliance
• Time Tracking
• Systems Checks & Alerts
• Agent Monitoring
• Enterprise Monitoring
• Agent-less Monitoring
• Log Monitoring
UNIFIED MANAGEMENT
www.kaseya.com
Our Vision
“Providing Enterprise-Class IT Systems
Management for Everybody”
Q&A & Resources
Cynthia James
Director Business Development, CISSP
Jason Dettbarn
Senior Technology Strategist
Join Us:
Sign Up for a Demo!
Kaseya.com/ITdemo
Contact us:
1 (877) 926-0001
sales@kaseya.com
Learn more:
www.kaseya.com

More Related Content

PPTX
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
PPTX
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Pro Mrkt
 
PPTX
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
PDF
Outpost24 webinar - A day in the life of an information security professional
Outpost24
 
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
PPTX
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Pro Mrkt
 
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Fujitsu Middle East
 
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Pro Mrkt
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Pro Mrkt
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Fujitsu Middle East
 

What's hot (19)

PPTX
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
PPTX
Rise of Ransomware
Imperva
 
PPTX
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Pro Mrkt
 
PPTX
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security
 
PPTX
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Pro Mrkt
 
PDF
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
PDF
Cyber Security for Digital-Era
JK Tech
 
PPTX
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
PPTX
Frost & Sullivan Report
Forescout Technologies Inc
 
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24
 
PPSX
Board and Cyber Security
Leon Fouche
 
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
PPTX
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
PPTX
IT Security for Nonprofits
Community IT Innovators
 
PPTX
Automation: Embracing the Future of SecOps
IBM Security
 
PPTX
Valuing Data in the Age of Ransomware
IBM Security
 
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24
 
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
North Texas Chapter of the ISSA
 
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
Rise of Ransomware
Imperva
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Pro Mrkt
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Pro Mrkt
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24
 
Cyber Security for Digital-Era
JK Tech
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
Frost & Sullivan Report
Forescout Technologies Inc
 
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24
 
Board and Cyber Security
Leon Fouche
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
IT Security for Nonprofits
Community IT Innovators
 
Automation: Embracing the Future of SecOps
IBM Security
 
Valuing Data in the Age of Ransomware
IBM Security
 
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
North Texas Chapter of the ISSA
 
Ad

Viewers also liked (10)

PDF
It 200 it200
GOODCourseHelp
 
PDF
agmoos
Ashim ghosh
 
PDF
HCR 203 Week 4 Understanding the Collection Process
AlonPandosn
 
PDF
Бизнес-Проект: Краудфандинг в недвижимость Майами
Sergii Petrovskyi
 
PPTX
Review of data breaches in healthcare
Arete-Zoe, LLC
 
PPTX
Feast
Kevin Grima
 
PPTX
Is siġġiewi
Kevin Grima
 
PPTX
Interesting places
Kevin Grima
 
PDF
True Cost of Data Breaches
Matthew Rosenquist
 
PDF
59363626 wal-mart-strategic-management
9xHuyHoang
 
It 200 it200
GOODCourseHelp
 
agmoos
Ashim ghosh
 
HCR 203 Week 4 Understanding the Collection Process
AlonPandosn
 
Бизнес-Проект: Краудфандинг в недвижимость Майами
Sergii Petrovskyi
 
Review of data breaches in healthcare
Arete-Zoe, LLC
 
Is siġġiewi
Kevin Grima
 
Interesting places
Kevin Grima
 
True Cost of Data Breaches
Matthew Rosenquist
 
59363626 wal-mart-strategic-management
9xHuyHoang
 
Ad

Similar to The Top 7 Causes of Major Security Breaches (20)

PPTX
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya
 
PPTX
Cybercrime Threats in 2012 - What You Need to Know
Kaseya
 
PPTX
Kaspersky endpoint security business presentation
Data Unit
 
PPTX
Tenzin thiley bhutia
Tenzin Thiley
 
PDF
Kaspersky 2017 Thailand Launch
Worapol Limsiriwong (Nex)
 
PDF
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
PDF
Kaspersky Internet Security Multi-Device 2015
Dejan Pogačnik
 
PPTX
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
PDF
KAV KIS 2015 Product Presentation
WiseKnow Thailand
 
PDF
Data security best practices for risk awareness and mitigation
Nick Chandi
 
PPTX
Kaspersky Kesb ep10 no_cm_v01a
Igor Pandzic
 
PDF
Kaspersky Endpoint overview
sferinga
 
PDF
Kaspersky Endpoint Overview
sferinga
 
PDF
Top 6 things_small_businesses_q12015
anpapathanasiou
 
PPTX
Kaseya Kaspersky Breaches
Kaseya
 
PDF
Kaspersky: Global IT Security Risks
Constantin Cocioaba
 
PDF
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
PPTX
Protect Yourself Against Today's Cybercriminals and Hackers
Kaseya
 
PPTX
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
francis578223
 
PDF
2014 Trustwave Global Security Report
worldwidebranding
 
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya
 
Cybercrime Threats in 2012 - What You Need to Know
Kaseya
 
Kaspersky endpoint security business presentation
Data Unit
 
Tenzin thiley bhutia
Tenzin Thiley
 
Kaspersky 2017 Thailand Launch
Worapol Limsiriwong (Nex)
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
Kaspersky Internet Security Multi-Device 2015
Dejan Pogačnik
 
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
KAV KIS 2015 Product Presentation
WiseKnow Thailand
 
Data security best practices for risk awareness and mitigation
Nick Chandi
 
Kaspersky Kesb ep10 no_cm_v01a
Igor Pandzic
 
Kaspersky Endpoint overview
sferinga
 
Kaspersky Endpoint Overview
sferinga
 
Top 6 things_small_businesses_q12015
anpapathanasiou
 
Kaseya Kaspersky Breaches
Kaseya
 
Kaspersky: Global IT Security Risks
Constantin Cocioaba
 
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Protect Yourself Against Today's Cybercriminals and Hackers
Kaseya
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
francis578223
 
2014 Trustwave Global Security Report
worldwidebranding
 

More from Kaseya (20)

PDF
Enterprise Mobility Management I: What's Next for Management (MDM)
Kaseya
 
PDF
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Kaseya
 
PDF
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Kaseya
 
PDF
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Kaseya
 
PDF
365 Command: Managing SharePoint in Office 365
Kaseya
 
PDF
365 Command: Managing Exchange in Office 365
Kaseya
 
PDF
Advanced Administration: Mobile Device Management
Kaseya
 
PDF
Advanced Administration: Kaseya Traverse
Kaseya
 
PDF
Advanced Administration: Kaseya BYOD Suite
Kaseya
 
PDF
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
Kaseya
 
PDF
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Kaseya
 
PDF
Security and Backup II: Vision and Direction
Kaseya
 
PDF
Security and Backup I: OEM Architecture
Kaseya
 
PDF
Kaseya Monitoring Suite Overview
Kaseya
 
PDF
Kaseya Asset Discovery Overview
Kaseya
 
PDF
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Kaseya
 
PDF
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Kaseya
 
PDF
Kaseya Technology Alliance Partner Landscape
Kaseya
 
PDF
Advanced Administration: Kaseya Virtual Administrator
Kaseya
 
PDF
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Kaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Kaseya
 
365 Command: Managing SharePoint in Office 365
Kaseya
 
365 Command: Managing Exchange in Office 365
Kaseya
 
Advanced Administration: Mobile Device Management
Kaseya
 
Advanced Administration: Kaseya Traverse
Kaseya
 
Advanced Administration: Kaseya BYOD Suite
Kaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Kaseya
 
Security and Backup II: Vision and Direction
Kaseya
 
Security and Backup I: OEM Architecture
Kaseya
 
Kaseya Monitoring Suite Overview
Kaseya
 
Kaseya Asset Discovery Overview
Kaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Kaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya
 
Advanced Administration: Kaseya Virtual Administrator
Kaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya
 

Recently uploaded (20)

PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Software Development Methodologies in 2025
KodekX
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Doc9.....................................
SofiaCollazos
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 

The Top 7 Causes of Major Security Breaches

  • 1. The Top 7 Causes of Major Security Breaches
  • 2. Meet Our Speakers Cynthia James Director Business Development, CISSP Jason Dettbarn Senior Technology Strategist Moderator: Alex Brandt VP Americas
  • 3. The Power of Layered Security
  • 4. • Founded in 1997; largest private anti-malware company – 100% focused on anti-malware • Over $700M annual revenues • Presence in 19 countries • #1 vendor in Germany, France, Spain, Eastern Europe • Protecting over 300 million end points About our Expert Speakers: Kaspersky
  • 5. Today’s Agenda  The Cybercrime Comprehension Gap  The Top 7 Causes of Security Breaches  5 Cybercrime Facts People Don’t Know  Security Solution Overview  3 Tips for CyberSafety at Home  Giveaway  Questions & Answers
  • 6. • 200k unique malware samples PER YEAR were identified in 2006; 2M in 2007…now it’s up to 200K malware samples PER DAY. • The quality of malware improves every year. | June 5, 2013PAGE 6 | Cybercrime Threatscape: Malware Growth
  • 7. • Recent years have seen exponential growth in malware. • Anyone can enter the cybercrime game. • Cybercriminals earn over $100B a year. • Cybercrime will never stop. The Current Malware Comprehension Gap | June 5, 2013Kaspersky Lab PresentationPAGE 7 | Where most employees/end users think we still are Where we really are today (2013) Over 200K Per DAY
  • 8. #1: End User Error & Malice
  • 9. #2: There’s No Perimeter to Protect
  • 10. #3: Mobile Devices Are Ideal Entry Points
  • 11. Speaking of Mobile Threats…the Latest  Malware is downloaded based on the device/platform  “Crackers” are widely available: open app, insert malware, repost it  Google removed 100 malicious apps from their store…but not before one was downloaded 260K times  Mobile malware steals transaction authentication numbers associated with banking + personal data  Advertisers receive the same information we provide the app (geolocation apps for example)
  • 12. #4: Loss of Mobile Devices
  • 13. #5: Lack of Layered Defense
  • 14. #6: Cybercriminals Are Vastly Underestimated
  • 15. #7: Users Don’t Keep Up With New Tactics
  • 16. 1. (Incredible volume; low barrier to entry; earnings are huge) 2. 60% of companies take 3 months or longer to discover they were breached 3. First cell phone botnet was discovered in 2012 4. AV is not a product, and all AV is not created equal 5. 80% of burglars use Facebook and personal websites to select victims 5 Facts 90% of people don’t know about cybercrime
  • 17. 1. End User error or malice 2. There’s no perimeter to protect 3. Mobile devices are ideal entry points 4. Loss of mobile devices (mobile workforce) 5. Lack of layered defense (patching, end point AV, gateway AV, policy enforcement) 6. Cybercriminals are vastly underestimated 7. Users don’t keep up on new tactics The Top Seven
  • 19.  1. Personal banking:  ATM skimming on the rise (cover the keypad)  Log on after your AV is updated  2. Never use an unknown USB!!!  3. Turn off geolocators on kids’ cell phones 3 Tips for Home CyberSafety | June 5, 2013Kaspersky Lab PresentationPAGE 19 |
  • 20. Conclusion: Layered Security with Kaseya & Kaspersky
  • 21.  Kaspersky KLAB Digest IT - Free Security Bulletin  Free Kaseya Security Bundle Trial Special Giveaways | June 5, 2013Kaspersky Lab PresentationPAGE 21 | Interested? Just respond to the Poll located on the right bottom corner of your Webex platform!
  • 22. Industry standard for IT automation Solutions & Services Who are we?
  • 23. Our solutions empower people to proactively manage and control IT assets remotely, easily and efficiently from one integrated Web-based platform Who are we?
  • 25. Why Kaseya? A single Kaseya user can proactively manage 1,000s of automated IT systems tasks in the same amount of time required by a team of technicians using other techniques.
  • 27. Discover the State of IT • Systems • Assets • Mobile Devices • Network Devices Manage the State of IT • Scheduling • Procedures • API/Messaging Automate the State of IT • Reporting • Dashboards • Interactive Data Views IT Configuration Management Asset Management Security Business Continuity Service Delivery Systems Monitoring • Remote Management • Software Deployment • Power Management • Image Deployment • Desktop Migration • Mobile Device Management • Network Discover & AD • Hardware/Software • Asset Management • Virtual Machine Management • AntiVirus • AntiMalware • Patch Management • Software Updates • Image Backup • Image Virtualization • File & Folder Backup • Service Desk/Ticketing • Policy Management • Service Billing • Policy Compliance • Time Tracking • Systems Checks & Alerts • Agent Monitoring • Enterprise Monitoring • Agent-less Monitoring • Log Monitoring UNIFIED MANAGEMENT
  • 28. www.kaseya.com Our Vision “Providing Enterprise-Class IT Systems Management for Everybody”
  • 29. Q&A & Resources Cynthia James Director Business Development, CISSP Jason Dettbarn Senior Technology Strategist Join Us: Sign Up for a Demo! Kaseya.com/ITdemo Contact us: 1 (877) 926-0001 [email protected] Learn more: www.kaseya.com