SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Top Seven Features MSPs
Should Look for
in a Cloud File Sync Solution
US is the most
expensive data
breach total
average per
company
$5.4 million
81%
Employees
use at least
one
personally
owned
electronic
device
59%
Employees
use a mobile
device to run
line of business
applications
90% 1/2
Have
disabled
auto lock
for
tablets
Organizations
are fully
aware of
devices
accessing
their
networks
Companies
have
experienced
a data
breach due
to insecure
devices
34%
Store work
email
passwords and
if lost only half
would reset
their work-
related
passwords
<10%
Level Setting Mobility and Security Trends
On average
US Comprised
records
28,765
US Is the
most
expensive
data leaks cost
per record
$199
US is the most
expensive data
leaks total
average per
company
$5.4 million
Level Setting Mobility and Security Trends
37% 35% 29%Malicious
Criminal
Attach
Human
Factor
System
Glitch
Root Causes of Data Leaks
50%
40%
The Thing About Data It Has a Long Shelf Life
Employees who lost their jobs in
the last 12 months kept
confidential corporate data
Plan to use this data in their
new jobs
employees say their organization does not take steps to ensure employees do not use confidential competitive
information from third-parties
employees say it is acceptable to transfer work documents to personal computers, tablets, smartphones or
online file sharing applications. The majority never delete the data they've moved because they do not see
any harm in keeping it.
employees do not believe it is a crime to use a competitor's trade secret information; this mistaken belief
puts their current employers at risk as unwitting recipients of stolen IP
think it is acceptable to take corporate data because their company does not strictly enforce policie
employees say their manager views data protection as a business priorities
68%
62%
56%
38%
51%
Risk Assessment: Data Leaks and Mobility
Employees use a work
computer for personal
use everyday
Employees access
personal email from
business computers
Employees use a
work computer for
personal use at least
sometimes
Data Loss: Things You Haven’t Thought About
Public Cloud
Corporate Data
Traditional
File
Servers
Managed
File
Transfer
Enterprise
Content
Management
Email
Data leaks, no visibility, and no IT control
…without compromising security and control.
With
Anyone
Work
Anywhere
Across
Any
Device
With
Any
Content
1. Meet the Needs of Mobile and BYOD Users
IDC predicts, by 2015, the world's mobile
worker population will reach 1.3 billion,
representing 37.2% of the total
workforce.
2. Business-class Features
AD/LDAP authentication Fine-grained client, group,
and user permissions
2. Business-class Features
Rich file sharing and collaboration options
3. Security and Control
Encryption when
data is in transit
and “at rest” in
the cloud
Remote wipe for lost devices
or employee departures
4. Support Regulatory Compliance
HIPPA
GLBA
SOX
Business
Associate
Agreements
5. Multi-tenant Management and Monitoring
Partner
Client 1
User 1
User 2
User 3
Client 2
User 1
User 2
User 3
Client 3
User 1
User 2
User 3
6. Brandable Web Portal and Client Experience
The Web Portal
Client Software
Sample Email
7. Recurring Revenue Model, with
Attractive Gross Margins
Wholesale cost
$8
Wholesale
Cost
Un-Managed
business-class, Cloud
File Sync
$15
Wholesale
Cost
Managed, Business-
Class, Cloud File Sync
$25
Partner
Margin
Wholesale
Cost
Partner
Margin
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin a Cloud File Sync Solution
Checklist:
Business-class
•File sync with anytime, anywhere, and any device access
•Share files and collaborate via email, URLs, team shares, and network mapped
drives
•Control access with user and group permissions and AD integration
Secure
•Complete data encryption in transit and at rest
•Sync to a petabyte-scale and proven storage cloud
•Fully HIPAA compliant, with business associate agreements
Channel-ready
•Multi-tenant management and monitoring, with PSA integration
•Brandable web portal
•Recurring revenue model, with attractive gross margin opportunities
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin a Cloud File Sync Solution
Integration Features
Automatic Creation of Service Tickets
• Failed backups
• Disk usage notifications
• No backup notifications
Population of Back Up Statistics in ConnectWise
Management Summary Report
Automated Billing
• Online backup (total GB)
• Local backup (number of servers, number of non-servers)
• Email archiving (mailbox count)
• DoubleCheck email filtering (mailbox count)
Service Ticket
• Configure events in eFolder
that will create service
tickets in ConnectWise
• Decide the type and
severity of events which will
send you a notification
Management Summary Report Synchronization
Configure eFolder to
synchronize back up
statistics with the
ConnectWise
Management Summary
Report
Billing eFolder Services on ConnectWise
Agreements
Once you set up your
Agreement Addition in
ConnectWise for
eFolder products and
services the Total
Quantity will be
updated each month
Interested in eFolder?
www.eFolder.net
Interested in ConnectWise?
www.ConnectWise.com

Mais conteúdo relacionado

Mais procurados

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
The Riskiest Industries in the Cloud
The Riskiest Industries in the CloudThe Riskiest Industries in the Cloud
The Riskiest Industries in the CloudCloudLock
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in puneAnshita Dixit
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat ReportChris Hewitt
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...Mithi SkyConnect
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentationrenaglasser
 

Mais procurados (20)

festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
The Riskiest Industries in the Cloud
The Riskiest Industries in the CloudThe Riskiest Industries in the Cloud
The Riskiest Industries in the Cloud
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinar
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 

Semelhante a eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution

Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?Ashish Patel
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 

Semelhante a eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution (20)

FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 

Mais de Dropbox

How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...Dropbox
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...Dropbox
 
Setting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesSetting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesDropbox
 
eFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityeFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityDropbox
 
eFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain ReliefeFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain ReliefDropbox
 
New Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksNew Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksDropbox
 
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...Dropbox
 
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinesseFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinessDropbox
 
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARseFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARsDropbox
 
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRseFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRsDropbox
 
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...Dropbox
 
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014Dropbox
 
eFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoeFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoDropbox
 
eFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingeFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingDropbox
 
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...Dropbox
 
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SynceFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SyncDropbox
 
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncFive Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncDropbox
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectioneFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectionDropbox
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NowDropbox
 
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationeFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationDropbox
 

Mais de Dropbox (20)

How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
How to Hire Your First Salesperson, Five Reasons to Start With Account Manage...
 
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...VeeamOn Session  Five Compelling Reasons to Add Cloud Backup and DR to your V...
VeeamOn Session Five Compelling Reasons to Add Cloud Backup and DR to your V...
 
Setting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 MinutesSetting Up File Level Backup in 10 Minutes
Setting Up File Level Backup in 10 Minutes
 
eFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit OpportunityeFolder Acquires Cloudfinder: The Next Profit Opportunity
eFolder Acquires Cloudfinder: The Next Profit Opportunity
 
eFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain ReliefeFolder Webinar, BDR Pain Relief
eFolder Webinar, BDR Pain Relief
 
New Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with PlaybooksNew Anchor Marketing Tool: How to Sell with Playbooks
New Anchor Marketing Tool: How to Sell with Playbooks
 
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
eFolder Expert Series, eFolder BDR for ShadowProtect Tutorial: Recovering a P...
 
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means BusinesseFolder Webinar, Anchor 2.0, What's New and Why It Means Business
eFolder Webinar, Anchor 2.0, What's New and Why It Means Business
 
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARseFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
eFolder Webinar, 10 HIPAA FAQs from MSPs and VARs
 
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRseFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
eFolder Webinar, Replacing Zenith: 5 Reasons to Upgrade Legacy BDRs
 
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
eFolder Expert Series, eFolder BDR for Shadowprotect Tutorial: Recovery Optio...
 
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
eFolder Webinar, 5 Ways to Achieve a 20% Increase in Revenue in 2014
 
eFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor DemoeFolder Acquires Anchor, Anchor Demo
eFolder Acquires Anchor, Anchor Demo
 
eFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands BriefingeFolder Acquires Anchor, Partner All Hands Briefing
eFolder Acquires Anchor, Partner All Hands Briefing
 
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
eFolder Webinar: Tech How-to: Using the eFolder BDR Rescue Program with Zenit...
 
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File SynceFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
eFolder Webinar, Five Super Ways to Profit from Business-class Cloud File Sync
 
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File SyncFive Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
Five Super Ways to Profit from Business-class and Channel-ready Cloud File Sync
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectioneFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling ConsolidationeFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
eFolder Webinar, Taming Cloud Storage Costs with Rolling Consolidation
 

Último

Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Último (20)

Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in a Cloud File Sync Solution

  • 1. Top Seven Features MSPs Should Look for in a Cloud File Sync Solution
  • 2. US is the most expensive data breach total average per company $5.4 million 81% Employees use at least one personally owned electronic device 59% Employees use a mobile device to run line of business applications 90% 1/2 Have disabled auto lock for tablets Organizations are fully aware of devices accessing their networks Companies have experienced a data breach due to insecure devices 34% Store work email passwords and if lost only half would reset their work- related passwords <10% Level Setting Mobility and Security Trends
  • 3. On average US Comprised records 28,765 US Is the most expensive data leaks cost per record $199 US is the most expensive data leaks total average per company $5.4 million Level Setting Mobility and Security Trends
  • 5. 50% 40% The Thing About Data It Has a Long Shelf Life Employees who lost their jobs in the last 12 months kept confidential corporate data Plan to use this data in their new jobs
  • 6. employees say their organization does not take steps to ensure employees do not use confidential competitive information from third-parties employees say it is acceptable to transfer work documents to personal computers, tablets, smartphones or online file sharing applications. The majority never delete the data they've moved because they do not see any harm in keeping it. employees do not believe it is a crime to use a competitor's trade secret information; this mistaken belief puts their current employers at risk as unwitting recipients of stolen IP think it is acceptable to take corporate data because their company does not strictly enforce policie employees say their manager views data protection as a business priorities 68% 62% 56% 38% 51% Risk Assessment: Data Leaks and Mobility
  • 7. Employees use a work computer for personal use everyday Employees access personal email from business computers Employees use a work computer for personal use at least sometimes Data Loss: Things You Haven’t Thought About
  • 9. …without compromising security and control. With Anyone Work Anywhere Across Any Device With Any Content
  • 10. 1. Meet the Needs of Mobile and BYOD Users IDC predicts, by 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the total workforce.
  • 11. 2. Business-class Features AD/LDAP authentication Fine-grained client, group, and user permissions
  • 12. 2. Business-class Features Rich file sharing and collaboration options
  • 13. 3. Security and Control Encryption when data is in transit and “at rest” in the cloud Remote wipe for lost devices or employee departures
  • 14. 4. Support Regulatory Compliance HIPPA GLBA SOX Business Associate Agreements
  • 15. 5. Multi-tenant Management and Monitoring Partner Client 1 User 1 User 2 User 3 Client 2 User 1 User 2 User 3 Client 3 User 1 User 2 User 3
  • 16. 6. Brandable Web Portal and Client Experience The Web Portal Client Software Sample Email
  • 17. 7. Recurring Revenue Model, with Attractive Gross Margins Wholesale cost $8 Wholesale Cost Un-Managed business-class, Cloud File Sync $15 Wholesale Cost Managed, Business- Class, Cloud File Sync $25 Partner Margin Wholesale Cost Partner Margin
  • 19. Checklist: Business-class •File sync with anytime, anywhere, and any device access •Share files and collaborate via email, URLs, team shares, and network mapped drives •Control access with user and group permissions and AD integration Secure •Complete data encryption in transit and at rest •Sync to a petabyte-scale and proven storage cloud •Fully HIPAA compliant, with business associate agreements Channel-ready •Multi-tenant management and monitoring, with PSA integration •Brandable web portal •Recurring revenue model, with attractive gross margin opportunities
  • 21. Integration Features Automatic Creation of Service Tickets • Failed backups • Disk usage notifications • No backup notifications Population of Back Up Statistics in ConnectWise Management Summary Report Automated Billing • Online backup (total GB) • Local backup (number of servers, number of non-servers) • Email archiving (mailbox count) • DoubleCheck email filtering (mailbox count)
  • 22. Service Ticket • Configure events in eFolder that will create service tickets in ConnectWise • Decide the type and severity of events which will send you a notification
  • 23. Management Summary Report Synchronization Configure eFolder to synchronize back up statistics with the ConnectWise Management Summary Report
  • 24. Billing eFolder Services on ConnectWise Agreements Once you set up your Agreement Addition in ConnectWise for eFolder products and services the Total Quantity will be updated each month
  • 25. Interested in eFolder? www.eFolder.net Interested in ConnectWise? www.ConnectWise.com

Notas do Editor

  1. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  2. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  3. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  4. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  5. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  6. Sources:2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 Harris Interactive 2012 SANS Annual Mobile Security Survey 2012 Motorola Mobility Survey 2012
  7. Transition:ConnectWise is business automation software that helps IT service providers efficiently manage all aspects of their business. eFolder can be configured to push information about eFolder services into ConnectWise.Specifically, eFolder can be configured to automatically create service tickets in ConnectWise when a backup has failed or when disk usage reaches certain levels that you determine. eFolder can also be set up to push back up statistics into ConnectWise for reporting purposes and billing information into your agreements to streamline monthly invoicing.
  8. There is a ton of flexibility when it comes to alerts and notification events in eFolder and what’s cool is that you can get very specific with the type of event and severity of events that will trigger creation of a service ticket in ConnectWise. This allows you to make sure your techs will be taking action on specific issues and gives you visibility into issues from one location (single pane of glass).
  9. The Management Summary Report is an important tool that ConnectWise partners leverage as a deliverable to their end customers. This customer facing report combines data from different solutions that are integrated with ConnectWise to provide a snapshot of the state of the customer’s network and a summary of service delivered during a specified time period. eFolder will synchronize specific data about the backup statistics: failed and successful backup jobs.
  10. And last but not least, billing. eFolder integration with ConnectWise makes billing for these services simple and streamlined. All you have to do is set up your agreement one time, add the specific eFolder solutions you want to include on the monthly invoice and then eFolder will update the quantity each month so that your invoice is accurate and timely.