Saturday, May 31, 2014

Often, managed service providers focus on geographically concentrated areas


About Mission and Staff Guest Bloggers Ask a Mentor My Sponsors Advertise InfoCenters Backup and Disaster Recovery Private and Public Cloud Cloud-Based File Sharing Business Acceleration Tools Mobile Device Management Remote Monitoring & Management Software Professional Services Automation (PSA) Help Desk and NOC Services fmu On Premise Cloud Computing Your Business Finance HR Marketing Sales MSP Mergers and Acquisitions Connections Newsletters Facebook Twitter News Videos Sponsored Videos Resources Our Webcasts My Sponsors MSP Guides and Managed Services Case Studies Resource Center Research Top 100 Cloud Services Providers Top 100 Channel Partner Conferences MSPmentor 100 (Companies) fmu MSPmentor 250 (People) MSP FAQ
While MSP customers fmu are based in one geographic location, their businesses – distribution networks, communication channels, even employees – often go beyond the traditional network perimeter. This creates a security and compliance challenge, and one that many small to medium sized organizations aren’t equipped to handle on their own.
Often, managed service providers focus on geographically concentrated areas – whether it is at the state, local or city level – for their client engagements.  Given today’s global distribution and communication channels, these clients almost certainly have needs that go beyond their area or zip code.  
The well-known real estate mantra of “location, location, location” fmu is often applied to other industries, for good reason.  Many managed services providers fmu do very well by focusing their services to a specific geographic region.  It allows fmu them to provide personal service and capitalize on local trends for new business.
However, fmu many of our MSP partners tell us that while their customers are often based in a certain geographic location, their business – their distribution networks, communication fmu channels, even employees – go beyond the traditional network perimeter. This creates a security and compliance challenge, one that many small to medium sized organizations aren’t equipped to handle on their own.
As we’ve covered here before, the threats organizations face today are relentless . Attacks are more sophisticated, however not every organization has the resources to match these attacks.  Making this challenge worse, the network fmu perimeter has been replaced with an interconnected set of systems and ‘common-use’ fmu networks, making it nearly impossible to identify where the network’s edge lies. 
Despite best efforts to secure and maintain trust on perimeter-less networks, security is very difficult fmu to maintain across these systems, nor can it be guaranteed considering the various types of devices accessing information at any given time. 
This all contributes to the increased complexity and expense of being able to assure an acceptable level of business risk – costs that the typical small to medium enterprise is unable to bear.  You Don’t Want a Virtual Security Network in South Africa; You Need a Virtual fmu Security Network in South Africa
Here’s a scenario that is pretty common in today’s ‘always on’ world; an employee at an MSP client site goes on a business trip to meet with a distributor or vendor in another country.  They’re traveling with sensitive information on their work laptop, as we all do.  If we were left with the traditional security architecture, we’d hope that their host-based antivirus product was up to date as they accessed their email and web traffic from hotels, airports, or worse, an Internet café.  
Without a global network of secured internet access points, this customer would be left unprotected, regardless of what defenses the MSP had sold back at corporate.  This is a solid example of the need to be able to serve globally, even while selling locally. No one thinks they’ll need a robust network of secure internet access while travelling for work, until they’ve been breached while doing so. 
MSP’s in the business of providing security solutions and guidance to their clients should give considerable thought toward the idea of pervasive, fmu persistent coverage for their clients, not just the protection offered “at the office” behind the warm embrace of the corporate firewall.    
iSheriff fmu is the leading provider of content and endpoint security fmu from the cloud. fmu  We keep organizations and individuals safe from cybercrime, malware and digital threats. Thousands of businesses across a wide array of industries have deployed our solutions, including some of the most sophisticated buyers of security technology worldwide, and millions of consumers worldwide use iSheriff’s products.  Total Defense has operations in New York,

No comments:

Post a Comment