Making Money With Kaseya



Similar documents
WHITEPAPER. Compliance: what it means for databases

Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Cloud Security Framework (CSF): Gap Analysis & Roadmap

igrc: Intelligent Governance, Risk, and Compliance White Paper

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments

Cloud Security Framework (CSF): Gap Analysis & Roadmap

How a Hybrid Cloud Strategy Can Empower Your IT Department

How To Make A Cloud Service Federation A Successful Business Model

ESET Secure Authentication

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Six Best Practices for Cloud-Based IAM

Why Encryption is Essential to the Safety of Your Business

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Enterprise Mobility Services

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

Time to Value: Successful Cloud Software Implementation

User Guide. Version R91. English

SaaS. A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect

An Agile and Scalable Mobile Workplace

Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs

Hybrid Cloud Identity and Access Management Challenges

PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

How To Manage A Privileged Account Management

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

How To Manage A Plethora Of Identities In A Cloud System (Saas)

Authentication Strategy: Balancing Security and Convenience

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Big Data, Big Risk, Big Rewards. Hussein Syed

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Security Controls What Works. Southside Virginia Community College: Security Awareness

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan

NEC Managed Security Services

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Delivering value to the business with IAM

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

MSP Global Pricing Survey Q4 2013

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

How To Write A Cloud Security Framework

Identity Relationship and Access Management for the Extended Enterprise

Cloud Services Catalog with Epsilon

The Case for Cloud Communications: Unified Communications as a Service (UCaaS)

privileged identities management best practices

Application Testing Suite Overview

Solution White Paper Monetizing the Service Provider Cloud

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Feature. Log Management: A Pragmatic Approach to PCI DSS

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

People-Focused Access Management. Software Consulting Support Services

FTP-Stream Data Sheet

The CIO s Guide to HIPAA Compliant Text Messaging

MSP Global Pricing Survey Q4 2014

IBM WebSphere Cast Iron Cloud integration

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

The Top 5 Considerations for Oracle Cloud ERP

Top 5 Reasons to Choose User-Friendly Strong Authentication

Comparing Dropbox and Egnyte. White Paper

CHECKLIST: Top 10 reasons to move to the cloud

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Top 10 reasons to move to the cloud

HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers

Compliance in the Age of Cloud

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

BASICS. Simple, Straightforward, and Jargon-Free Answers

Calculate Your Total Cost of Ownership

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER

The Who, What, When, Where and Why of IAM Bob Bentley

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Transcription:

Making Money With Kaseya How to offer your own Identity-as-a-Service (IDaaS) Model Julian Scott VP Sales, Identity Services Garrett Graney - President, IS Solutions Consulting, Inc. 1

Sound Familiar? 2

What is Identity & Access Management (IAM)? IAM is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. It reduces the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. - Gartner 3

What is IDaaS? Identity as a Service (IDaaS), also called IAMaas, refers to software as a service forms of IAM that require minimal or no enterprise on-premises presence of hardware or software. - Gartner 4

IDaaS Market Landscape Gartner estimates that over the next 5 years the average annual growth rate in the IDaaS market will be 37%. Estimated total spend on IDaaS was $300M in 2014 and it is expected to exceed $1B by 2018. 5

The Customer Landscape 60 % the number of small businesses that fail within six months of a cyber-attack. Source: Protecting Small Businesses Against Emerging and Complex Cyber-Attacks opening statement http://smallbusiness.house.gov/uploadedfiles/3-21-13_chris_collins_opening_statement.pdf

The Customer Landscape 77 % percent of small firms who believe their company is safe from a cyber-attack, even though they do not have effective access control. Source: Protecting Small Businesses Against Emerging and Complex Cyber-Attacks opening statement http://smallbusiness.house.gov/uploadedfiles/3-21-13_chris_collins_opening_statement.pdf

The Customer Landscape 87 % percentage of small businesses that do not have a written security policy Source: Protecting Small Businesses Against Emerging and Complex Cyber-Attacks opening statement http://smallbusiness.house.gov/uploadedfiles/3-21-13_chris_collins_opening_statement.pdf

Why IDaaS Should Matter To You Customers need help.now! Looking for thought leadership from their MSP s Your competition isn t doing it.yet! You could already have a compliance obligation impacting your business: HIPAA Business Associate Agreement Your value proposition isn t resonating and you find yourself competing primarily on price. You are looking for a new revenue stream to drive growth. The market need is expanding rapidly. 9

How Much Can You Make? MSP Example: 10 internal users of AuthAnvil Customer A = 75 users Customer B = 125 users Customer C = 225 users Total = 435 users Subscription fee is based on 435 users and the volume pricing at that level = $2.50/user per month. MSP invoices at $20/user per month for their IDaaS solution. Monthly revenue = $7,437.50 (425 client seats @ $17.50 margin) 10

Why IDaaS Matters to Your Customers Unless their passwords look like 0x25CVi5(i7{9qk the passwords they are using internally are probably not as secure as they need to be. Their employees are reusing the same passwords across multiple business-critical resources. Employees write their passwords down. Enforcing password policies is a nightmare. Proliferation of BYOD Sharing passwords with co-workers Employees practicing bad password security puts the company at risk of falling out of compliance with regulations. 11

What Employees Hear 12

What To Look For At A Client Evidence that passwords are being stored insecurely: Spreadsheets Word docs In another software solution that is not secured with 2FA 13

Look Familiar? 14

What to Look For At A Client No documented or enforced password policies. Customers that are impacted by an industry or government mandated compliance requirement: PCI DSS: Retail and Hospitality HIPAA: Healthcare CJIS: Law Enforcement Sarbanes Oxley (SOX) Gramm Leach Bliley (GLB) Immediate or expected need to meet an auditing requirement. User logs: Who accessed what and when Password management policies: Actions taken to frequently change passwords or what action was taken when they have employee turnover 15

Have A Plan of Action Don t wait for the audit request to happen. Be proactive and help your customers ensure the policies, procedures and action plan are in place before they suffer a potential business disruption. 16

Helpful Resources www.kaseya.com/iamretail www.kaseya.com/iamhealthcare www.kaseya.com/iamlaw_enforcement www.kaseya.com/iamresources 17

You Have An IDaaS Opportunity Now What? Top 5 Questions To Ask 1. How many passwords does the client currently manage and where are they stored? 2. Do they have staff members that remotely access company resources? 3. Is there a documented process for managing and auditing passwords? 4. Do they have applications or websites that staff have to consistently access to perform their work duties? (E.g. Office 365, Google Apps, Salesforce, Bank, HR Payroll Provider) 5. What is the process for changing passwords when an employee leaves the organization? 18

Kaseya IAM Partner Advantages Ability to accelerate seat growth and receive significant subscription discounts for all users. Volume discounts on software tokens, including free tokens for larger opportunities. Minimum 20% discount on hardware tokens and professional services. Flexible deployment options Complimentary access to the AuthAnvil multitenancy package Allows Partners to securely host customers on their own instance of AuthAnvil Ability to link on-prem customers to you as the Partner of Record. 19

Kaseya IAM Partner Advantages Access to prebuilt sales and marketing collateral to help drive new sales opportunities: HIPAA Security Checklist White Papers ebooks Product Guides Videos Full control over the client relationship via your partner portal account: Purchasing Token management Customer invoicing Kaseya has no billing relationship with your clients 20

Partner Requirements An existing Kaseya IAM customer. Minimum of 5 internal users. Have all 3 products in the AuthAnvil suite deployed internally. Minimum of 30 days experience with AuthAnvil. Passed the Partner exam in the AuthAnvil Academy. 21

IDaaS Market Landscape By the end of 2015, Identity and Access as a Service (IDaaS) will account for 25% of all new identity and access management sales, compared with 5% in 2012, according to recent Gartner research 22

23

Join the IT Management Cloud Revolution Take the complexity out of IT management & security with Kaseya www.kaseya.com 24