 Hi, my name is Shelly and I'm really happy that you're joining us today. I'm the manager of the Legal Services National Technology Assistance Program, and we are here today to learn a little bit more about remote access and controlling all of that. I'm going to turn it over to Michael Hernandez. He is the ringleader of this session today and he's going to introduce us to what we're going to hear today. Hello everybody, thanks for joining. Always a busy day, always lots of stuff to do and all the year-end stuff, so definitely appreciate the time. I also know hard for people to join on time. I was a minute late myself for this call. But yeah, I think a really good topic that we have today, I think even prior to COVID, one of the challenges we've had as a community is, how do we provide access to our organization's data for volunteers and interns, right? Prior to COVID, we had a lot of people coming into the office, so it was a lot easier. Hey, here's a desktop, here's credentials, log in. But now with the hybrid environment, you've got volunteers and interns working outside of the office, and how do you have equipment that you're able to provide everyone, and if you don't, how are you keeping track of that data? How are you securing that data when you're accessing email, your case management system, your file system, whichever you might be using, if it's a file server or SharePoint, OneDrive, things like that. And so how do you keep control of that data when they leave, so they provide the help, the great help that volunteers and interns do for whatever period of time, and that runs across the board, right? That could be for a couple of weeks, that could be for a couple of months, it could be for six months, it could be a year. You might have an attorney who's doing pro bono work that works one case a quarter, or they take one case at a time, and now they need access to the data, and also save the data in the organization. So I think this is a really great topic for the community. I definitely appreciate everyone joining. So we've got two different types of solutions, which this is an informative session. I think that this is great with what LSNTAP is doing with, look, this is to provide you information. It's the takeaway supposed to be to have you think about maybe even some of the challenges that you didn't necessarily think you had, or if you did have it, and you did know, here's some options that we could look into. So Veen and to your point, they're on gracefully willing to share information about their solutions and how they do things, again, but this is really informative sessions. It's just to kind of expose you to some options that are out there, and what you do with that information, whether you have more interest in them or looking up other solutions completely up to you. Again, we just want to help with informing you as a community, as what's out there. And again, I think great for LSNTAP for doing this. So I'm going to assume we'll probably get some more people on, and we'll let them in, but we're going to get started with the presentation. And so the format will be, so Veen's going to go first, Dan. And so he's going to review his solution 10, 15 minutes, and then we'll have a question and answer period specifically on that solution. If you had questions, then once that's over, we're going to hand it over to Joel at Tier Point and do the same thing. He'll review his, and then we'll have question and answers. And then at the end, if there's still some time left, we could just open it up to any additional questions. So with that, Dan, going to hand it over to you. Do a quick intro. You've got up to 15 minutes before the question and answer period. Thank you so much. I really appreciate it. And I've been looking forward to this meeting. Quick introduction about myself. My name is Dan Apropreto. I'm the senior and cap executive here at Veen. And on the call with me is Chris Johnson, and he's one of our senior product managers, and he's going to be helping us out with some technical questions if you have them, and you'll be walking us through a demo. And just kind of a quick background how we got here. Michael found us online for a solution for kind of the issue that he just spoke about. We had some time. We did an introduction call. He learned a little bit about us, and he thought it'd be a great opportunity to speak to some other organizations here that may be dealing with some similar problems. So I just want to say thank you to Michael who brought us in. And just a quick agenda of what I wanted to go through today. Just an introduction about Veen, who we are as an organization. I'll kind of go over kind of why Veen exists and the solution that we've recognized, or the problem that we've recognized, and how we're kind of overcoming that solution for our clients. And then I'll introduce Chris, who will kind of walk us through a quick demo. And I think it'll be a great opportunity to get a visualization about what Veen does. So Veen was created over two decades ago. And out of over 700 clients of ours, a lot of them are in highly regulatory environment. So organizations like banks, financial institutions, really any organization that has high compliance standards to either protect the data or needs to be compliant to things like PCI, HIPAA, GDPR, SOC2. So Veen was really built for security-minded organizations looking to simplify, reduce their costs around delivering a secure workspace. But without the nightmare of having to ship computers or without something like a VDI. So the conversation we have with so many of our clients is about this employee computing model that we're discussing today. And many organizations are still in the challenging model of buying and locking down PCs and insisting that people only do work on these machines. However, since the pandemic and over the terms of the last couple of years in terms of remote work, the lines between business and personal started to get blurred. And the expectation of people from a home office, a work computer, a personal computer, and respect those boundaries really starts becoming unrealistic for both the employee as well as the organization. Not to mention that a lot of our customers are hiring people in building teams in more geographically dispersed areas than ever before. So a client uses for many use cases, but it's really a big one in why this model is becoming increasingly more challenging. But at Venn, we talk a lot about BYO PC and BYOD, or building your own device. And this has been a hot topic for a lot of organizations over the last couple of years. But the thing we'd like to remind our clients is that BYOD doesn't have to be wholesale, right? Not everyone needs to bring their own computers. There's a lot of different options and ways this technology is being adopted. Really quite quickly for various types of use cases. So at Venn, we're seeing our clients leverage BYOD for independent contractors, interns, volunteers, all sorts of scenarios, mergers and acquisitions. And at Venn, what we're currently doing, we literally live and breathe our technology. I'm working for my BYOD device right now. And in some instances, we'll actually use a stipend to pay for an employee's laptop. So the organization themselves doesn't have to. But another thing to remember is that we don't need to say yes to every PC or even lock down every PC the same way. A lot of different ways this technology can plug it. The bottom line is the ability to protect your data without having to lock down a whole machine itself. So most of us here are probably familiar with MDM, whether you know it or not. So MDM is essentially what allows you to have access to company data like email on your personal phone, right? So what MDM did was it gave us the ability to containerize the application itself on a personal device. And this is what Venn is doing today for laptops, right? So almost think of us as MDM for laptops if you're familiar with that. Really what it's designed to do is to get your workspace for remote work. Protect the data without having to lock down the whole machine or having to push people into a virtual desktop and type environment. So the innovation here is a secure enclave that's going to go on the PC or the Mac. When you install that machine, it sets up the secure enclave. That's where all the applications sit. Where all the work is being done inside that blue border. And the blue border is a visual indication around those specific windows. So if it's in blue, it's in business. Everything inside that border is going to be controlled and administered by you. So for example, what applications they can run and where your data can go. That's how you're going to be able to control for some of the compliance standards your company could be held to. So everything here regarding this is to be remotely white. Everything work related on the machine can be removed. There's also a core component that's important. And that's all network traffic emanating from within the secure enclave. It may go out of secure tunnel through a gateway, an IP space that you control. Even though the network related outside the enclave, it's just going to go out to use a deep old internet connection. So how does it work? So then this is not a VDI, right? We do have some experience down that path. And some of you may be familiar with this as well, but this is different. This is a local computer and locally installed applications. There's a software-based solution that's going to put a virtual wrapper around an application that's running on the personal machine itself. So the wrapper is a blue border from the user's perspective. But from the idea of the administrative perspective, it's actually a firewall with your control of what can go in and out of an application. So can I copy and paste data? No, I think a screenshot, no. Where am I able to save that file? All that stuff becomes policy configured by you. And we'll show you what that looks like in just a minute when I turn it over to Chris to walk through the demo. But just to summarize our objective, your advanced security is our North Star, and that is what we're providing to our clients. So the company's still going to meet high compliance standards, but without the need of something like a VDI or ship and computers. You're going to be able to accomplish this now without hosting. So it's decided to be much less costly, much simpler. And I really don't need to add any additional infrastructure or data centers. We're using local computers and we're letting people work natively the way they want to work. However, we're giving you control of the applications, the data, we're really doing a higher remote session. In fact, we're not giving you control of the whole PC, we're just giving you control of the enclave. And the last thing I'll say before I turn it over to Chris, in terms of regards to deployment, it really is quite simple. It's a single install. So the employees are going to email invite as you provision a user, install hang and they're ready to start working in about five to six minutes. So I'll pause there for a second. I'll stop sharing my screen. I'm sure there'd be some questions that we have, but Chris, I'll turn over to you first to walk through the demo, sir. Sounds good. Okay, my screen should be coming up here. All right, so I'm going to walk you through the typical end user experience on a Windows device. This is also supported on Mac, iOS and Android. So what you're seeing here is I have a Chrome window running inside of the secure enclave and logged into a SharePoint site. I have kind of your generic sales spreadsheet here, open in Excel, and a blank Word document. So the first thing that I want to reiterate is that these applications are directly installed on the computer, right? There's not a second instance. We're leveraging the applications that are already installed here. For the end user, there's really no difference between the applications that are running inside the enclave or outside. They function exactly the same. The only thing I'll notice is that blue border surrounding them. That's going to help me really identify the context that I'm in. This is my workspace. And you can see that any application that's brought into focus, you'll see this icon up here. We call this the badge. Really the significance for me as the end user is going to tell me what I can and cannot do inside of the work environment. And these are highly configurable policies from the company level down to the user, and it's done through a SaaS-based admin console, so there's no infrastructure in far as managing the user. For this user, I'm pretty much locked all the way down. I can't upload anything in the browser. I'm not able to move or paste any data outside of the secure enclave. My network access is restricted and locked down, and that's looting to the private company gateway or that protected connection that Dan was talking about. Not able to print anything that I'm trying to download or save has to stay within the enclave. And I can only save to a location that an administrator would designate for me to save to, and I can only log into those accounts with an account that's authorized. And I'm allowed to share out my screen or take any screenshots. So really, like I mentioned, working in these applications, there's really no difference. Some in one, moving to the other, the data moves back and forth just fine. And that's really expected because all of these applications here are running inside the enclave. Now, if I were to open up another instance, which I have over here of Excel, you'll notice this one is running outside of the enclave. It doesn't have that border. If I do a right click here and try to go paste, you'll notice that it's as if there's nothing on the clipboard for read to paste. And that's because there isn't. When you're working inside the enclave, we're actually running a separate instance of that clipboard so that none of that data can be exfiltrated out. But if I'm working on something outside, need to bring it inside, no problem. That works just fine. So really the general rule for me as an end user is if it's in the blue, that's where it has to stay. Now, most users, they're not trying to do anything maliciously, but they're just trying to work in different ways that they want to. So I wasn't able to copy that. I'll go ahead and try to take a screenshot here. And you'll notice when I do that, all of these windows are completely blacked out. Now, this policy here that we're looking at is the screen sharing capture. It's very configurable, right? So we all have different personas. Some people are working with BII and you never want them to be able to share out. Maybe you have some users that never do. You can turn this off completely. Or in this case, think of this kind of persona, right? Doing presentations. But I wanna be able to explicitly only share out what it is I wanna share while I'm making sure all the other screens are protected. So I have this option here. I can go ahead and specify the reason for me doing this. And what's gonna happen when I click share window is it's going to create an audit trail for the admin to be able to look at. It's gonna tell me the GOIP location, the device, what I was sharing and why and for that duration. And then when I try to take that same screenshot, you'll notice that only the application that I gave explicit permission to is now visible and the others remain blacked out. And that'll stay that way until I either come back to that badge, kind of stop sharing that screen. I close up the application completely or I log out of that. So there's really three components here that we're gonna be talking about. Three pillars, if you will. One is the application protection and isolation, right? So that is how we are separating and isolating the applications from other interactions with the operating system. Now the second component we're gonna discuss is how we're protecting data, meaning that we're on a local device. So I have two instances here of file explorer running side by side. The one on the right has that blue border. That's the one that's running inside of the secure enclave. What I wanna draw your attention to is you'll notice this item called Vendisk on the right. So Vendisk is our encrypted disk. Think of this as a profile store and not a file system. If you look on the left there in the other file explorer that's running out, you see that that drive doesn't appear there. This drive is completely hidden and inaccessible to anything that's running outside of the enclave. So the way this works is when a user logs in, they authenticate, they pass a series of device compliance checks that you can configure, such as making sure the operating system is up to date, antivirus is up to date, so on and so forth. We grab those decryption keys and we decrypt this drive and it becomes accessible to any application that's running only inside of the enclave. You'll notice that I have one drive here in Google Drive, the cloud file systems running inside of the secure enclave. So what we're able to do is give the admin and the ability to specify the file systems that I use, specify the account that I can use to log in with, and then we're binding those file systems that the cache from those file systems to Vendisk to ensure that anything that gets locally cached remains on this encrypted disk. Now cloud file systems are gonna operate exactly how you'd expect them to come through here and navigate, if I click on one of these files, it's gonna open the application inside of the enclave and I'm gonna save it, it's gonna sync back in real time. The other component of Vendisk which is really great when we're thinking about leveraging personal devices is traditional solutions when you need to off-order user or device is stolen, that really whole device has to be completely wiped. What we're able to do here as an admin is simply locate my device in the admin console, select wipe work data, it will remove everything that is stored on this disk and break any of those authentications into the file system without impacting the personal side at all. Now I mentioned that this was an encrypted profile store, so I'm gonna show you what that kinda looks like in real time, you'll see that I have two instances of Chrome here side by side, one of them, the one on the left is in the enclave, the one on the right is not, and you can see immediately it's a completely different themes, completely different set of bookmarks, even logged in with two separate accounts. So what's happening the first time that you're launching an application via our application launcher? So you can think of these icons here, not as real physical applications, but just representations of the applications that you're allowing me to run in the enclave. When I'm clicking an app for the first time from here, we're hooking into that application down at the very base of the operating system, down at the kernel level, we're rendering that blue border and then we're creating a brand new set of profile information for these applications on Vendis. And that allows me to customize my work environment for how I like to work and without impacting the way I use it for personal use. And finally, the third component is how we're protecting the network. Now, out of the box, each tenant comes with its own set of static and dedicated IP addresses that are only used when inside of the secure enclave. So all the traffic that's coming out of that secure enclave is going over this encrypted connection. So think of this as any of your SaaS applications, Salesforce or something like that. Now on the left, we'll go ahead and log in and you can see my IP address here. And that's one of those IP addresses of the private company gateway. So just think of this as kind of the split tunnel VPN. Now I'm going to try to go to that same website outside of the enclave on the right and you'll see I immediately get that access denied message and my IP address is different because that's using my local connection. So essentially what you're doing here is you're encrypting and tunneling all the traffic that's emanating out of secure enclave. You're respecting my user privacy, right? If I'm in my personal browser, none of that's being tracked and watched. And then you're able to leverage conditional access rules to prevent access to company resources unless they're coming from these IP addresses. So what essentially you're doing is funneling all users into Venn in order to access work. Okay. So I'm going to stop there. That is our general kind of overview of the solution and we'll pause and see if there's any questions. Thank you, Dan. Thank you, Chris. That was excellent. Really appreciate it. I'd like to open it up. If anyone has any questions, please don't be shy. You can unmute yourself or feel free to chat any questions that you might have. Okay. All right. So I'm going to ask you a couple of questions that hopefully will provoke some thought. Great. Thank you, Shelley, for that. So on the IT side, a couple of things that you think about when someone's using their personal device. So, Chris, you mentioned one, making sure that the user has endpoint security installed. Let's say the, I guess, is there with your solution, is that an absolute requirement? Or the way it's set up, yeah, it's best practice to have endpoint security set up, but if the user doesn't or they don't keep it updated, the way that it's set up, it's not a huge risk. Yeah, let's say, right? It's hard to say there's never a risk, right? Right. But, you know, is it a huge risk if the user doesn't have something that's updated? Yeah, absolutely. So that's a good point, Michael. There is no silver bullet, right? What we're doing is reducing that attack surface tremendously. And you can implement a set of device compliance checks to prevent the user from logging in if they don't meet them. And they're basic hygiene things, right? It's the, like I said, the antivirus installed. Is it running? Has it been updated? Is your operating system patched? Is your AV screaming, hey, there's an infection there? But if that was something that we didn't want to enforce on the users, yes, this solution has a number of ways that it's protecting, right? So for one, that disk is a read-only disk from the outside perspective. It's impossible for anything to write to that disk. We're protecting against common attacks like memory injection. So we're monitoring what's happening with that application because we're so far in the operating system. We're able to monitor all that and shut down anything if somebody's trying to attack the applications that way. So in effect, if that computer gets ran somewhere, I mean, that's terrible for that user, but it's not going to impact work or work data in that secure enclave. Great. Yeah, just another point on that. Even the keylogger kind of scenario, if somebody were to download, get a keylogger on their machine, okay. I mean, it's terrible. It's gonna take their banking information, but they're not able to record the keystrokes of any of the inputs, the applications that are inside the enclave. Yeah, no, great point. So you stole my question, right? Because on the IT side, that's a concern, right? Someone with a personal computer, whatever, something malicious could have already happened, and could already be on there. And the common scenario is the keylogger that's already on there. So now, you've got a computer that's compromised with the keylogger logging into our network. And now, keylogging all their, what they're typing, client information, which could include their address or security number, they're doing like intake or something like that. They're passwords. So with your solution, if that computer is already compromised with the keylogger, it's not a concern with your solution. Correct. Great. Okay, any other questions? Hopefully, my few questions made you think about some things on your end. Again, you could use the chat if that works better for you. I'll just throw out a couple of little tidbits until we see any of the chats coming in. So one of the things to consider too is that we do have some things out of the box, right? So if you don't have an identity provider, we can provide that for you. We have our own built-in identity management system. Same thing with that private company gateway. So that's there out of the box. Same with, we have a proprietary file system. Now we built this so it's extremely flexible. We know most people have best in breed. So you can actually integrate with Okta, Azure, another third-party IDP. You can leverage a different file system. You can even turn off that private company gateway and insert your VPN solution in there, right? So you have a lot of flexibility depending on how the environments are already set up. Great, great. Chris, Dan, thank you so much. This was great. I know some of these provoke thought after the webinar on your way home. You're like, oh, I should have thought of asking this, right? It's just kind of the way it is. We've got a great community and a community of people that wear multiple hats. Some have an in-house IT department. Some have an outsource. Some have an attorney that's the IT department. So we help with all different scenarios and the people on the call could be one of those scenarios and wearing that hat. So I think this was great. Thank you so much. Definitely appreciate you being on. And as Shelly chatted, this is recorded. This will be put on their YouTube channel. So they've got hundreds of organizations, a part of LSNTAP. So those that aren't able to join, but interested, they definitely have access to view this at a later time. So again, thank you so much. Really appreciate it. Great, thank you for the opportunity, Michael. We really appreciate it. And if any questions do come up on the drive home, like Michael said, or if there's someone from your team, maybe sees a recording, I'll reach out to Michael. And I'm sure you can communicate the question to us and we'd love to get it answered for you. But thank you for the opportunity to Michael and to everyone on the call. Thank you, great. Thank you. Okay, I'm just, yep, great. Thank you for that, Shelly. Okay, so I'm gonna turn it over to Joel at a tier point. Again, providing another solution, addressing an issue, right? How do you control your data when they're not using one of your devices? I mean, this is not a problem that is going to go away. I think anytime soon, especially with our community, with the need for volunteers and interns. And look, quite frankly, we have to worry about it with staff as well too, right? Especially with the hybrid. If you're in the office and your computer breaks down, chances are, you have another desktop in the office or another laptop that you could hand them. But now that you have staff at home, they have an issue with their work assigned computer. Are they gonna come to the office and get that fixed so they can continue to work? Or if you have the option, okay, while we get your computer straightened out, just if you have your own personal computer, hey, here's how you access all of your resources using your own personal computer. So though I've kind of focused a little bit more talking about volunteers and interns, this definitely helps address with staff as well. So okay, enough of me rambling. Joel, thank you so much for joining. Thanks in advance for your presentation, same scenario. You've got 15 minutes to go through your spiel and then we'll leave it for some questions after. Joel, if you are talking, you might be... Michael, yeah, there we go. Can you hear me better? Can you hear me now? I can. Yes, thank you. Yeah, okay, so let me jump into it. So yeah, Joel the Pre-Senior Director of Channels with TearPoint. Michael, thanks for inviting us to present and we are gonna, we have a little bit of a different approach, right? And so I'm gonna get into, from an agenda standpoint, who TearPoint is, will give you a high level overview of VDI and how that works and how we're accomplishing that. We talked about this too, Michael, Manage0365 fits a little bit of that, so that's another kind of angle and part of the story, including security around email and then a general security conversation as well and a product we call CleanIP that we use that help manage remote and multi-site kind of situation. So those are kind of the talking points that we'll chat through. And again, I guess we'll have questions at the end, but if anything comes up or you guys have any questions, please, please jump in. So TearPoint, again, we're a little bit different, right? So we're a very large data center company. We own 45 data centers across the country. I think we would probably be considered these days the leader when it comes to doing managed clouds, whether it's managing your AWS environment, Azure environment, we build out private clouds, we do VDI and we do a lot of this through our own data centers that we own and operate. So we're a little unique in the fact that we own and operate a ton of data centers, but then we also have this super significant managed service portfolio. So we offer a ton of services out of the data centers, not just like your traditional colo and kind of providing space. We do a lot of services and that's what kind of brings that story together. We're about a thousand employees, 5,000 customers, pretty substantial organization these days. There was a point about eight, nine years ago we went through a big acquisition spree and bought up some of the leading data center companies around the country and they were one of the larger ones out there. So there's some unique benefits to having a company that does all these managed services that actually owns and operates the data centers as well gives you kind of that next level of security from an operation standpoint. So managed virtual desktop, there's traditionally we've done this in a dedicated model, right? So when I say dedicated like a private model where we partnered with a company called Nutanix and we did dedicated virtual desktops to our customers, right? So that means you have your own private dedicated environment, which we still can do. We have recently started working at the offering some BDI stuff through the public labs through Azure specifically. So that can bring costs down and allow us to do it in a more kind of scalable model and offer it a more kind of competitive pricing standpoint. So there's a couple of different ways to kind of accomplish this. For us virtual desktop, what it means is you get to bring your own device, your computer, your applications, your files, all of that stuff has been a secure data center elsewhere, right? So you're kind of locking it all down and you don't have all the risk and exposure of having PCs out there, files and all sorts of stuff that you kind of have no control over. So again, compared to the other solution, this is a little bit more of tackling your entire IT strategy not just the single kind of solution to manage that. We empower employees to bring their own device, embrace a more kind of mobile work style, and it reduces a ton of risk when kind of rolling out a virtual desktop model. Virtual desktop also from our standpoint, we're able to design this because you have to think I have to have access to all of my files, all the different applications. So our experts design, build, understand your existing environment, your existing IT strategy, where things are. Most companies are operating in kind of a hybrid model, right? So you have some applications that are maybe in the cloud, you have some stuff that's on-prem, stuff in a lot of different places. Again, a lot of where our value comes in is being able to understand that and build out a strategy to kind of take you from where you are to where you wanna get to. It's often very hybrid and encompasses some of the things you may already have in place today. Client focus, so our VDI offering 24-7, skill technologist, right? So part of what we're offering here includes things like help desk. So you have managed help desk that can be layered into the virtual desktop offering, which is a whole nother set of issues that you may have. So you have somebody to call in, you have resources and support there. We do trending analysis and recommendations for optimization, you know, dependable SLAs. You have access to our team through a web-based portal and also phones so you can kind of manage tickets and your end users can go directly to us so you're not having to manage these virtual desktops, you know, an ongoing help desk support. So a lot of cool stuff there, you know, incident change request reports, things like that. So very client-focused. Again, the help desk layering into the virtual desktop really adds a lot of value for our clients. Security first, right? So a holistic approach. I mean, everything's built in and built on. So I'll get in a little bit around clean IP and some of the next-gen security offerings that we have as well that you can kind of layer into your VDI and O365. We also have a thing called secure workforce that I'm gonna hit with O365. But, you know, that's kind of the gist of doing a virtual desktop, right? I mean, it's part of your strategy. Again, we can do it in a very hybrid manner and we can kind of understand where you are, where your goals are and help you get there. I'm gonna jump into O365 now. Any questions, Michael? Anything you'd wanna hit on VDI? I'll save it for the question and answer. Yeah, yeah. Yeah, that makes sense. Let's kind of fly through. Okay, and I'm doing it on the cam time, right? Yep, yep. So O365 is the other kind of component, right? So you think of your virtual desktop that links into a bunch of your other applications. We also do manage Office 365. And that includes delivering it in a managed model for you to consume. We also offer secure workforce. So that's basically managing all the security around your O365. So a lot of times when you buy O365, it comes with some security package stuff, but you have to manage and set all of that up. So we configure the best security policies to maximize defenses against cyber threats and data loss around your O365. We also offer help desk around the O365. So again, if you don't wanna be managing support tickets around, just like with VDI, if you don't wanna be managing those support tickets, we have 24-7 US-based support team to help you manage tickets with O365 as well. We can actually do all of the help desk around all this. And then, think about this, we basically have a different route in the Microsoft. So if we gotta escalate things, a lot of these things we can handle ourselves, right? We've been through them. And then if we need to escalate to Microsoft, we have premier support and can get oftentimes better access and quicker access to resolve problems. So just kind of get kind of that premier access through us and get it delivered again in a kind of managed consumption model. Minimize licensing, right? So we can move your existing licensing over, clean all of that up, simplify migration and administration. So setting everything up, delivering it, all of those things we can take off your plate and provide you guys. And then professional services, we can extend everything for professional services. And this is across the board, right? We talked about this with VDI. If you have servers, you wanna move to the cloud, all of this gets tied together through professional services. And so again, we can help you migrate, we can set environments up, we can do assessments, manage migrations, whether the assessments are around security or infrastructure, we do all of that. So the third component is managed, we call it clean IP, but it's basically next gen firewall. So when you're kind of tying all this together, right? You're moving this infrastructure to the cloud. The key then is, okay, now I need to manage security in terms of accessing the cloud, what's happening on-prem. We do next gen firewalls where we can manage a lot of this stuff through our managed SIEM and SOC, or so basically our managed security operation centers to do all sorts of different things around managing your security when accessing applications in the data center and off-prem and especially in a hybrid environment where stuff's going back and forth and things are kind of all over the place, which is very common these days. We have a hybrid kind of next gen firewall capabilities that we can offer through clean IP. And again, no matter how sophisticated the environment, we can cover lots of different things, whether it's NAT stuff, managing the VPNs, deep packet inspections, you know, intrusion prevention, intrusion detection, DDoS mitigation, web content filtering, you know, full stack visibility no matter where all the applications are, identity user awareness, application awareness, granular control, you know, anti-virus management, you know, device availability, monitoring and alerting, leveraging external intelligence sources, right? So there's a lot of different things we can do to manage your overall security stance in these kind of hybrid environments through clean IP next gen firewall offering. So that's kind of, you know, DDoS I mentioned in the web application firewalls we do as well, that kind of rounds out, you know, the three kind of things I wanted to focus on. Again, we're a leader in, you know, managed services across the board within our own data centers. So we can do a lot, you know, in terms of just building out and, you know, kind of evolving, you know, your entire IT strategy, but these three things, right? Managing the security, doing the virtual desktop, doing manager 365, I think really enable you to have a strong kind of strategy around this ever-changing, you know, workforce where you have a lot of people that are hybrid and, you know, remote or coming into the office sometimes and, you know, bringing their own devices. I mean, this is just, that's something we can help design an entire strategy around. So, yeah, I think that kind of wraps it up. Thank you, Joel, really appreciate that. So for those who don't have VDI experience, so could you talk a little bit about, so, you know, someone's working off their personal computer and you talk a little bit about how they would be working, you know, is it a client on their desktop that they're opening up or they're opening up a web browser? You talk a little bit about what they're doing. Yeah, you're opening up a client on your, yeah, you're opening up a client on your desktop. And again, there's two ways we're doing it, right? So we can do it in a dedicated private deployment, right? So we have an offering called Nutanix Frame and that's basically, we go in, let's say you have 150 PCs, right? So we would go in and build out a dedicated, essentially private VDI cloud for 150 users. It can scale, but it's dedicated, right? So you might have a little bit of buffer room, you got to add to it, or we could do it in a public cloud like in Azure where it's very on demand. But yeah, either way, you're opening a client and everything, you know, again, if it's in a dedicated model, everything is happening in that private cloud that we built inside of one of our data centers, right? So the security is getting managed there, the access to the data center, all of that stuff's in our data center. And then if we do it in Azure, that's in Microsoft's cloud. But yeah, both ways you do it, you just open up an agent and you can provide that to a new user, they can open it up on their PC. And you know, that's kind of crazy because you'll get like, let's say, as long as you get connection to the cloud, right? To the VDI, then when you're on the VDI, you're banned with all of that stuff is happening out of the data center. So, you know, you might have 10 megs and then you're getting 100 megs because that's what you have out of the data center. Right, so that's a great point. Because so one of the challenges with hybrid work, right, is we have people working in areas where internet is not great, you know, it's a rural area. So what you're saying is, as long as they can make that connection to the environment, now that environment's gonna take over and the speed and the performance are based off of what you're supplying versus what they have at home. Yep, yeah. And so the bandwidth, you know, they can have a, you can, I mean, you just, you can get these almost, you know, like very base kind of terminals that, you know, don't have a lot of compute, don't have it a lot of capacity because all of that's happening on the, you know, again in the data center, right, in the cloud, right? Whether that's in a public cloud or in our dedicated private cloud offering. Great. And I appreciate you bringing up the support information. Because with some organizations, sometimes make decisions to not go a certain route because they don't have the internal IT support to be able to support a solution. So when support is available, you know, to help with, you know, not just the implementation and walk away, but the ongoing support, you know, that makes a, you know, and any solution more attractive. Again, especially for organizations where, you know, they have very limited IT staff or no real IT staff, right? It's an attorney who's wearing an IT hat for them. So that, you know, that, you know, ongoing support is definitely a good option. So I did want to open it up in case, you know, if anyone has any questions. Again, you can unmute yourself, chat in the chat box if there's any questions that you have for Joel. Joel, definitely, you know, appreciate that presentation, the overview, including some of the other, you know, security that ties into remote work that, you know, we have to sort of factor in as well. Okay. I'm just gonna say, while we're waiting for questions from the audience, I would like to know, obviously a lot of our community is in the legal aid space and in the nonprofit arena. So I wanted to hear, you know, your company's experiences in working with those type of clients. So open it up to both companies. So Joel, if you want, since you were just presenting, if you wanna go first and then I'll let, you know, Dan go after you. Yeah, specifically with the legal, I got that right, right? I mean, because it's like legal form. Yeah, legal nonprofit, yep, yep. I heard nonprofit, I'm like, okay, yeah. Yeah, no, we do, I mean, legal's been a big vertical for us, we have law firms and legal organizations of all sizes as clients. I mean, we're a, we get more focused on verticals, but what we do, it's so, you know, it's just solving IT challenges, right, across the board. So it makes, I mean, whether it's state and local or finance or healthcare or legal, we have tons and tons of customers across the board. But definitely there's a, you know, we have a strong, you know, legal is a big vertical for us. We work with lots of different legal organizations and have tons and tons of experience there. Thank you, Joel. Dan or Chris? Oh, you know, kind of the same, right? We're pretty much vertical, agnostic, right? We work with kind of all shapes and sizes of organizations and I'm working with a lot of legal companies, a lot of smaller ones as well, right? And specifically when it comes to organizations that are not profit, whether they're legal, financial, wherever it may be, healthcare. One thing I think we do really well as well is from a support standpoint, especially with some smaller organizations is being able to provide that additional support. There's, you know, training, onboarding, and you know, we're with you 24 seven from the first day you start with us and so you have that contract with us. So I think we're very well positioned for those nonprofit organizations that did well. Really specifically because how we kind of work with the contractors, the interns, the volunteers and whether a lot of people kind of coming in and out of the organization, you know, sometimes it doesn't make sense to have that extra hardware on board or kind of pigeonhole yourselves to just hiring in one specific location. So I do think we really help out with kind of increasing the breadth of where you're able to hire or where you're able to hire them and be able to deliver your assets securely and be confident that your data will be protected. Right. Thank you, Dan. And actually, you know, again, just to help the audience with thinking some things through, Dan, you just said something that triggered the thought, right? You know, they're contractors in addition, right? That we work with that, you know, they might just be coming in on a specific, you know, short-term project. It could be a long-term project. So they're gonna need access, you know, depending upon what the project is, your data as well. So if you've got a solution in place, right, they fall under the same category, right? They come in, you know, handle the project, complete it and you still have access to all of your data. It's not sitting anywhere else when, you know, when they leave, you know, I think a lot of times where, you know, contractors get a pass, right? And they're like, okay, well, you know, we've got an NDA with them and different things. And yeah, they could, you know, have all the security in place, but if you've got the data locked down, it's just not something you even need to worry about. So thanks for bringing up the contractors because it's another, you know, area where it's, you have to think about, you know, what's happening with that data. So we've got, Cindy, question, is there a mobile app for both of these solutions? So I'll, Dan, since you just spoke, I'll just kick it back to you. Does your solution also work with mobile app, you know, mobile applications? Yes, it does. Yeah, we work with Apple, iOS, Android and sometimes we even have the ability to use that part of your two-factor off the fence with them to get into Ben's workspace. Great. Yes. Great, Dan, and Cindy, great question. Joel, with your solution, you know, are you also handling mobile applications? You could do it through a browser with a private cloud. I don't, with our new stuff through the public cloud, through the Azure, I'm not positive yet, it's new. If we'd have an actual app that you can download, but you can access to a browser too, right? If you want to get on a virtual desktop. Great. Thank you. Yeah, I mean, look, it just emphasizes, you know, there's so much that needs to be covered, right? You could access data from computers, from tablets, from smartphones. Now you've got, you know, smart TVs where you could be using that as well. I mean, it's really just so much out there where you could be, you know, accessing data. So, you know, it's definitely a lot of ground to cover. Thank you, Cindy, that was a great question. Thank you for bringing that up. We've got a few more minutes. I'm sure there's a few more questions out there. Don't be shy. Again, you could chat it as well. You know, this is, I'll say this has been a concern, you know, as long as we've been using computers, right? You know, if someone's not working in the office, but they need access, right? How do we do that securely? So a lot of what's been covered today give you options to help with that. With that, and again, this is not something that's new and it's not something that's gonna go away. You know, and I think, you know, especially the move to mobile has increased, you know, the cost of equipment. You know, I mean, desktops we were able to get for, you know, a certain price and now with the move to mobile, you know, having laptops and then do you do docking stations and, you know, now multiple monitors, I mean, you know, the costs keep going up and up. So when, you know, someone needs the ability to work outside of the office, you know, how are you doing that? You know, and so these are some ways to allow you to do that. And, you know, you might end up being, you know, offsetting, you know, some or all of that costs if you don't have to provide, you know, equipment for someone that's, you know, has to work sort of outside of the office or working with a personal device. And I think, I apologize. One of you mentioned about, you know, sometimes you provide a stipend or something for, you know, for a device. So, you know, you onboard a new, you know, staff person or a volunteer and, you know, you're providing, you know, potentially a stipend to help, you know, cover that, which is typically going to be less than what you end up paying to provide that person a computer. I know that's a great point. And one other thing I'll kind of piggyback on top of something you just mentioned about offset computers, especially for short-term employees. You know, one thing that we do with our clients all the time is develop an ROI, right? And what that looks like, especially for nonprofits, right? That sometimes have limited capital. When we were able to kind of show the difference of, you know, our solution compared to having to buy ship, sometimes the computer does not get returned. It makes a lot of sense for our organizations and saves them, you know, pretty significant amount of money over the course of the year. And anyone that's interested in kind of learning more about that, I'm going to show you what that would look like as well since the time's offline. But that's a great point that you just made, Michael. I just want to piggyback off that a little bit. Great, thank you. Yeah, I think just, you know, another added benefit of being able to now kind of leverage BYOD and some of the things that we've encountered ourselves. I remember one of the very first users we got on the system was so excited about it because she was a gamer. She built her machine a certain way. It was very much specced out and she wasn't relegated to company-issued computers, which, you know, let's be honest, we can't buy sometimes the most top of the line, the best solution out there. So it gives some flexibility within the workforce if you're bringing on contractors that have spent a lot of time and money building up their own machine, they can leverage this in a way that it's respecting their privacy and ensuring the data is secured while they're working on their device. So a recommendation from Shelly, you know, so any last thoughts on what should be considered on this issue, you know, it's in the chat as well. Again, if you'd like to chat any thoughts there, that would be helpful. Okay, we have a quiet crowd today, which is fine. You know, look, that happens. But I definitely hope with the few minutes that we have left, you know, that you come away with some good information to, you know, think about, take back to your team, take back to your organization, take back to management. I know this is a conversation that some of you or a lot of you have had when having to do, you know, cyber insurance or, you know, reading through what funders are requesting, you know, in terms of what security you have to have in place, that's changed, right, for over the years. It's gone from, this is what we recommend to now funders saying, yeah, this is the minimum requirement to what you need to have in place. And that's just that list is going to continue to grow. This is not to scare anyone or anything like that. But, you know, security is a big factor in keeping, you know, our client data secure. So this is really not something that's gonna go away. You know, we've got a budget for it. I think funders have been more flexible with helping to cover some of this, which in the past some of them, you know, have not. So, you know, a lot of the funders are also recognizing the need for, you know, to budget for security. And, you know, these are, you know, what we've discussed today are some good options to think about and, you know, bring back to your teams. Shelly, any last words? Thank you so much for hosting this. Well, I want to thank our guests, Joel, Chris and Dan, and their companies, Vin and Tier Point, for joining us today. I wanna make sure that we get all of those companies on in our TechStack database so that the community can use that when they're starting to shop for different services. So I put it in the chat, but we'll also send it up in a follow on email so that you can make sure that the information that we have in the database matches what you want to present. And thank you for all of our attendees that came out today. I hope that it was helpful. And of course, you can always view all of the past webinars on our YouTube channel. And thanks you once again, and I'm gonna let you get back to your afternoon. Have a great day. Thank you, everybody. Thank you.