As I write this, we are now several months into the Global Disaster we know as COVID-19. By now, I’m sure you’re tired of hearing about it, as am I, but I wanted to take a moment to pause and look in retrospect at some vendor response and support that we, the MSPs, have received.
- Helping Partners And MSSPs Differentiate Services Through Secure SD-WAN Enablement
- ASCII Insight: MSPs Share Their Thoughts On Surviving A Pandemic
- 4 Ways MSSPs Can Improve Their Security Offering Through Automation
- Predict Vendor Behavior: Follow The Money
- Stop Thinking About Saving And Focus On Creating
- Don’t Wait For Regulations – You Could Lose Your Business
- How Cloud-Based Communication Tools Support The Next Generation Of Remote Workers
7 Tips From Successful Remote Teams
Many businesses have been pushing the idea of remote work. Some leaders, however, are concerned that productivity and accountability could suffer because of it. But recent shortages of workers coupled with ever-increasing commute times are making the option of remote work more appealing every day. If this isn’t enough, the current COVID-19 pandemic has forced many companies to let employees go full remote.
MSP or MSSP? Part 1: What To Know Before You Make The Leap
Yet another wave of high-profile cybersecurity data breaches (including EasyJet, Deloitte and Home Chef) underscore what all MSPs already know: security is one of the most important functions in the IT industry, no matter the size of your company. If you’ve considered moving your Managed Service Provider (MSP) into the Managed Security Service Provider (MSSP) realm, both the opportunity and the stakes are higher than ever and require careful consideration.
How MSPs Can Automate Backup Failure Remediation
Bocada has played a major role for nearly twenty years in automating the backup data collection process and simplifying backup performance monitoring and reporting. However, since Bocada’s inception major shifts have happened in IT operations, including the push to drive increased automation across IT systems and processes and the need for dev ops professionals to manage increasingly complex architectures with fewer and fewer resources.
Shoring Up Your Network And Security Policies: Least Privilege Models
Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is: your employees don’t need unrestricted access to all parts of our business. This is why the Principle of Least Privilege (POLP) is one of the most important, if overlooked, aspects of a data security plan.
5 Ways To Improve Business Cyber-Resilience
Cyber-security is a lot like military strategy. Both involve a battle of wills between adversaries that includes the use of force. It’s no wonder why cyber-security practices often borrow from military tactics.
MSP WHITE PAPERS
How To Master MSP Automation Projects
It seems the entire channel agrees — automation is critical to increasing efficiency and improving outcomes for your MSP. But if you don’t have a lot of background in implementing automation initiatives, where do you begin?
The Definitive Guide To Sales: How MSPs Build Outperforming Sales Teams
Owners of early stage MSPs often wait too long before hiring a sales team, resultng in stalled growth or a stressed-tothe-limit CEO. To get serious about growth, MSPs have to become laserfocused on improving their sales and building a performance sales team.
Carbonite Endpoint Encryption: An In-Depth Look At The Encryption Technology Behind Our Premium Endpoint Backup Solution
As one of our core pillars, addressing the end-to-end security and privacy of data is a primary requirement of Carbonite Endpoint. By utilizing our automated key management and encryption technology in conjunction with our unique data deduplication, both efficiency of data deduplication and security of data can be accomplished. This document describes the end-to-end encryption process and encryption key life cycle management.
CompTIA is the voice of the world's information technology (IT) industry.
The ASCII Group
The ASCII Group is a vibrant community of independent MSPs, VARS and solution providers in North America. The organization offers members leveraged purchasing programs, education and training, knowledge sharing among peers, discounts on business services, and more. Founded in 1984 by Alan Weinberger, ASCII is the oldest and largest group of independent IT solution providers, integrators and VARS in the world.
Bocada LLC, a global IT Automation leader, delivers backup reporting and monitoring solutions that give global MSPs and enterprise IT departments complete visibility into their backup performance. Bocada provides insight into complex backup environments, enabling IT organizations to save time, automate ongoing reporting activities, and reduce costs. With the largest installed customer base in the Fortune 500, Bocada is the world’s leading provider of backup reporting automation.
Webroot delivers intelligent cybersecurity for endpoint, mobile and web to channel partners, consumers, businesses, and enterprises worldwide. Powered by its BrightCloud® collective threat intelligence network, Webroot protects the internet of everything. Our cloud-based threat detection, high performance, lightweight agents, and single, web-based point of control have changed the way businesses think about protecting mobile devices, PCs and servers. Named a ‘Visionary’ in Gartner’s Magic Quadrant for Endpoint Protection Platforms, Webroot’s smarter approach to security is why companies including Cisco, F5 Networks, GateProtect, HP, Microsoft, Palo Alto Networks, Proofpoint, RSA and others choose our solutions for advanced threat protection for their security products and services.
Field Nation brings companies and service professionals together to do great work. By connecting technicians to organizations in one easy-to-use platform and mobile app, Field Nation solves a critical challenge all service leaders worry about: accessing skilled labor. Unlike traditional job boards and labor platforms, Field Nation is built specifically for quick-turn, onsite service work. Businesses can build their flexible workforce for any skill, scout potential workers in every postal code, and organize go-to service crews fast. Tech professionals can search for work that fits their schedule, build their reputation and get paid within days of project completion. Our mission is to match every contractor with the right job, and connect every service team to professionals who care as much about the work as they do.
Liongard roared into the MSP software market, defining a new segment focused on unified visibility through automated data aggregation. With automated documentation, actionable alerts and rich reporting capabilities, Liongard unleashes MSP teams to operate at 10x, optimizing their resources and more effectively serving their clients.
MSP INSIGHTS CONTENT COLLECTIONS
Security is one of the best ways for an MSP to make money and will continue to be so for the foreseeable future. Unfortunately, selling security isn’t simple as it requires you to convince clients they are, in fact, a hacker’s target. Have no fear, MSP Insights has compiled an E-book to help you overcome these challenges. The guide is authored by your fellow MSPs and we're sure it will help you take advantage of the financial boom selling security is.More Content Collections
MSP INDUSTRY INSIGHTS
Increase Revenue With Office 365 Backup
Many IT service providers have moved, or are in the process of moving, their customers to Microsoft Office 365. Office 365 offers a variety of user benefits, including improved security, easier collaboration, increased mobility, and simplified pricing, among other things. It also offers benefits for service providers, such as ease of deployment and management, lower operating costs, and a foot in the door to other cloud services.
How MSPs Can Use Backup Monitoring To Build Cybersecurity Defense
MSP customers dealing with a cybersecurity attack isn’t a matter of if but when. While putting the necessary barriers in place to ward off these attacks is a critical part of any cybersecurity strategy, knowing how the IT infrastructures you’re building are at rebounding from an event is just as important. After all, without a clear understanding of how well critical assets are protected on a recurring basis, you’ll never know until a cyberattack happens if you and your customers will be dealing with a catastrophic loss or an inconvenient blip to IT operations.
How To Protect Your MSP From Cyberattacks
Managed Service Providers have been in the press a lot lately, and not in a good way. Cybercriminals have realized that the MSPs are a single point of entry into hundreds of poorly secured small and medium businesses (SMB’s), and come with fully functional remote access remote script execution to make their lives easier.
ASCII Insight: MSPs Share Their Thoughts On Cybersecurity
In our ongoing quest to provide you with the best business advice possible, we’ve partnered with The ASCII Group and their members who are going to share their thoughts on timely topics or best business practices. In this article, the following ASCII member answered our questions about cybersecurity:
8 Cybersecurity Tips For Working Remotely
As the COVID-19 (coronavirus) pandemic continues to interrupt everyday life, millions of employees have had to start working outside the office. For many, that’s a new concept and they may not be as cautious as they are in the office in securing their equipment and data.