Archive - Enterprise IT RSS Feed

Enterprise Management Associates (EMA) Finds Rich MSP Value in Kaseya Traverse

When noted IT research firm EMA, Enterprise Management Associates, wanted to understand the value of Kaseya Traverse, it went to the best source it could find, a managed service provider (MSP) that bases client services on the network and cloud monitoring solution.

EMA interviewed the customer extensively, and then reached its own conclusions. The EMA study “highlights a dialog with a managed services provider (MSP) using Kaseya’s Traverse for requirements that span management of the full application infrastructure in legacy, virtualized, and cloud environments. The report explores the value of Traverse in providing unified, contextual, service-aware insights with the versatility to adapt to a wide variety of verticals and individualized customer needs,” EMA explained. Continue Reading…

Everything is Critical Infrastructure, Learn How to Profit from It

MSPs are tasked with keeping everything running.  They have an around-the-clock, constant flow of information, accessible at any time from anywhere.  Each and every single business depends in some way shape or form on that network of information flowing.  However, we often consider only a small subset of what users actually interact with to be the MSP’s responsibility (e.g., desktops, servers, laptops, and maybe some simple network monitoring).

We need to expand what we consider fundamental to our monitoring responsibilities.  Today’s customers are more comfortable than ever with technology.  With that comfort, their expectations for availability, performance, and quality have grown.  Moreover, large telecom providers have made information flow easier, unlimited, and available all over with faster speeds than ever before — changing users’ expectations outside of their work lives. Continue Reading…

IT Service Provider Axians Taps Kaseya Traverse to Manage Client Networks

axian

IT service providers have a lot on their plates. Axians, based in the Netherlands, is a case in point. This company manages client IT infrastructure, everything from hardware, software – both custom and off the shelf – as well as cloud services and network solutions.

Networks these days are incredibly complex and the lifeblood of modern organizations. That’s a rather obvious point. Just as apparent is that service providers need solutions that can handle this complexity, and manage, troubleshoot and fix on-premises networks, cloud networks and hybrid network infrastructure.

Many IT service providers start with the management of servers and end points, and are now moving clients to cloud applications. With that it makes sense for providers to take care of all aspects of the network, including those pieces that reach out to the cloud and back.

With Kaseya Traverse, now in use at Axians, service providers can create a holistic, aggregate view of these cloud services the way they have a single pane view of on-premises infrastructure. Continue Reading…

X-CIO: Technology Islands — Why You Need to Consolidate to Save Big

sergio-blog-big-1

As an IT manager, hearing “spend less” over and over again, one of the easiest tasks is to consolidate “technology islands” (i.e., multiple applications) under a single vendor. Does it make it easier to do <whatever>? Yes, but more importantly it gives you financial leverage to negotiate a fair price.

When you decide to move to a single vendor, you start the move toward those savings and growth.

Take the time to look at what software you have.  Is there a vendor that has a complete solution — or one close enough to it? There is — there always is. If you’re not sure, Google it!  The solution does not have to be 100 percent perfect — it has to give you what is valuable to you at a fair price. Continue Reading…

Q&A: VSA Drives MSP Internet & Telephone to New KPI Heights

casestudy-graphic.internet-and-telephone-big

MSP veteran Paul Cissel, CEO and founder of Internet & Telephone LLC (I&T), runs a tight ship. A big part of that discipline is the use of Kaseya VSA, a next generation RMM that helps the 14 year-old company tightly manage clients – doing such a great job Cissel’s I&T now dramatically exceeds MSP KPI norms.

Kaseya recently spoke with Cissel to learn more about how he uses VSA to drive operational excellence. Continue Reading…

Two-Factor Authentication: Double your Defense Against Hackers

hacker-protection-blog-wordpress

With the ever aggressive advancement of digital crime from cyber-thieves, and the increase of Internet fraud, companies now fully recognize the importance of high level security. Many businesses know they can’t completely protect their workers’ usernames, passwords and logins through traditional, largely manual means. The companies that really get this use two-factor authentication (2FA) as a defense against hackers trying to gain access to online accounts and company servers. Continue Reading…

The Cloud Is Way More Secure Than You Might Think

cloud-security-again-big

Let’s settle this old argument once and for all. With a good provider, and properly set up, the cloud is more secure than most on-premises infrastructure.

Does that still sound a wee bit equivocal? It has to be. Large enterprises, particularly in industries such as finance, can build superbly secure private infrastructure—they have to and can afford to do it right. Not all companies are gifted with these kinds of budgets, however; nor are  they able to attain such a high level of protection. Continue Reading…

Secure Your Critical Cloud ERP and CRM Data Straight to the Last Mile

cloud-crm-blog-big

In the early days of the cloud, IT worried about security. After all, if your data isn’t in your own hands, how do you know it’s safe?

Fortunately, it is cloud vendors’ business to make their systems secure and they have layers of professionals and security tools to do so. Today, one could reasonably argue that cloud services from reputable providers are safer than in-house applications.

Safer yes, within the confines of the provider’s infrastructure. But there is one key area of vulnerability – end user access. In order for cloud services such as ERP or CRM to provide business value, your end users, and sometimes even your partners, need to access the system, get at the data, and update records. If a hacker gets the keys to this kingdom, they can see what your end users see, steal your data, or corrupt the system. Continue Reading…

Lessons from Yahoo Data Breach Debacle: How to Block Breaches and Minimize Their Damage

data-breach-blog-big

While Denial of Service (DoS) attacks and disabling malware are IT nightmares, what really keeps IT pros (and the execs they report to) up at night are data breaches. And that means a lot of restless nights. These breaches are growing in number and impact.

If you have any doubt, look at what just happened to Yahoo! This December, the tech giant disclosed that over 1 billion accounts were compromised. The crazy thing is this hack happened some three years ago! And hackers gained a treasure trove: customer names, birth days, phone numbers, as well as their encrypted passwords and encrypted security questions, which serve as a second layer of authentication. Continue Reading…

The Future of MSPs Lies in Adding Value to Cloud Services

future-msp-blog-big

Managed Service Providers (MSPs) spent the last decade or so making a major transformation ― moving from a focus on break/fix to true managed services ― and at the same expanding their list of offerings to become more complete providers.

Now they are going through an arguably even more significant change ― becoming cloud leaders to the SMB market.  To do this effectively, MSPs also need to work with clients on a higher level by acting as a trusted advisor and even offering Virtual CIO (vCIO) services, including partnering with clients to conduct in-depth IT consulting, budgeting, and planning projects. Continue Reading…

Page 1 of 512345»
-->