Archive - Enterprise IT RSS Feed

The Pundits’ Take on MSP 2.0

msp-2.0

 

MSP 2.0 is not exactly a new term, but it is really catching on to describe the current managed service provider market.

The Kaseya Take on MSP 2.0

As a vendor largely focused on MSPs, Kaseya has a deep commitment to help MSPs successfully navigate in an MSP 2.0 world.  Kaseya offers a comprehensive collection of solutions, from RMM to PSA, identity and access to cloud monitoring, and more, that are all MSP 2.0 ready.

In our analysis, MSP 2.0 is in part a manifestation of market growth. MSPs have matured from part-time operators and small 1-5 person technician-dominated companies five short years ago to larger process-centric organizations with strong technical capabilities combined with professional sales, support, marketing, finance, and management teams. Because of the larger clients, super-MSPs that could handle the scale evolved. These MSPs are 100% focused on growth and expansion and employ professional sales, marketing, and technical delivery organizations to acquire new accounts and often displace smaller less mature MSPs.

On the other side, small- and medium-sized businesses (SMBs), the prime targets for MSPs, are increasingly demanding and requiring the same technologies and processes that have been pioneered and used for years by enterprises.

This means SMBs are now Continue Reading…

The Risks and Rewards of a Hybrid Cloud

hybrid-cloud

Remember when the cloud was the new big thing? Then private clouds where all the rage. Now we are inundated with talk of hybrid clouds which combine private and public clouds into one unified system.

Before we talk about why hybrid clouds sound so great, we should touch on why private clouds are so compelling.  With the help of server virtualization, you take your own infrastructure and make it cloud-like – basically turn it into a utility. But you control the whole thing and, because it is local, you have full control of its performance.

The problem is that as demand grows you have to scale up the private cloud by adding more resources – even if you only need those resources every now and again. At the same time, there are services you want in the easy-access public cloud (because users can get to the cloud from anywhere) but you still  want these applications and data linked to your on-premises applications.
Continue Reading…

Policy-driven Security Helps You Stay Ahead of the Bad Guys

policy-based-securityKaspersky Labs just published a new eBook, Cybercriminals: Unmasking the Villain, which provides insight into cybercriminals’ evolving strategies and tactics. There are three points in particular that I want to highlight:

  • “31% of all cyberattacks are directed at businesses with less than 250 employees”
  • “42% of confidential data loss is caused by employees” often due to well-meaning employees “opening unauthorized email attachments, forwarding sensitive information or storing data insecurely”
  • “Hacking a small business to get into a larger business is now standard operating procedure for cybercriminals.”

These evolving cybercriminal practices underscore the reality that proper, up-to-date security practices are more vital than ever to the health and well-being of every company, no matter its size.  The risks are too high, and the incidence of exposure and breaches is only increasing.
Continue Reading…

Repair a Dead Machine Remotely – Without Driving Onsite

no-remote-driving

IT techs – whether working at MSPs or in internal IT Ops groups – have long faced a miserable task:  physically visiting PCs and other devices that are dead by hard drive failure. In these cases, you must pack up your kit, head out to the site and see what can be done.  Depending on where you work, this can be called a truck roll, man-in-the-van work, or just plain wasted time that you would rather spend doing other work.

Each of these visits can take hours, and often technicians find themselves going back and forth from the site location and the main office to gets parts or new bits of software to solve the problem.

What if you could sit at your console in a comfortable chair with a cup of coffee, and repair that hard drive right then and there – in minutes?  What if this wasn’t just an edge use case, but you could essentially eliminate going on site to fix laptops, kiosks and PCs that are no longer responsive?  What if you could say goodbye to what MSPs sarcastically refer as “windshield time”?

Continue Reading…

Why MSPs Should Rule the IT World

globe

MSPs are clearly on the move. Seeing the value of outsourcing, SMBs and larger shops alike are moving in droves towards managed services. At the same time though, too many organizations do the things the old way, having understaffed IT teams struggling to keep things running – and not availing themselves of state-of-the-art managed services.

There are two problems IT needs to overcome, both of which are solved by managed services. First, it’s hard for small overstressed teams to secure the network, ensure performance, and fix all the problems that constantly arise. The bigger issue is this struggling IT team has virtually no time to think strategically. That leaves them both vulnerable and at a huge competitive disadvantage in their industry.
Continue Reading…

Hidden HIPAA Traps

hospital

How You Can Become a Healthcare MSP Master

Many industries have compliance rules, but few are as strict as the Health Insurance Portability and Accountability Act of 1996 (HIPAA).

While HIPAA is a set of U.S. regulations, many countries have similar rules.

When it comes to these complex rules, healthcare companies can’t always go it alone. It helps to have a trusted partner who is expert in all things HIPAA, such as an MSP with a vertical health care focus.

The good news for MSPs is that your HIPAA expertise lets you sell services at a premium – compliance is just that important.

Continue Reading…

How Changing SMB Client Requirements Are Reshaping the MSP Market

A lot of the time, we can get caught up in discussions about ‘hot’ markets for MSPs – and the list is growing, from security to cloud to mobile to firewall management.

But it’s important to level set occasionally.  The reason these markets are hot is because the technology requirements of small- and medium-sized businesses (SMBs) that MSPs serve is undergoing a sea change.

SMBs Now Have Enterprise Needs

Technological requirements that were once the needs of only large enterprises are now are becoming mainstream requirements for SMBs.

Continue Reading…

The Patch Management Crisis and How to Solve It

patch-software

Most end users, and even some IT pros, feel pretty safe if they have up-to-date anti-virus/antimalware, firewalls turned on, and complex passwords in place. This overlooks one of the biggest threats to your PC and network – poor or non-existent patching.

The vast majority of successful exploits are against unpatched machines, some 85% according to US-CERT, part of the US Department of Homeland Security.

Why is This So Bad?

While viruses can be a nuisance (and often worse) to unprotected machines, the kind of attacks aimed at unpatched machines can be far worse. These are targeted at doing real damage – stealing data, escalation of privilege, releasing bots, gaining deep entry into the network, and worse.
Continue Reading…

GUEST BLOG: Solid Security with Kaseya plus Proven Next-Generation Endpoint Protection from Webroot

Each year, Webroot publishes a Threat Brief, a detailed report which details the churn, change and growth within the cybercrime ecosystem. 2015 was another record year in which more malware, malicious IPs, websites and mobile apps were discovered than in any previous year. The current rate of cybercrime comes as no surprise, given continuous innovations and little in the way of risk for those who choose to participate. The continued onslaught of hacks, breaches and social engineering scams targeting individuals, businesses and government agencies has caused many in the security field to ask if it’s truly possible to defend against a persistent attacker.

At Webroot, we believe it is possible to effectively protect enterprises and end users alike, but only by understanding your adversary and the techniques they employ for their attacks. Webroot’s sophisticated approach and secure solutions reflect an in-depth understanding of the threat landscape and how attackers think, allowing us to provide cutting-edge, proven next-generation protection and real-time detection of threats as they emerge. With Kaseya VSA’s integration of Webroot SecureAnywhere® Business Endpoint Protection, it has never been easier for you to manage and protect your users.
Continue Reading…

Simplifying IT Compliance for Credit Unions & Community Banks

compliance

As a CIO, IT manager, or MSP servicing financial institutions, you realize that compliance is an important priority. You need to be able to manage both internal compliance, ensuring employees follow operational policies to mitigate risk, and external compliance following rules and regulations established by outside entities such as the government.

Realizing the need for compliance is just half of the equation. Being able to effectively manage that compliance in an efficient and cost-effective manner is the second part. Let’s briefly look at some of the issues facing financial institutions concerning compliance, and then look at how you can achieve the second part without a big bank budget.

Compliance Worries of Financial Institutions

Compliance, auditing, and security issues keep financial professionals awake at night, and rightly so. Security lapses and failures in compliance can lead to huge fines, ruined reputations, and lost customer confidence. A CDW sponsored survey in 2015 asked senior executives at banks what concerns they had for their banks:
Continue Reading…

Page 3 of 5«12345»
-->