Archive - Enterprise Monitoring RSS Feed

Enterprise Management Associates (EMA) Finds Rich MSP Value in Kaseya Traverse

When noted IT research firm EMA, Enterprise Management Associates, wanted to understand the value of Kaseya Traverse, it went to the best source it could find, a managed service provider (MSP) that bases client services on the network and cloud monitoring solution.

EMA interviewed the customer extensively, and then reached its own conclusions. The EMA study “highlights a dialog with a managed services provider (MSP) using Kaseya’s Traverse for requirements that span management of the full application infrastructure in legacy, virtualized, and cloud environments. The report explores the value of Traverse in providing unified, contextual, service-aware insights with the versatility to adapt to a wide variety of verticals and individualized customer needs,” EMA explained. Continue Reading…

Tech Talk MSP Blogs Attract Only Technical People!

If you take a closer look at MSP blogs, you’ll notice that they’re often Tech Talk style articles, written for technical instead of financial professionals. It makes much more sense, however, for MSPs to address business issues that appeal to CEOs and CFOs. Continue Reading…

IT Service Provider Axians Taps Kaseya Traverse to Manage Client Networks

axian

IT service providers have a lot on their plates. Axians, based in the Netherlands, is a case in point. This company manages client IT infrastructure, everything from hardware, software – both custom and off the shelf – as well as cloud services and network solutions.

Networks these days are incredibly complex and the lifeblood of modern organizations. That’s a rather obvious point. Just as apparent is that service providers need solutions that can handle this complexity, and manage, troubleshoot and fix on-premises networks, cloud networks and hybrid network infrastructure.

Many IT service providers start with the management of servers and end points, and are now moving clients to cloud applications. With that it makes sense for providers to take care of all aspects of the network, including those pieces that reach out to the cloud and back.

With Kaseya Traverse, now in use at Axians, service providers can create a holistic, aggregate view of these cloud services the way they have a single pane view of on-premises infrastructure. Continue Reading…

Why SMBs and MMEs Can’t Rely on the Perimeter, but Need Layered Security

layered-security-mme-blog-big

In a recent eBook, Best Practices To Protect Your Company’s Data and Infrastructure Through Layered Security, Kaseya and Kaspersky Lab detailed what SMB and MME IT shops can do to truly protect themselves.

The basics offer frontline protection. Firewalls, antivirus, anti-malware, and password policies are a great start. The bad news is that the bad guys have been either cracking or bypassing these defenses for years. It’s old hat. Continue Reading…

The Cloud Is Way More Secure Than You Might Think

cloud-security-again-big

Let’s settle this old argument once and for all. With a good provider, and properly set up, the cloud is more secure than most on-premises infrastructure.

Does that still sound a wee bit equivocal? It has to be. Large enterprises, particularly in industries such as finance, can build superbly secure private infrastructure—they have to and can afford to do it right. Not all companies are gifted with these kinds of budgets, however; nor are  they able to attain such a high level of protection. Continue Reading…

Slugfest: Should You Choose Google Apps or Office 365 for Work?

boxing4

In the early days of the Web, the cloud was too slow for interactive productivity tools. Now it’s way better and Google and Microsoft are in a pitched battle for cloud productivity supremacy.

Microsoft Office has ruled the productivity software roost for over a quarter century. The cloud may be the one opportunity for an upstart, say Google Apps, to upset that apple cart. That’s why the search giant launched Google Apps as a beta in 2006. Four long years later, it came out of test mode and became a commercial product which has been on a roll ever since.

Microsoft apparently wasn’t happy watching Google come out with cloud productivity apps that mimicked the Microsoft suite. In no time flat, Microsoft had Office 365, its complete end user set of productivity apps with some server goodies thrown in for good measure. In fact, Office 365 shipped only a year after Google Apps went commercial.
Continue Reading…

How Changing SMB Client Requirements Are Reshaping the MSP Market

A lot of the time, we can get caught up in discussions about ‘hot’ markets for MSPs – and the list is growing, from security to cloud to mobile to firewall management.

But it’s important to level set occasionally.  The reason these markets are hot is because the technology requirements of small- and medium-sized businesses (SMBs) that MSPs serve is undergoing a sea change.

SMBs Now Have Enterprise Needs

Technological requirements that were once the needs of only large enterprises are now are becoming mainstream requirements for SMBs.

Continue Reading…

Security You Can Take to the Bank

password-protection

How Banks and Credit Unions Can Safeguard Data and Ace Audits

In today’s rough and tumble environment where hackers no know bounds, every financial institution, regardless the size, has to beef up security and remain ever vigilant.

According to recent surveys, 83% of the financial leaders who responded felt that data is their most important asset, and 79% said that having a strong technology infrastructure was critical to ward off cyberattacks. Unfortunately while most feel that security is a top IT budget priority, fewer than one in five believe they have strong security in place.

It shouldn’t be that way – nor does it need to be. Smaller banks may feel that they can’t afford to implement measures to detect and prevent security breaches. The truth is they can’t afford not to. Let’s look at why security is so important to financial institutions, and how even the smallest institutions can achieve their security goals without “breaking the bank.”

Continue Reading…

Is the Trusted Advisor Still the Pinnacle of MSP-Dom?


trusted-advisor

The term ‘trusted advisor’ has been perhaps a bit overused, maybe way way overused. Even abused. But that doesn’t diminish the fact that it’s something MSPs are wise to strive for.

You all know the story about the MSP market moving away from break/fix to offer richer services, and becoming a strategic partner.

Being a trusted advisor means you help clients spot the future, find the technologies that offer specific competitive advantage, then pilot, deploy and manage these new technologies.

Trends over the last few years have only made this movement more important. Much of this has to do with the cloud, which is rapidly on the move, and the staying power of on-premises infrastructure. With that, there is a need to manage and integrate both environments, often resulting in hybrid clouds.
Continue Reading…

The Patch Management Crisis and How to Solve It

patch-software

Most end users, and even some IT pros, feel pretty safe if they have up-to-date anti-virus/antimalware, firewalls turned on, and complex passwords in place. This overlooks one of the biggest threats to your PC and network – poor or non-existent patching.

The vast majority of successful exploits are against unpatched machines, some 85% according to US-CERT, part of the US Department of Homeland Security.

Why is This So Bad?

While viruses can be a nuisance (and often worse) to unprotected machines, the kind of attacks aimed at unpatched machines can be far worse. These are targeted at doing real damage – stealing data, escalation of privilege, releasing bots, gaining deep entry into the network, and worse.
Continue Reading…

Page 1 of 3123»
-->