Archive - Kaseya Connect RSS Feed

Kaseya Launches Cloud Management Suite with Acquisition of Technology Leader Unigma

Kaseya continues its portfolio growth streak with this week’s acquisition of Unigma, which was announced at Kaseya Connect in Las Vegas.

The Unigma Cloud Management Suite is now a core part of Kaseya’s IT Complete, an architecture and solutions stack for MSPs and for IT groups in particular vertical markets, such as health care and higher education. With this stack, a vast swath of IT operations can be automated and secured.

As MSPs move their clients aggressively to the cloud, they need solutions to monitor and manage public cloud performance and conduct precise cost analysis. Continue Reading…

GUEST BLOG: Become the Trusted Security Advisor Your Clients Need

These days, every organization needs someone they can trust for advice on IT security. Global enterprises like the Wall Street banks can afford to put one or more trusted security advisors on staff; but down on Main Street, most folks have to look outside the organization for trusted security advice, just as they do for trusted IT advice. And that represents a great opportunity for MSPs who make the right investments in security knowledge and offer the right mix of security solutions.

Traditionally, anti-malware has been the leading edge of security selling by MSPs and it still represents a golden opportunity for adding revenue to IT contracts, if you can get past some of the current linguistic confusion about malware protection. Here’s how I would boil it down for prospective clients: “the best way to keep malicious code off your systems is a properly licensed, appropriately configured, fully-supported anti-malware solution that is both comprehensive and centrally managed.” And in my opinion, the best way to implement this approach in all but the largest organizations is through an MSP who really understands the security landscape and can offer the kind of flexible billing that today’s business environment demands.

Continue Reading…

GUEST BLOG: Documentation – The Next Frontier for Kaseya VSA Customers


itglue2

Few would argue that to deliver a great service, and profit at the same time, we need to focus energy on people, technology and process. Sadly, process is often the most overlooked of these three key areas. Why is that? It’s because it’s perceived as a difficult, painful thing to fix. But is the ROI there to fix it?

Technology is supposed to make us more efficient and make life easier, but does it? It is estimated that IT staff typically spend 20-30% of their time looking for information. This is costing an average of $19,000 per employee per year, without factoring in the opportunity cost associated with making productive use of this wasted time.

Where does all the wasted time go?

Continue Reading…

GUEST BLOG: Why Your Sales/Marketing Automation Investment Won’t Bear Results

salesfunnel

There’s so much more to MSP Marketing & Sales Enablement than just software implementation

MSP sales and marketing enablement has gained a lot of popularity. More and more MSPs are looking to leverage sales and marketing automation platforms in a bid to improve their overall sales figures. The truth is, purchasing a sales or marketing automation platform alone will never help.

This blog talks about the groundwork you need to build for your sales and marketing enablement program to work for you.
Continue Reading…

GUEST BLOG: Solid Security with Kaseya plus Proven Next-Generation Endpoint Protection from Webroot

Each year, Webroot publishes a Threat Brief, a detailed report which details the churn, change and growth within the cybercrime ecosystem. 2015 was another record year in which more malware, malicious IPs, websites and mobile apps were discovered than in any previous year. The current rate of cybercrime comes as no surprise, given continuous innovations and little in the way of risk for those who choose to participate. The continued onslaught of hacks, breaches and social engineering scams targeting individuals, businesses and government agencies has caused many in the security field to ask if it’s truly possible to defend against a persistent attacker.

At Webroot, we believe it is possible to effectively protect enterprises and end users alike, but only by understanding your adversary and the techniques they employ for their attacks. Webroot’s sophisticated approach and secure solutions reflect an in-depth understanding of the threat landscape and how attackers think, allowing us to provide cutting-edge, proven next-generation protection and real-time detection of threats as they emerge. With Kaseya VSA’s integration of Webroot SecureAnywhere® Business Endpoint Protection, it has never been easier for you to manage and protect your users.
Continue Reading…

Extreme Emergency: Helping America Win the Cybersecurity Fight

Kaspersky Graphic

My talk at Kaseya Connect last week was about the need to wake customers up about cybersecurity. There are far too many people who are still taking a head-in-the-sand approach about cybercrime: ignoring it and hoping it will go away. But in fact it is steadily getting worse, and end users need our help securing their networks. The top takeaways from my keynote are facts which are intended to get customers’ attention:

Continue Reading…

ESET Announces Enhanced Plug-in Capabilities for Kaseya VSA

Eset-logo

ESET Remote Administrator Plug-in for Kaseya Improves Security Management

ESET®, the global leader in proactive digital protection, announced today an enhanced version of ESET Remote Administrator (ERA) Plug-in for Kaseya® VSA at Kaseya Connect 2015. The re-designed Plug-in integrates with Kaseya VSA to provide central management of ESET Endpoint Solutions across distributed networks.

Continue Reading…

Get Off the Hamster Wheel of Endpoint Reimaging

Malwarebytes Kaseya Connect Sponsor Graphic

At times the IT department and the custodial department share a lot in common. Both spend hours cleaning and disinfecting. Both clean up after user misbehavior. Except custodians get the snappy jumpsuits.

For the IT department, though, its Christmas office party mop-up is the extensive malware infection. Reimaging and rebuilding a workstation after a malware infection is a long, repetitive process that takes a couple of hours.

Continue Reading…

This Is Not Your Grandmother’s Antimalware

Bitdefender Kaseya Connect Sponsor Graphic

Rats and worms are on the way… should you be afraid? Unfortunately, for many the answer is yes! The new breeds of malware are increasingly sophisticated and can have devastating effects on companies large and small. The second bit of gloom is that malware volumes are going up exponentially. The AV-TEST Institute is registering over 280,000 new malicious programs every day, so Remote Access Trojans (RATS) with worming functions are just one type of attack that can start to make your knees tremble. Just because we’ve seen APTs and other attacks devastate numerous large corporations this past year, including Sony, Target and Dairy Queen, don’t be fooled into thinking that the SMBs that most MSPs work with are immune. Seventy two percent of the breaches investigated, involve companies with less than 100 employees.

Continue Reading…

How to Add Security to Your Managed Services Offering

TrendMicro-blog-graphic

I’ve been working at a security vendor for the past 12 years and focusing on the service provider market for the last five, with a specific focus on small and medium business-focused MSPs. Over the years I’ve met with, worked with, collaborated with and, most importantly, learned from MSPs just like you. I’ve often day-dreamed about starting up my own MSP business, but have never pulled the trigger. What I have done, though, is imagine how I would do things from a security perspective, if I ever did decide to start my own MSP business. For my own future reference, and in the spirit of sharing my security-specific knowledge with you, I present to you my managed security blueprint.

Today’s threat landscape is exponentially more complex and sophisticated than it was even two years ago, as evidenced by the almost daily news of data breaches. So, relying on a single solution isn’t really practical–or the best option for your customers. Given that, I would make sure I built a comprehensive, multilayered solution offering to provide maximum protection (and to reduce any potential costs on my end for cleanups) for my customers.

Continue Reading…

Page 1 of 212»
-->