Tag Archive - MSP

Education and Mitigation: Improving IT Security Through User Education

School IT Security

Unless your network consists of a room full of users connecting to an unsecured consumer-grade router, the most vulnerable part of your network are your users. Technology is good at following rules consistently, while people are not. You can trust a computer not to install viruses on itself, it can be infected, but that’s not how it was designed to function. Technology may not always work the way it’s supposed to, but it’s not like the technology itself has any control over its actions. People on the other hand…Well, you just can’t trust people not to make bad decisions…

Even the Romans knew it. To err is human: Errare humanum est. -Seneca

Trusting in your users to do everything right is foolhardy; however, it’s quite possible to teach them not to trust themselves! In the field of IT security you should trust no one. Think about how much risk would be mitigated if you could pass that notion on to your users.

Would your average users stop opening random links people send them to featuring “10 cute kitten videos you have to see?” Probably not, but if we change the question a little and ask, “Would your users engage in that sort of risky behavior less often?” Then the answer becomes a definitive “yes.”

When it comes to educating your users about IT security, there are a lot of wrong ways to connect the dots. Simplistic training sessions can make your users feel ignorant, gullible, or even unintelligent. From my experience, the best practices tend to be those which are honest, informative, and relevant. Try having a brownbag lunch and discussing IT security issues that have recently received media coverage. People remember large events like when Sony was hacked, so you could work that into a lesson about why it’s dangerous to recycle passwords across websites. Make your lessons relatable and you will improve the amount of knowledge your employees retain. It’s just that simple.

Maybe this doesn’t apply to your business. Perhaps you work at an MSP where the most computer illiterate employee you have is the janitor from Elbonia who has his CIS degree printed on what looks to be a cereal box. Well, even then there’s still plenty to learn.

Work can be hectic and busy. There are always new patches to install, and break-fix work to do. After a certain point, it gets really easy to just become apathetic to the process. Well, no surprises here but, not embracing life-long learning is one of the worst possible things you can do. IT security isn’t something you can just learn and be done with, it’s a constantly changing and evolving field! You can memorize your ABCs, but the closest things to that I have seen in IT are the four cardinal rules of IT security.

Have you heard of the four cardinal rules? Probably not, because I’m sure my instructor was improvising when he taught us. That would explain why they’re pretty much the same as the four cardinal rules of gun safety. Well, here are those four rules, so read them and see if you pick up anything new!

  1. All guns are always loaded.

    Connecting things to a network is a lot like picking up a gun. It could be loaded (with malware), or be poorly manufactured, which adds the risk of it blowing up in your face. You might want to trust the ergonomic keyboards your techs brought from home, but even that can be risky.

    In short: Assume nothing, and check everything.

  2. Always point the muzzle in a safe direction.

    Patches, updates, hardware installations, this applies to everything. If you’re going to change anything on your network, don’t just plow ahead and do it. Aim those changes in a safe direction (like a test server, or non-critical system) and try things out there first. If things work well on the test server, then safely implement the changes across all systems. You wouldn’t play Russian-Roulette with your life on the line, so why would you do it with your network?

    In short: Test everything before it goes live.

  3. Keep your finger off the trigger until you are on target and ready to shoot.

    It’s good to stay on top of the most recent updates, but there’s a fine line between updating appropriately and excessively. Just because you can update to the newest beta version of Java doesn’t mean you should, and just because there’s a newer version of an OS, that doesn’t mean you need it.

    In short: Don’t change anything on the fly and don’t install anything without considering the results.

  4. Know your target, and what lies beyond.

    When changing anything, make sure you are fully aware of what it is, what it does, and what needs it. Consider what happened with the release of Windows Vista. Many businesses updated to Vista because their hardware supported it; unfortunately, a number of devices which relied on XP’s resources no longer functioned as a result. Users were scrambling to figure out why their printers, webcams, and other gadgets no longer worked, and it caused quite a headache for the people who supported those systems.

    In short: Do your research. Nothing is as modular as it seems, and updating something as innocuous as a printer could bring your network to its knees.

Above all else, always remember that you can never know too much. Keep on learning, keep reading those blogs, and keep reading those forums. You’ll never know if something you learned is relevant until you have to do it yourself.

Now, before you go looking for random lessons to train your coworkers on, let me throw one more factor into the mix. If you’re reading this blog at blog.kaseya.com, there’s a good chance that you’re likely a Kaseya customer. If you are, or you’re interested in becoming one, why not take a look at Kaseya University.

Kaseya University is a state-of-the-art training platform for Kaseya users. It utilizes an innovative blended learning approach to provide both structured and flexible access to technical product training. The Learning Center allows students to build a truly customized learning experience unique to their needs. Kaseya University is kept current with Kaseya product releases, and refreshed multiple times a year. To learn more about Kaseya University: Click here

With that knowledge you can accomplish even more from a single pane of glass.

If you want more information on IT security or just want some topic starters: Click Here

If you want a more direct approach for improving your IT Security: Click Here

Author: Harrison Depner

Haste Prevents Waste. Single Sign-On Can Improve Any MSPs Profit Margin

Single Sign-On Efficiency

As people gain access to more online resources, they need to remember an ever-increasing number of usernames and passwords. Unfortunately, having more usernames and passwords means spending more time spent keeping track of those usernames and passwords.

If you’re a business owner and you don’t have password management software, then you’re letting your employees manage their passwords on their own. Your users could be setting the stage for every IT security manager’s worst nightmare: an office full of sticky notes with user names and passwords clearly visible around their workstations or cubicles. Without some form of password management solution, your employees are suffering from ongoing frustration as they try to manage their passwords while following your IT security requirements.

If your business is already using password management software, then you should have a solution that manages which resources your employees are able to access, and which credentials they should use to do so. Unfortunately, your password system may not be doing everything it can to provide simple, and secure access for your employees.

What if there was a way for users to have strong passwords without the need to remember them, while also retaining a high degree of security?

Regardless of how you’re managing your passwords today, you can eliminate password frustration, increase your employees’ efficiency, and improve your IT security by implementing a single sign-on password management solution.

What is Single Sign-On?

Single sign-on (SSO) is a system through which users can access multiple applications, websites, and accounts by logging in to a single web portal just once. After the user has logged into the portal, he or she can access those resources without needing to enter additional user names or passwords.

Single sign-on is made possible by a password management system that stores each user’s login ID and password for each resource. When a user navigates from a single sign-on portal to a site or application, the password management system typically provides the user’s login credentials behind the scenes. From the users’ perspective, they appear to be logged in automatically.

High quality SSO solutions are able to provide access to a variety of internal and external resources by utilizing standard protocols such as SAML, WS-Fed, and WS-Trust.

As with any password management application, security is a critical consideration for SSO systems. Single sign-on is often implemented in conjunction with some form multi-factor authentication (MFA) to ensure that only authorized users are able to log into the SSO web portal.

5 Reasons MSPs Benefit from Single Sign-On

  1. SSO can create exceptionally strong password security. When paired with multi-factor authentication (MFA), single sign-on gives you a password management solution that can be both user friendly and extremely secure.
  2. SSO makes enforcing password policies easier. In addition to allowing for strong passwords for critical resources, an SSO system makes it easier to assign and maintain those passwords. In some cases, you can take users out of the password management process entirely—a good SSO system will allow you to can assign them behind the scenes, and change them as needed when your security needs evolve.
  3. Users won’t need or want to save passwords to their unsecure browser. To the average end user, the ability of a web browser like Chrome to remember and submit passwords is a huge bonus; however, while saved passwords offer some of the benefits of single sign-on, web browsers offer none of the security that comes with a true password management solution. When you implement an SSO system, you eliminate the temptation for employees to save their passwords in their browsers, because the SSO portal does that job instead, and often does it better. At that point you could remove that feature from their browsers without the risk of angering your users.
  4. Single sign-on makes your systems easier to secure. Rather than securing dozens or even hundreds of access points to your systems, your security administrators can focus the majority of their efforts on securing just one—the SSO system. If you pair the SSO system with multi-factor authentication, you’re your credentials will be more secure and manageable, than a collection of independently secured websites and systems.
  5. Reduced IT help desk calls. Experts estimate that the average employee calls the IT help desk for password assistance about four times per year. Given that an average IT helpdesk call takes about 20 minutes, that’s 80 minutes per year. That’s 160 minutes of wasted time (IT staff + end user) per year per end user. A good SSO solution will help you put that money back on your bottom line, and free your IT professionals to spend their time on more important projects.

Now, before you go looking for a single sign-on system for your business, let me throw one more factor into the mix. If you’re reading this blog at blog.kaseya.com, there’s a good chance that you’re likely a Kaseya customer. If you are, or you’re interested in becoming one, make sure that the solution you choose supports a Kaseya integration. Scorpion Software was acquired by Kaseya not long ago, and they offer a full Kaseya integration of their user authentication and password management suite. Their suite offers single sign-on, multi-factor authentication, and many other features. So, if you’re looking for a Kaseya-optimized suite, there’s no better place to start. That way you can accomplish even more from a single pane of glass.

If you want more information on what a good single sign-on system should do: Click Here

If you want to know what I would recommend as a single sign-on solution: Click Here

Author: Harrison Depner

Big Data in Application and Cloud Performance

Big Data in Application and Cloud Performance- Why & How

Vikas Aggarwal

CEO, Zyrion Inc.

Always regarded as a non-critical part of day-to-day operations in the past, Big Data and its delayed analysis was relegated to batch processing tools and monthly meetings. Today, as the IT industry has snowballed into a fast moving avalanche of Cloud, virtualization, out-sourcing and distributed computing, the science of extracting meaningful intelligent metrics from Big Data has become an important and real-time component of IT Operations.

WHY BIG DATA IN CLOUD PERFORMANCE TOOLS

No longer do IT management systems work in vertical or horizontal isolation as just a few years ago. The inter-dependence between IT Services, applications, servers, cloud services and network infrastructure has a direct and measurable impact on Business Services. The amount of data generated by these components is huge and the rate at which this data is generated is so fast that traditional tools cannot keep up with any kind of real time correlation. The combined volume of data generated by this hybrid infrastructure can be huge, but if it is correlated properly, it can give mission- critical insight into:

  • the response times and behavior of an IT service or application
  • the cause of performance degradation of an IT service
  • trend analysis and proactive capacity planning
  • see if SLAs are being met for business services

This data has to be analyzed and processed in real-time in order to provide proactive responses and alerting for service degradation. The data that is being collected can be structured or unstructured, coming from a variety of systems which depend on each other to offer optimal performance, and has little to no obvious linkage or keys to one another (i.e. the data coming from an application is completely independent of the data coming from the network that it is running on). Some examples of data sources that need to be correlated are application logs, netflow, JMX, XML, SNMP, WMI, security logs, packet analysis, business service response times, weather, news, etc.

Enterprises are moving to hybrid cloud environments at an alarming rate and all customer surveys indicate that the complexity of these platforms are their biggest concern. Enterprises must adopt monitoring systems that are flexible and can handle Big Data efficiently so that they can offer real-time responses to alarms and get meaningful business impact analysis from all of the different data sources.

Contextual analytics and presentation of data from multiple sources is invaluable to IT Operations in troubleshooting poor application performance and user satisfaction. As a simple example, a user response time application could send an alert that the response time of an application is too high. Application Performance Monitoring (APM) data could indicate that a database is responding slowly to queries because the buffers are starved and the number of transactions is abnormally high. Integrating with network netflow or packet data would allow immediate drill down to isolate which client IP address is the source of the high number of queries.

HOW TO HANDLE BIG DATA FOR CLOUD PERFORMANCE

Traditional monitoring or BI platforms are not designed to handle the volume and variety of data from this hybrid IT infrastructure. The management platforms need to be designed to correlate Big Data from the IT components in real-time and provide feedback to the operations team for proactive responses. As these monitoring systems evolve, their Big Data correlation components will become richer and more analytical and will position these enterprises for the IT environments of the future.

New generation enterprise monitoring solutions that are scalable, have predictive analytics, multi-tenant and a granular security model are now available from a small number of vendors. Single use systems that are designed for just network data or just application data are trapped within the same boundaries that makes Big Data meaningless by its very nature, Big Data systems needs to be able to handle a very wide variety of data sources to provide greater uptime from faster troubleshooting and lower OpEx from correlated analysis.


Vikas Aggarwal is CEO of Zyrion Inc.,
a leading provider of Cloud and Network Monitoring software for large enterprises and Managed Service Providers.
You can read more about Zyrion’s Enterprise Monitoring Solution and how it handles Big Data on their web site.

 

 

Kaseya MSPs Rank Highest Worldwide for 2013

Way to go Kaseya MSPs! You’ve done it AGAIN!

It’s a new year, already filled with exciting changes and significant MSP opportunities. But for some of you, a few things remain the same, and selfishly, we are happy about that. The new MSPmentor Top 100 rankings for 2013 are out. In the table below, see how many MSPs running Kaseya were represented on the list:

MSP_mentoir_501_2013

Kaseya has always been at the front of the pack in terms of solutions that successful MSPs use to run their businesses. 2013 is no exception. Once again, we are honored and humbled by the fact that so many of the Kaseya MSPs continue to dominate the MSP Mentor 100 list for 2013.  Additionally, just over 51% of all 485 survey respondents use Kaseya.   Good for you! Congratulations from all of us.

Like proud parents, we are thrilled that our customers are seeing significant and sustainable growth in their own businesses. We are more excited that so many of you show up year after year on this list and with so many Kaseya customers ranked near the top, it’s a validation that MSPs CAN grow and DO grow with Kaseya. We applaud your hard work and we sincerely appreciate your partnership with us, both of which give us the information we need to continue to build – and support – the Kaseya Solution that powers your business. We remain committed to these areas because we know you count on us to do so.

No big surprise right? Not at all, and with so many Kaseya MSPs ranked on the list, it serves to highlight how our innovative customers are finding more and more IT task management work to be  automated and how more work is being done centrally and remotely. The industry pundits still take notice, too. These accolades reinforce our belief that product innovation still matters and that robust and efficient vendor support is still important.

As our annual user conference approaches – Kaseya Connect is April 29th – we can’t wait to see you all in Las Vegas to congratulate you in person. And we are ready to engage with you so and gather your feedback, organize it into valuable solution requirements, prioritize it for your use on our product road map, so that we can further our commitment to building the right solution that works well for so many of you.

For those of you who are not yet Kaseya customers, I hope you are ready see Kaseya in action. We invite you to see how and why the top MSPs power their business with us and I encourage you to register for a live, weekly Kaseya product demonstration.

As the saying goes, seeing is believing, and I think you’ll be glad you gave us a look.

MSPs and Big Data: Why and How

MSPs & Big Data – Why & How

Vikas Aggarwal

CEO, Zyrion Inc.

Always regarded as a non-critical part of day-to-day operations in the past, Big Data and its delayed analysis was relegated to batch processing tools and monthly meetings. Today, as the IT industry has snowballed into a fast moving avalanche of Cloud, virtualization, out-sourcing and distributed computing, the science of extracting meaningful intelligent metrics from Big Data has become an important and real-time component of IT Operations.

WHY BIG DATA IN CLOUD PERFORMANCE TOOLS

No longer do IT management systems work in vertical or horizontal isolation as just a few years ago. The inter-dependence between IT Services, applications, servers, cloud services and network infrastructure has a direct and measurable impact on Business Services. The amount of data generated by these components is huge and the rate at which this data is generated is so fast that traditional tools cannot keep up with any kind of real time correlation. The combined volume of data generated by this hybrid infrastructure can be huge, but if it is correlated properly, it can give misson critical insight into:

  • the response times and behavior of an IT service or application
  • the cause of performance degradation of an IT service
  • trend analysis and proactive capacity planning
  • see if SLAs are being met for business services

This data has to be analyzed and processed in real-time in order to provide proactive responses and alerting for service degradation. The data that is being collected can be structured or unstructured, coming from a variety of systems which depend on each other to offer optimal performance, and has little to no obvious linkage or keys to one another (i.e. the data coming from an application is completely independent of the data coming from the network that it is running on). Some examples of data sources that need to be correlated are application logs, netflow, JMX, XML, SNMP, WMI, security logs, packet analysis, business service response times, weather, news, etc.

Managed Service Providers are moving to hybrid cloud environments themselves and offering services ranging from security, backup, VoIP, applications and compute resources. Also, enterprises are outsourcing more and more of their IT performance management, and they expect the MSP to handle any and all kinds of IT data. Managed Service Providers must adopt monitoring systems that are flexible and can handle Big Data efficiently. Such IT monitoring platforms will allow them to offer higher value added services to enterprise customers. Once they have such versatile Big Data systems in place, they can offer real-time responses to alarms and alerts and give meaningful business impact analysis to these enterprise customers.

Contextual analytics and presentation of data from multiple sources is invaluable to IT Operations in troubleshooting poor application performance and user satisfaction. As a simple example, a user response time application could send an alert that the response time of an application is too high. Application Performance Monitoring (APM) data could indicate that a database is responding slowly to queries because the buffers are starved and the number of transactions is abnormally high. Integrating with network netflow or packet data would allow immediate drill down to isolate which client IP address is the source of the high number of queries.

HOW TO HANDLE BIG DATA FOR CLOUD PERFORMANCE

Traditional monitoring or BI platforms are not designed to handle the volume and variety of data from this hybrid IT infrastructure. The management platforms need to be designed to correlate Big Data from the IT components in real-time and provide feedback to the operations team for proactive responses. As these monitoring systems evolve, their Big Data correlation components will become richer and more analytical and will position these MSPs for the IT environments of the future.

New generation MSP monitoring solutions that are scalable, have predictive analytics, multi-tenant and a granular security model are now available from a small number of vendors. Single use systems that are designed for just network data or just application data are trapped within the same boundaries that makes Big Data meaningless – by its very nature, Big Data systems needs to be able to handle a very wide variety of data sources to provide greater uptime from faster troubleshooting and lower OpEx from correlated analysis.


Vikas Aggarwal is CEO of Zyrion Inc.,
a leading provider of Cloud and Network Monitoring software for large enterprises and Managed Service Providers.
You can read more about Zyrion’s MSP monitoring solution and how it handles Big Data on their web site.

 

 

MSP Pricing Results of 2012 Global Survey

For businesses that rely on a service delivery model, it’s a widely known fact that sound pricing management is the most effective way to grow your business.

Free 6-page report of results from 2012 global MSP pricing survey

As a managed services provider (MSP), did you ever wonder how your pricing strategy – and its effectiveness – compares to your MSP peers around the world?

With access to thousands of MSP customers worldwide, Kaseya conducted our annual global pricing survey to gain insight into the best practices of MSP pricing management. In this 6 page MSP pricing report, see replies from hundreds of your peers when asked the following questions:

Continue Reading…

[MSP eBook] A Starter Guide to IT Managed Services

I had an interesting conversation with one of our IT managed services customers the other day.Free 21-page starter guide to IT managed services

We were discussing the journey he took as his IT managed services company grew from a one-man show to an 18-person managed services company with $3 million in revenue in just a few years. He said it was a tough transition, but it was worth it. However, what struck me was the motivation behind transforming the business.

Here is what he said: “I had been working for years in a break-fix model and was making enough money to be comfortable. Then it occurred to me. I had built a nice job for myself but it was far short of a business. And that’s what I really wanted. I wanted to build a business, and I knew that I had to get serious about managed services.”

It was the perfect light bulb moment. He had built a job but wanted a business.

Based on our work with thousands of MSPs worldwide, making the switch to MSP is worth the time and effort because MSPs are approximately 200-400% more profitable than non-MSPs. And MSPs are 3x to 10x more valuable than traditional VARs.

But as I’ve said before, its not easy. A successful managed service provider (MSP) business is reliant on a solid business strategy and service delivery model as well as finding the right technology for your needs. We can help you understand the steps you need to take in order to get started, all rolled into a 21-page IT managed services eBook that will will help you:

  • Develop and execute on a solid business strategy for running a managed services company - Companies that get the business part right and flub the technology part won’t grow very fast but will chug along and survive. On the other hand, service providers that use the right technology but can’t handle growth or manage daily operations will most likely fail. However, it’s companies that get both the business right and choose the appropriate management solution for their needs that are wildly successful. Running the business the right way is that critical. Read our 6 tips that you can use to build a profitable business model.
  • Choose the right IT systems management solution to help enable your vision – The managed services business model is enabled by the technology you use to deliver IT services to your customers. However, there are dozens of solutions. How do you choose the right one for your unique needs? IT systems management solutions come in several flavors based on the software’s architecture and we provide a summary – including feature and cost comparison – of the 5 common types of tools available.
  • Price your managed services fairly, competitively, and profitably - How do I price my managed services effectively? It’s the most common topic among our thousands of MSP partners worldwide. Using data from real MSPs, we provide you an insider’s look and a data-rich analysis of pricing scenarios used by a variety of service providers in various stages of the MSP development track. We give you step-by-step calculations to help you understand how to determine your operating cost and we provide you with a few pricing scenarios to help you understand business impacts and profitability analysis. Once you understand these data, you can leapfrog your peers (and truly deliver value to you clients) because you will gain a better understanding of cost, profit, and MRR/project/T&M portfolio calculations and analysis.
  • Avoid some common pitfalls – Do you need a crystal ball on your MSP journey? Learn from your peers as they share 4 common MSP traps to avoid so you can fast-track your success.
  • Understand the benefits that come with implementing managed services correctly – Read a case study to understand how an IT service provider successfully rolled out managed services for its customers and transformed into one of the largest MSPs in the country.

So, take a walk with us. Read this free eBook Starter Guide to IT Managed Services and learn more. Turn your job into a business. You won’t be disappointed.

Making the Switch from Break-Fix to Managed Services

Making the Switch from Break-Fix to Managed Services

Back in 2006, VAR Business suggested “98 Percent of Managed Services Is Chaotic.” At that time, they painted a bleak picture of the common pitfalls that break-fix VARs and other IT solution providers encountered as they attempted to transition to a managed services business model.

In the 2006 VAR Business report, they found that 31% of the companies surveyed felt that their managed service efforts had fallen short of their expectations and only 11% said that managed services had exceeded expectations.

My how far we’ve come.

In a recent Kaseya survey of nearly 2,000 MSP customers worldwide, we found that upwards of 85% generate recurring revenue for 12 months per year. More than 50% improved the profitability and productivity of their technicians by 100% within 90 days of completing an onboarding process. Their average client retention rate was high (very high).

The findings are compelling.

Continue Reading…

How Much Product Functionality Are You Really Using?

Most software products in the ITIL stack – monitoring, ticketing, etc., all perform their basic functionality equally well when compared to other products in their class. However, best of class products have a lot more functionality and features that is typically forgotten in the craziness and urgency of operational deployments. In most cases, close to 60% of the product features are paid for but unused.

One might argue that these features are not important or needed in the enterprise. Interestingly, most of these unused features are precisely the reason for selecting the product in the first place and served as differentiators for selecting one product over the other. Using these advanced features would in most cases give must better ROI to the customer as is normally identified during the selection process. Yet a bulk of these differentiating features go unused

Some of the key reasons for not being able to derive greater benefits from software:

  • Using these new features requires a change in Operational Processes – and this change is usually not been factored in during the deployment.
  • the selection team is different from the end users of the deployed products, and they have not been exposed to the key differentiating features in the product
  • The desire to implement the software quickly and reduce implementation risk
  • Lack of skills to use the advanced features in the product
  • A very simple and effective way to address these issues is by training and re-training. In most cases, the customer purchases training at the beginning of the engagement, but they fail to do advanced training after the product is deployed and running for a while. Enterprises should make it a point to set aside budget and time for reviewing the product deployment a few months after implementation, and ask the software vendors to demonstrate how their advanced feature set can help reduce expenses and deliver faster ROI. This second stage of training would need to focus on how the product can interact better with existing OSS tools and improve processes.

    The deployment of any best of class product requires a two stage deployment – initially with the features which are the most common (and interestingly not the reason for selecting the product in the first place). The second stage (and most often overlooked) is much later after the initial deployment, and is when the best of class features are actually put to use.


    Vikas Aggarwal is CEO of Zyrion Inc.,
    a leading provider of Cloud and Network Monitoring software for large enterprises and Managed Service Providers.
    You can read more about Zyrion’s cloud monitoring solution here.

     

     

    Using IT Strategic Roadmaps to Win More, and Better Managed Services Contracts

    Webinar Replay – Using IT Strategic Plans to Win More – And Better – Managed Services Contracts

    Webinar Replay – Using IT Strategic Plans to Win More – And Better – Managed Services Contracts

    MSP Service Delivery Best Practices – Using IT Strategic Plans to Win More – And Better – Managed Services Contracts (originally aired May 2012)

    Led by services architect and service delivery expert John Kilian of AntFarm, Inc, this webinar presented MSP service delivery best practices for using IT strategic plans to win more – and better – MSP contracts.

    As a sneak peak of the session, John’s presentation on MSP service delivery best practices:

    1. How to create an IT Strategic Plan that aligns with MSP client business needs
    2. How to protect your managed services revenue from poachers
    3. How to synchronize clients’ technology lifecycle to changes in their business
    4. How to “own” the plan

     

    Continue Reading…

    Page 1 of 41234»