White Papers & Case Studies

  1. Cyber-Security’s Weakest Link: People
    6/27/2016

    A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.

  2. 10 Best Practices For Transitioning To A Managed Services Model
    4/27/2016

    The managed services model brings solution providers recurring revenue, deeper client engagement, and greater business stability. But the transition requires careful planning and execution to avoid pitfalls such as underpricing services, picking the wrong technology, or failing to properly communicate the change to customers. In this roadmap, we outline 10 best practices for resellers to follow when transitioning to managed services—while keeping data protected throughout the process.

  3. Improving Security With Cloud-Based Antivirus And Antimalware
    4/27/2016

    Recently, the Lloyd Group was looking to move its services to the cloud. The MSP was evaluating various cloud-based tools and learned about cybersecurity provider Webroot, recalls Bill Goldin, director of technology at the New York metropolitan-area company. What initially attracted Lloyd to Webroot was the lightweight nature of the vendor’s antimalware solution.

  4. The Webroot 2016 Threat Brief: Next-Generation Threats Exposed
    4/27/2016

    2015 was yet another record year for cybercrime, during which more malware, malicious IPs, websites, and mobile apps were discovered than in any previous year. It comes as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. The continued onslaught of hacks, breaches, and social engineering scams targeting individuals, businesses, and government agencies alike has caused many in the security field to ask if it’s truly possible to defend against a persistent attacker.

  5. Don’t Fall Prey To The Common Myths Of Transitioning
    4/18/2016

    IT solutions providers interested in adopting managed services should not fall prey to common myths about the transition.

  6. Unified Communications System Solves Phantom Calling And Quality Issues At Small Pet Hospital
    3/23/2016

    Businesses with multiple locations, call centers, complex call requirements, and extensive feature customizations often require a more sophisticated and expensive business communications system. But what about the average, single-location small business with less than 10 employees and relatively simple call requirements? They also deserve the same access to advanced unified communications (UC) features, with the versatility and affordability of a leading-edge VoIP business solution.

  7. MSP Moves Medical Billing Company From 26 Servers To Cloud, Virtualization
    12/11/2015

    A managed services provider (MSP) works with a medical billing company to upgrade from servers to a private cloud and virtualization.  

  8. 5 Aspects Of File Sync Solutions That Make Them Business-Grade
    11/16/2015

    eFolder has found that, despite the clear demarcation between the needs of “casual” users and working professionals, especially in security and collaboration, many businesspeople still select consumer-grade file sync services because they don’t understand the key differences between consumer-grade and business-grade file sync solutions.

  9. Zebra Technologies Brings Direct Data Exchange To The 21st Century
    11/4/2015

    Zebra Technologies is introducing the industry’s first complete, ruggedized enterprise-grade hardware and software Direct Data Exchange (DEX) solution that connects Direct Store Delivery (DSD) drivers to stores without a rugged DEX cable. With the introduction of Zebra’s new DX30 DEX Bluetooth-enabled wireless key fob – no bigger than a typical automobile key – Zebra has removed physical cables and eliminated common failure points at the wall jack or device. 

  10. Internet Of Everything Solution Gives Barilla — And Consumers — Holistic View Of Production Chain
    10/7/2015

    Barilla Group, the makers of Barilla brand pastas and sauces, wanted to provide consumers with the ability to trace the chain of production — from where food for ingredients is grown to the product on the store shelf.