Managed Services Executive Commentary

  1. Help SMBs Overcome Their Data Backup Ignorance
    11/26/2014

    The fact that you have so many customers who are not currently using your business continuity and disaster recovery (BCDR) solutions and services must mean that they all have their data backup figured out, right? If your target market includes SMBs, that assumption is far from reality.

  2. Who’s WAN Is It Anyway?
    11/26/2014

    There’s a business challenge brewing in the mainstream IT channel that some are ignoring, others are talking about, and a select few have embraced — and turned into a new relationship and a revenue opportunity that keeps on growing. It’s focused on the wide area network (WAN), ties back to the local area network (LAN) and includes everything and everyone that wants to securely connect to both.

  3. 4 Ways To Optimize Data Protection In Virtual Environments
    11/25/2014

    When it comes to virtual machines (VMs), it’s no secret that a more robust backup and disaster recovery (BDR) approach is required — compared to what you might deploy in a traditional physical server environment. From data protection policies that are based on VM replication, to increased levels of performance to support database-driven business applications and higher I/O workloads, there’s a lot to keep in mind.

  4. What Banks Can Learn From Recent Data Breaches
    11/25/2014

    It’s good to learn from your own mistakes, but it’s better to learn from someone else’s. In the case of banks — and those in charge of their IT security — it’s much better to learn from the mistakes of JPMorgan and other recent high-profile victims, as opposed to making similar mistakes yourself.

  5. Don’t Throw The Data Out With The Bathwater: Why BYOD, MDM Security Policies Need A Revamp
    11/25/2014

    According to IDC there will be some 1.3 billion mobile workers by 2015 and as many as 328 million employee-owned smartphones on the job by 2017. Enterprise IT needs to seriously consider its bring your own device (BYOD) and mobile device management (MDM) policies to ensure that they can protect corporate data while also supporting their employees’ need to work when and where they want in the age of the mobile worker.

  6. Stop Training Your Sales Team!
    11/25/2014

    The headline of this article may sound like blasphemy from a sales trainer who has more than 38 years of experience training salespeople, but it is a heartfelt suggestion. When many CEOs and business owners see revenue problems, they default to a statement like, “Let's get some sales training going.” Whereas, in reality, I believe the same CEO will realize a far greater improvement when he/she trains their company to sell.

  7. 3 Tips To Help Your Clients Take The Sting Out Of Microsoft Licensing
    11/24/2014

    With the release of SQL Server 2012, Microsoft transitioned from a per-processor to a pre-core licensing model. One might suppose, that with the advent of ever-larger core-count processors, Microsoft saw an opportunity and took action. While this change may not have hit your clients’ radar screen yet, it will in a few months, and when it hits — it will hurt. 

  8. MSPs, Don’t Risk Missing Opportunities: 4 Factors Driving Cloud Security
    11/24/2014

    To all MSPs out there that are accustomed to managing on-premise security solutions, it’s time to take note — your business is moving to the cloud, whether you like it or not. According to a Gartner report released last year, by 2016 the use of cloud computing will increase to become the bulk of new IT spend. In fact, Gartner refers to 2016 as a “defining year for the cloud.” Infonetics Research backs that claim, stating cloud-based security service revenue will expand at a 10.8 percent compound annual growth rate through 2017, and projects the market to reach $9.2 billion. With this rapid cloud adoption comes the need for cloud security functions. Gartner states that the top three cloud services moving forward will be email security, Web security, and identity and access management (IAM).

  9. 4 Ways To Make BYOD Security Easy For The User
    11/24/2014

    Today, we characterize 29 percent of the global workforce as anytime, anywhere information workers — those who use three or more devices, work from multiple locations, and use many apps. BYOD in the office is becoming inevitable and employees can easily forget that using their personal devices at work creates a greater potential threat surface for hackers to exploit.

  10. 6 Tips For Big Data Analytics Success
    11/24/2014

    Big Data is changing the business equation. Businesses are starting to realize data is a gold mine of valuable information, and, if understood, it could be used to detect patterns in behavior and predict future outcomes.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.