Managed Services Executive Commentary

  1. Beyond Deployment: A New Mindset
    9/15/2016

    From a project perspective, deployment looks like a tactical, time-limited event. From a strategic standpoint, however, it plays a key role throughout the process of customer-centric technology implementation. For long-term success, smart retailers will weave deployment into their overall technology strategy with the right partner early in the planning process.

  2. 5 Cloud-Based Service Fallacies
    9/13/2016

    What is it about the cloud that seems to confound the small to midsize business (SMB) IT consulting space? You can’t escape cloud-computing advertising unless you are stranded on a desert island. By Andrew Harrover, CEO, Matrix Computer Consulting and ASCII Group Member since 2012

  3. How To Create Augmented And Virtual Reality Implementations For Retail
    9/12/2016

    Augmented reality (AR) and virtual reality (VR) have been growing in popularity among consumers and are currently poised for explosive growth in the retail industry. By Shaun Kirby, Chief Technology Officer for Rapid Prototyping, Cisco

  4. Building A Next-Gen Managed Security Practice
    9/6/2016

    Managed Service Providers (MSPs) have long served as their customers’ IT security experts. Small- and medium-sized businesses typically do not have the IT expertise or resources in-house, and so rely on their MSPs to provide the high level of IT support they could not create on their own. As the security landscape evolves and becomes more complex, MSPs also find themselves managing multiple vendors for different product areas, from endpoint security, email, disk encryption, network and mobile security, and wireless capabilities.

  5. Security Breaches Aren’t Just About IT
    9/1/2016

    When you hear about a security breach, you probably think something like, “The IT department must have missed something.” But increasingly, breaches are caused by factors outside of IT’s control. Today, a breach is just as likely to be the result of a devious email or an unwitting employee’s error as a breakdown in IT.

  6. Connecting The Dots... CRM To PSA To ERP
    8/31/2016

    As the world moves to browser-based applications (whether hosted on your own server or with a provider such as Amazon), it can mean that some of your applications might be on a local server in your office and others are hosted somewhere else.  For example, you may have a hosted CRM (“Customer Relationship Management”) system, while your accounting or ERP software application stays behind closed doors where it is more difficult for a hacker to gain access.

  7. Service Level Agreements: 3 Best Practices For MSPs
    8/31/2016

    The transition to managed services from a break-fix business model can be challenging for MSPs. There is much to consider in terms of setting expectations, documenting the deliverables, and defining how the MSP’s relationships with its clients will be governed under this new model.

  8. Don’t Miss Out On The Converged Infrastructure Growth Trend
    8/30/2016

    An IT solution provider discusses a major data center growth trend that every channel IT company should be taking advantage of right now.

  9. How The MX Logic End-of-Life Affects MSPs
    8/29/2016

    There are many times when VARs and MSPs need to select new products to fulfill client needs. One case in particular occurs when a vendor decides to end a product or service. In light of Intel’s announcement that it will end its MX Logic antispam service on January 11th, 2017, many MSPs are looking for a new email security solution to offer to their clients.

  10. Email Is A Major Security Risk For Small Business
    8/24/2016

    Hackers and small businesses share one thing: they rely on email. Todays’ cybercriminals are organized and business-minded. They make investments and they expect returns. Some invest in big targets, such as Home Depot and Anthem. Others invest in massive attacks, such as ransomware and botnets.