Managed Services Executive Commentary

  1. 5 Network Security Market Trends That Matter For Managed Services In 2016
    4/28/2016

    It’s no secret organizations of all sizes are changing the way they run their businesses. The move toward a digital economy, combined with the need to always be on, means anything that can save time and simplify workflows is in high demand. Now, more than ever, seamless delivery — whether it’s music, email or network security — is where opportunity lies.

  2. Windows 10: Risks Still Loom Despite Big Improvements
    4/27/2016

    There are an estimated 1.5 billion Windows devices worldwide and approximately 3 percent of them are attributed to Windows 10 — about 45 million systems. Many more Windows 7 and Windows 8.x users are seriously considering upgrading to Windows 10, taking advantage of Microsoft’s free upgrade offer that will end in July 2016.

  3. The Importance Of Data Discovery
    4/25/2016

    The volume of data being created, shared, and stored is growing exponentially with no sign of slowing down. With more people accessing and storing files in a multitude of network and cloud repositories, your sensitive data could be anywhere. Collaboration among employees, partners, and customers is key, but there must be a balance between information sharing and information protection.

  4. Why It’s Okay For CIOs To Make Decisions Based On Feelings
    4/25/2016

    One of life’s most hilariously, ironic aspects is that, wherever you go, you’ll notice personal exceptionalism is by far the most ordinary expression of human behavior. If you understand that concept to be true, then the self-assessment data gathered by the well-known leadership and management coach, Mark Goldsmith won’t surprise you either. By Ariel Amster, Qubole

  5. The Impact Of M&A On The MSP Market
    4/22/2016

    It’s all the rage right now.  Everyone seems to be a buyer or seller; some are even trying to play both sides of the M&A puzzle.  It is hard to find anyone who is not actively considering M&A as a strategy for growth or exit.  And while it may be exciting and the seemingly best option for growing or transition, it also comes with some baggage that can become detrimental if not managed well.

  6. Values And Culture
    4/22/2016

    Our core values are posted all over the office, and we take the time to go over them with every new employee; but, I still see behavior inconsistent with our values. What can I do?

  7. The Cloud Wars May No Longer Focus On Price
    4/22/2016

    The cloud wars are an ongoing battle for supremacy of cloud services. The competition is fierce and intense, as can be assumed regarding what is a multi-billion dollar market. Cloud providers come in many varieties, but the most popular are names known to most people and businesses out there. The likes of Amazon, Google, Microsoft, and IBM all have products and services to offer and, for many years, much of the focus has been on slashing prices whenever or wherever possible.

  8. Redefining Technology Solution Providers In The Cloud
    4/21/2016

    Welcome to the brave new world that is cloud services, where there’s no such thing as business as usual. Small-to-midsize businesses (SMBs) represent a significant section of most technology solution provider (TSP) customers, and those SMBs are turning to the cloud more than ever before. They are going to be asking you about the cloud and whether you can support their needs. If you aren’t prepared, you stand to lose big.

  9. Breaking Into New Space, Out Of The Old
    4/19/2016

    Dear IT’ers, Everything I’ve done over the past 40 years with folks like you – business guys – had to do with the huge discomfort that comes from being asked to think differently than my audience is used to think.

  10. Combating The Human Component Of Data Security Vulnerabilities: Don’t Let Print Be An Afterthought
    4/19/2016

    In today’s digital world, there are countless ways in which sensitive corporate data can find its way into the wrong hands. But while your customers are focused on protecting information with email encryption and network firewalls, one of their employees could have left a physical document unattended in the printer tray — a major (and completely avoidable) security risk.