Topic: Managed Services - Page 186
Diversity Focus Webinar: WANTED: (More than) a Few Good Women in IT
IT business owners and industry leaders Sitima Fower of Iconic IT and Amy Kardel of CompTIA share their experiences and advice on getting more women into the pipeline in this thoughtful discussion.
Managing ‘Branches of One’
Nearly a year into the work-from-home experiment forced by the COVID-19 pandemic, we look at some best practices and lessons learned for channel pros.
ChannelPro Weekly Podcast: Episode #173 – The Ghost Kitchen
Matt, Rich, and guest host Peter Melby, of MSP Greystone Technology, may not be ghosts but they have cooked up a great show for you this week.
ChannelPro 5 Minute Roundup for the Week of January 18th, 2021
This week, Erick and Rich take a look at ChannelPro’s annual industry preview article for 2021, explore the importance of reviewing your performance in 2020, and discuss the wisdom of sampling a new variety of gin made with Elephant dung.
Speaking the Language of Your Customers
Preactive IT Solutions transformed its business by putting a vertical stake in the ground and aggressively marketing that expertise.
Mission Impossible: Forecasting Tech in 2021
After a year of unprecedented turmoil, predicting what lies ahead isn’t easy. Seven brave experts agreed to help us try anyway.
ChannelPro 5 Minute Roundup for the Week of January 11th, 2021
Erick and Rich mull the meaning of Kaseya’s new Unified RMM framework, encourage channel pros to rethink their marketing plans, and explain why dried yellow mealworms could be your secret to weight loss success.
Kaseya Unveils Framework for Adding Cloud, Mobile, and IoT Management to RMM Solution
Called Unified Remote Monitoring and Management, the new technology is designed to let MSPs handle server, PC, smartphone, tablet, network, IoT, cloud management, and more through a single interface.
Cybersecurity Trends and Tips
This Expert Guide offers some best practices for defending against attacks on managed service providers’ systems, shoring up risk management strategies to avoid lawsuits, protecting edge computing devices, and keeping remote workers safe.
Work from Home: The Art and Science of Post-Perimeter Security
New procedures and policies are required that emphasize identity and access control, while issues around privacy and financial responsibility remain to be addressed.










