Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected

Topic: Security - Page 149

Kaseya Announces Latest Wave of Portfolio Integrations and Updates

August 25, 2020 |

“If you boil them all down, they’re about MSPs being able to be more efficient,” says Chief Strategy Officer Mike Puglia (pictured) of the changes, which Kaseya discussed during its 2020 Connect IT conference.

10 Questions for Your Outsourced NOC Provider

 White Paper
August 24, 2020 |

A lot is at stake when it comes to NOC, especially around security measures, business continuity, and networkmanagement. You simply can’t afford to hire a provider that doesn’t adhere to the right NOC practices. In thisdocument, we outline the ten important questions MSPs should ask prospective NOC service providers to besure a large chunk of their business goes in ‘able hands’.

Simply complete the form below to read the full white paper.

What Doesn’t Kill You Makes You Stronger

August 24, 2020 | Brian Weiss

After a breach that exposed clients to ransomware, ITECH Solutions transformed to a security-first posture with a focus on higher-value, mutually beneficial customer relationships.

Kaseya Buys Phishing Defense Vendor Graphus

August 24, 2020 |

The Graphus solution, which Kaseya has integrated with products from its ID Agent unit, uses artificial intelligence to detect and block threat-bearing emails, offering an added layer of defense against ransomware and business email compromise attacks.

ChannelPro Weekly Podcast: Episode #157 – The New M&A (Mongrels & Animals)

 Podcast
August 21, 2020 |

You think M&As were hard before? Try the new kind involving bears and elk. Matt, Rich, and guest host Bruce McCully, chief security officer of MSSP Galactic Advisors, discuss that topic and others this week with Linda Rose of M&A consultancy RoseBiz.

Vendor to Watch: ThreatLocker

August 21, 2020 |

ThreatLocker provides zero-trust, policy-driven security solutions for endpoints.

The Drivers and Benefits of Edge Computing

 White Paper
August 19, 2020 |

Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source.

Essential Guidance on DCIM for Edge Computing Infrastructure

 White Paper
August 19, 2020 |

The lack of staff or “lights out” nature of many loc al IT and mobile edge computing (MEC) sites makes operations & maintenance a challenge. This struggle worsens as the number of sites increase. How do you maintain IT resiliency in a c ost-effective way under these conditions? In this paper find out more on essential DCIM functions for small, unmanned edge computing sites and attributes of next-generation DCIM solutions best optimized for that type of environment.

A Practical Guide to Data Center Design and Planning

 White Paper
August 19, 2020 |

In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. As data centers continue to expand and evolve, a flexible design approach will help grow business quickly without excessive capital outlay or overbuilding. Data center reference design tools will help you avoid many of the common pitfalls and with adaptable, modular options it’s possible to future-proof your data center while meeting your current business goals (and budget).

Navigating the Post-COVID Cloud

August 19, 2020 |

The novel coronavirus has fundamentally changed the way businesses operate. Cloud computing is at the center of this shift.

Company Spotlights

Huntress
Huntress Labs is a leading provider of advanced threat detection and actionable cybersecurity intelligence for Managed Service Providers (MSPs), small-to-medium sized businesses (SMBs), and enterprises. Huntress has pioneered an effective and affordable method to address threats at a layer that is often overlooked—footholds that are indicative of malicious activity on customer endpoints. By providing expert analysis and actionable insights based on investigation into those activities, Huntress enables corporate IT teams to quickly resolve incidents. With Huntress, MSPs can reduce cybersecurity response labor, retain and grow their client base, and differentiate themselves from the competition. For more information, visit: huntress.com.
Huntress
Huntress is a global cybersecurity company on a mission to make enterprise-grade products accessible to all businesses. Purpose-built from the ground up, Huntress' technology is specifically designed to continuously address the unique needs of security and IT teams of all sizes. From Endpoint Detection and Response (EDR) and Identity Threat Detection and Response (ITDR) to Security Information and Event Management (SIEM) tools and Security Awareness Training (SAT), the platform provides targeted protection for endpoints, identities, data, and employees, delivering trusted outcomes and valuable peace of mind. Its 24/7, AI-assisted Security Operations Center (SOC) is powered by a team of world-renowned engineers, researchers, and security analysts, dedicated to stopping cyber threats before they can cause harm. Huntress is often the first to respond to major hacks and incidents, with its expert security team sharing real-time tradecraft analysis and actionable advisories with the community. Currently safeguarding over 4 million endpoints and 8 million identities, Huntress empowers security teams, IT departments, and Managed Service Providers (MSPs) worldwide to protect their businesses with enterprise-grade security accessible to everyone. As long as hackers keep hacking, Huntress keeps hunting. Join the hunt at  www.huntress.com and follow us on X, Instagram, Facebook, and LinkedIn.

Free MSP Resources

Explore ChannelPro

Events

Reach Our Audience