News & Articles - Page 123
NinjaRMM Security Conference Counsels Vigilance Against Threats to MSPs
Speakers at the vendor’s second annual Security Summit yesterday urged listeners to embrace security frameworks, take full advantage of security features in their business systems, and share the latest threat information with one another.
Nerdio Ships Multitenant Management and Optimization Solution for Microsoft Cloud
Announced on the closing day of the vendor’s NerdioCon conference, the system is designed to help channel pros more easily monitor and manage both new and existing Windows Virtual Desktop and Azure environments.
Hybrid IT Requires the Convergence of Security and Networking
The new security-driven networking model protects businesses anywhere on any edge—on premises, in the cloud, or both—and opens up new opportunities for MSPs.
Managing ‘Branches of One’
Nearly a year into the work-from-home experiment forced by the COVID-19 pandemic, we look at some best practices and lessons learned for channel pros.
5 Cybersecurity Conversation Starters
By focusing on challenges along with strategies, ROI, and opportunities, MSPs can turn security into a business discussion and cement their trusted adviser status.
Speaking the Language of Your Customers
Preactive IT Solutions transformed its business by putting a vertical stake in the ground and aggressively marketing that expertise.
Mission Impossible: Forecasting Tech in 2021
After a year of unprecedented turmoil, predicting what lies ahead isn’t easy. Seven brave experts agreed to help us try anyway.
Writing Job Descriptions that Get Diversity Results
Choose language that is inclusive and showcases your culture, and avoid exhaustive lists of specific skills that may discourage underrepresented candidates.
Kaseya Unveils Framework for Adding Cloud, Mobile, and IoT Management to RMM Solution
Called Unified Remote Monitoring and Management, the new technology is designed to let MSPs handle server, PC, smartphone, tablet, network, IoT, cloud management, and more through a single interface.
Work from Home: The Art and Science of Post-Perimeter Security
New procedures and policies are required that emphasize identity and access control, while issues around privacy and financial responsibility remain to be addressed.