RocketCyber Launches Managed SOC Solution
The outsourced as-a-service offering, which includes threat remediation assistance, is part of a strategic business model shift by RocketCyber from making security products to providing security services.
Voice of the (Socially Distanced) Vendor: Episode 7
Check in on the news you need to know from Calyptix, EZ VPN, and Stratus Technologies in Joel Zaidspiner’s latest collection of candid vendor chats.
Kaseya Announces Latest Wave of Portfolio Integrations and Updates
“If you boil them all down, they’re about MSPs being able to be more efficient,” says Chief Strategy Officer Mike Puglia (pictured) of the changes, which Kaseya discussed during its 2020 Connect IT conference.
10 Questions for Your Outsourced NOC Provider
A lot is at stake when it comes to NOC, especially around security measures, business continuity, and networkmanagement. You simply can’t afford to hire a provider that doesn’t adhere to the right NOC practices. In thisdocument, we outline the ten important questions MSPs should ask prospective NOC service providers to besure a large chunk of their business goes in ‘able hands’.
Simply complete the form below to read the full white paper.
What Doesn’t Kill You Makes You Stronger
After a breach that exposed clients to ransomware, ITECH Solutions transformed to a security-first posture with a focus on higher-value, mutually beneficial customer relationships.
Kaseya Buys Phishing Defense Vendor Graphus
The Graphus solution, which Kaseya has integrated with products from its ID Agent unit, uses artificial intelligence to detect and block threat-bearing emails, offering an added layer of defense against ransomware and business email compromise attacks.
ChannelPro Weekly Podcast: Episode #157 – The New M&A (Mongrels & Animals)
You think M&As were hard before? Try the new kind involving bears and elk. Matt, Rich, and guest host Bruce McCully, chief security officer of MSSP Galactic Advisors, discuss that topic and others this week with Linda Rose of M&A consultancy RoseBiz.
Vendor to Watch: ThreatLocker
ThreatLocker provides zero-trust, policy-driven security solutions for endpoints.
The Drivers and Benefits of Edge Computing
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source.
Essential Guidance on DCIM for Edge Computing Infrastructure
The lack of staff or “lights out” nature of many loc al IT and mobile edge computing (MEC) sites makes operations & maintenance a challenge. This struggle worsens as the number of sites increase. How do you maintain IT resiliency in a c ost-effective way under these conditions? In this paper find out more on essential DCIM functions for small, unmanned edge computing sites and attributes of next-generation DCIM solutions best optimized for that type of environment.








