MSP360 Adds Object Lock Immutability from Backblaze to Managed Backup Service
When enabled by a technician, the new and optional feature prevents users from accidentally or intentionally deleting protected data for the duration of a pre-defined retention period.
Cybersecurity Landscape Has SMBs Expecting More from their MSPs
Recent research from Action1 finds that SMBs are looking for MSPs with comprehensive cybersecurity, certifications, fast incident response, and more.
JumpCloud’s Cloud Is Open to Everything
“Work from anywhere” management, the company believes, requires a comprehensive, user-centric, cloud-first approach to applications, networks, and infrastructure.
SonicWall Ships Wi-Fi 6 Wireless Access Points
The first two members of the new SonicWave 600 series can increase overall wireless throughput by up to 400% compared to Wi-Fi 5 technology, the company says, and reduce latency by up to 75%.
Fujitsu fi-8170 Scanner: Speedy, High Quality with Control
If your customers need a personal or workgroup desktop scanner that even an intern can use and get great results, check out the Fujitsu fi-8170.
IGI CyberLabs Integrates Nodeware with Gradient MSP’s Synthesize Platform
The goal is to help users of IGI’s vulnerability management system automate the time-consuming chore of reconciling monthly billing against up-to-date user and consumption data.
ChannelPro Weekly Podcast: Episode #236 – Cheerios Vs. Starvation
Cheerios or starvation? If you’re a breakfast cereal fan, that may not be an easy question. Don’t think it through, though, until you’ve joined Matt, Rich, and returning guest host Antwine Jackson, of Enitech Solutions, as they discuss Kaseya’s new auto-renewal policy, N-able’s new cloud management system, Huntress’s new managed EDR service, and Ingram Micro’s new membership program for ambitious cloud partners, not to mention how, when, and why to fire clients.
Huntress Rolls Out Managed EDR Solution
Called Process Insights, the service delivers real-time, round-the-clock application telemetry to the vendor’s SOC, where analysts search for suspicious activity, filter out false positives, and issue automated recovery “playbooks” for legitimate threats.
A Swiss Army Knife of Zero Trust
We need a broader, more proactive defense against unknown threats that allows only the known good.
Voice of the Vendor: CompTIA ChannelCon 2022
Live from this year’s CompTIA ChannelCon event in Chicago, Joel Zaidspiner brings you the latest from Infosec, IronVest, Linode, and Phin Security.