Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
A guide to MSP patch management best practices
As software patch management challenges mount, industry experts offer advice to MSPs on prioritizing system risk levels, selecting proper tools and testing patches internally. Continue Reading
The importance of building an agile and resilient infrastructure
No one knows what the future will demand. Here's how channel partners can help their clients prioritize agility and resilience in their infrastructures. Continue Reading
Digital maturity laggards play catchup, consultants say
Companies behind the curve of digital transformation can close the gap on digital business leaders, according to professional services firms. Continue Reading
-
3 tips to improve data management in the cloud
Many organizations face substantial challenges in collecting, storing and using data in the cloud. Here are three ways solution providers can help. Continue Reading
3 basic cybersecurity measures to protect MSP businesses
Numerous MSP-targeted cyberattacks have driven home the need for improved internal security practices. Here's how MSPs can secure their operations. Continue Reading
Healthcare security services firms tackle ransomware spike
As healthcare organizations face an onslaught of ransomware attacks, channel partners can assist with security initiatives such as zero-trust architectures to prevent breaches.Continue Reading
AI in managed service software to boost automation
From security to streamlined help desk systems, AI could have profound benefits for MSPs in the future.Continue Reading
MSPs tap Red Hat Ansible for managed services automation
IT services providers have deployed the Red Hat Ansible Automation Platform to minimize repetitive work and boost productivity -- even in uncertain times.Continue Reading
MSP retools bank IT systems with HPE Nimble Storage dHCI
Faced with a strained IT infrastructure, Central Pacific Bank upgraded to Nimble Storage dHCI. Learn how solution provider Pacxa played a critical role in the project.Continue Reading
HPE GreenLake partners to help Kern County take control of IT
Kern County, Calif., faced a daunting challenge of reigning in costs and a sprawling technology ecosystem. HPE GreenLake and MSP Nth Generation were brought in to help.Continue Reading
-
Multi-cloud services grow increasingly important for MSPs
As organizations expand their multi-cloud environments, they'll look to partners for support and expertise. It's time for the channel to board the multi-cloud train, experts say.Continue Reading
3 key phishing prevention strategies for MSPs
MSPs need a solid phishing prevention strategy for protecting clients against evolving threats. Learn about the key pieces of anti-phishing arsenals: tools, policies and training.Continue Reading
Application rationalization strategy opens MSP opportunities
The rapid adoption of new technologies can lead to a slew of problems. Learn why MSPs should help clients develop an application rationalization strategy to cope with these issues.Continue Reading
4 tips for proper cyber hygiene during the remote workforce era
IT services firms have a responsibility to secure their clients' remote workforces. Here are four tips for maintaining cyber hygiene in the cloud, using AWS as an example.Continue Reading
Accenture cloud computing paves way for integration plan
Penelope Prett, CIO at Accenture, aims to provide employees a holistic user experience, taking advantage of cloud computing to integrate various technology tools.Continue Reading
Tips for successful virtual sales and consulting meetings
Channel partners should learn to make the most of virtual sales and consulting meetings. Scott Ford of Pronesis Technology Group offers advice on tactics that work.Continue Reading
Remote learning technology emerges as top ed market focus
MSPs and consultants say customers in the education vertical are ramping up distance learning systems as they prepare for the new school year amid the COVID-19 pandemic.Continue Reading
Which MSP marketing tactics have the best results?
Reaching prospects and converting them into clients is a process involving some trial and error. Here's advice on finding the right marketing tactics for your MSP.Continue Reading
3 tips for marketing and selling MSP cybersecurity to SMBs
The growing demand for MSP cybersecurity services makes it more important to know how to effectively market and sell your offerings. Here are three ways to improve your approach.Continue Reading
MSP business model and financial lessons learned in pandemic
MSPs are facing financial uncertainty due to the pandemic. Industry experts offer advice on managing the pandemic's impact and preparing for hard times.Continue Reading
Remote workforce management strategies for MSPs
Channel partners have been rethinking employee productivity, collaboration and skills development. Learn how Ensono, SADA Systems and AllCloud have adjusted their approaches.Continue Reading
Healthcare IoT's next steps come into focus
Industry watchers believe healthcare IoT is approaching an inflection point. Channel partners can assist in the next step in developing a strategy for existing data.Continue Reading
Partners deploy phishing countermeasures as threats evolve
The pandemic and 2020 presidential election are giving criminals plenty of phishing opportunities. Learn about phishing countermeasures that partners can take to protect customers.Continue Reading
SD-WAN for home workers becomes partner opportunity
SD-WAN technology is seeing increased customer interest due to the sudden expansion of remote workforces. IT service providers are offering product advice and implementation help.Continue Reading
Customers expand IT capabilities for business in the new normal
The pandemic has sparked new directions for Insight Enterprises' project work. Clients are looking to build IT capabilities for unique types of business problems.Continue Reading
MSP staffing strategies change during a pandemic
The overall economic and employment impact of coronavirus is affecting service provider staffing -- some more than others, if at all. See why and gain tips to help with hiring.Continue Reading
How to prepare client companies for ransomware attacks
Ransomware is a constant aspect of the IT landscape but isn't always seen as a priority. IT service providers can help their clients mitigate the risk.Continue Reading
Partners donate technology, services to pandemic relief
IT services companies are contributing a mix of advice and cloud offerings to help research groups and other organizations battling the COVID-19 pandemic.Continue Reading
Accenture: Industrial digital transformation needs leaders
Leadership and execution are the keys to overcoming the potential pitfalls of industrial digitization, a process that redundant technology can hinder.Continue Reading
How managed service operations are adapting to a pandemic
IT service providers are deeply involved in curbing the pandemic's disruptions to U.S. businesses. Learn how companies have uncovered hidden strengths and new service offerings.Continue Reading
Rookie MSP marketing mistakes and how to fix them
Marketing is a stumbling block for most MSPs. Use these tips to resolve a range of problems involving company websites, marketing plans and advertising investments.Continue Reading
ServiceNow implementation upgrades reinsurer's finance unit
In 2017, Accenture embarked on an unconventional ServiceNow deployment on behalf of global reinsurer Scor. Learn how the implementation helped modernize Scor's finance department.Continue Reading
Top tips for providing co-managed IT services
Co-managed IT services give MSPs an opportunity to partner with the internal IT staff of their clients. Get insight into how to successfully implement a CoMITS offering.Continue Reading
FedRAMP authorization and the quest for a better process
Service providers and consultancies are among the organizations attempting to build a better way to get cloud-authorized under the government's FedRAMP program.Continue Reading
MSP software vendors play catch-up with security threats
Hackers have exploited MSP software tools such as remote monitoring and management as a conduit for cyberattacks, leading some vendors to issue new security measures and resources.Continue Reading
Addressing the data problem in a DevOps world
There's a data problem underlying the shift to the cloud, cloud-native applications and the demands of the DevOps world. Insight's Jeff Bozic discusses the issues.Continue Reading
Business-driven security: Consultants help clients play catch-up
Digital transformation projects and other sophisticated tech initiatives call for integrated security. IT service firms are addressing the gap between security and business teams.Continue Reading
Robotic process automation market needs provider boost to accelerate
RPA vendors, service providers and their customers must find ways to overcome time-consuming tasks and bottlenecks to accelerate the technology's enterprise adoption.Continue Reading
Hackers target MSPs, but not all are prepared
Managed service provider security is being put to the test as hackers target MSPs with increasing frequency. Even a relatively simple attack can compromise a service provider.Continue Reading
5 Microsoft Azure managed services to grow your channel business
Andy Syrewicze, a former MSP engineer and current Microsoft MVP, detailed five Azure solutions that service providers can offer their clients. The packages run from the simple to the visionary.Continue Reading
How the channel can help fight bias in AI applications
Customers' AI applications pose the risk of producing prejudiced results. Channel firms, however, can step in to educate organizations and reduce harmful biases within AI systems.Continue Reading
How to succeed at managed services marketing
The marketing formula at service provider DynTek includes executive briefings, messaging around innovation and transformation, and a blend of traditional and digital techniques.Continue Reading
How to manage Windows 7 user accounts and groups
Whether your customers operate in a workgroup or a domain/Active Directory environment, user account setup and group memberships control their rights, permissions and roles.Continue Reading
Cloud migration planning: Assess workloads now to avoid trouble later
Organizations that take the time to assess workloads, identify dependencies and educate themselves on cloud security tools can set a smooth path for a public cloud deployment.Continue Reading
Applying AI: Accenture exec cites customer opportunities
Mike Sutcliff, group chief executive at Accenture Digital, talks about the challenges of applying AI, digital thread and augmented reality to real-world business issues.Continue Reading
Ease the MSP talent acquisition process with these tips
For Eric Hobbs, the key to the talent acquisition process is to recruit prospective employees early and often. Hobbs is CEO at Technology Associates, a managed service provider (MSP) in Cary, North ...Continue Reading
Channel partners help SaaS provider enter overseas markets
OneLogin needed a way to enter overseas markets. The company decided cultivating relationships with channel partners was the best method.Continue Reading
SD-WAN: Providers could see strong growth, but face hurdles
The SD-WAN market beckons with high-growth potential, but channel partners must confront incomplete feature sets, training requirements and market consolidation.Continue Reading
IT security tutorial: Channel partner tips for new tech
In this IT security tutorial, we outline security concerns and mitigation strategies for software-defined networking, hyper-converged infrastructure and the Internet of Things.Continue Reading
MDF funds: How MSPs can get their cut of the marketing money
Market development funds are there for the asking. Learning the details of individual programs -- and demonstrating sales and technical strength -- can help you get your shareContinue Reading
How to become a Microsoft partner, and Microsoft Partner Network details
Find out how to become a Microsoft partner in this description of the MPN, which includes changes to the program effective in January 2014.Continue Reading
Cloud demands new IT organizational structure: How providers can help
Enterprises don't build true private clouds because most IT organizations aren't structured for them. Cloud providers can help customers get there.Continue Reading
Unified storage architecture approaches: Modular vs. integrated
Find out what the considerations are for VARs with customers looking for both file and block storage in a single device.Continue Reading
The risk of using Windows kernel-mode drivers in systems management
Windows kernel-mode drivers can pose risks if used in IT efficiency systems management tools.Continue Reading
Guiding customers through cloud automation platform selection
Cloud-shopping customers need help with cloud selection, and IT solution providers can guide them in the selection of a cloud automation platform.Continue Reading
Cloning virtual machines in vCenter Server
Learn how to identify and clone virtual machines in vCenter Server, from the parameter selection in vSphere 5 to the actual steps to creating the clone.Continue Reading
Virtual storage appliance vs. traditional shared storage
A virtual storage appliance can be a viable way to allocate storage for their virtual server infrastructure; it offers cost and complexity benefits compared with traditional shared storage.Continue Reading
How to do penetration testing: Overcoming problems and concerns
A lot can go wrong with pen testing. Dave Shackleford discusses potential problems and how to fix them, or avoid them altogether.Continue Reading
Seven questions for backup and disaster recovery customers
To determine whether your customers need to outsource their backup and disaster recovery services, they need to answer these questions, such as when was their most recent backup test, and allow you to explain the value you can provide in each area.Continue Reading
Guide to PCI documents: PCI levels, assessments and reports
There are a myriad of different documents for understanding, assessing and reporting PCI DSS compliance. This guide explains which documents to use and where to find them.Continue Reading
Open source Xen vs. Citrix XenServer
Our expert compares the three major open source Xen contenders with Citrix XenServer to help you determine which Xen management product is best for your customers.Continue Reading
Hypervisor comparison: Weighing hybrid environments
Last year, a hypervisor comparison meant choosing one hypervisor to suit a particular environment. Now, solutions providers must consider the hybrid approach.Continue Reading
Traffic Talk: Testing Snort with Metasploit
Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions.Continue Reading
Getting to know the NERC CIP standards
Recently imposed security regulations on the electric grid have electric utilities scrambling to become compliant. Solution providers can offer a valuable service to these utilities by becoming familiar with the North American Electric Reliability ...Continue Reading
Network security monitoring using transaction data
Using transaction data -- or application-specific traffic data -- in network security monitoring can give you a new line of defense.Continue Reading
Router and switch upgrades: Five reasons your customer should invest
Mid recession, customers are avoiding investment in even basic router and switch upgrades, but one surefire way to convince them is long-term savings that will outweigh investment.Continue Reading
VMware ESX essentials: Virtual Machine File System
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's network file system devices.Continue Reading
Best practices for securing domain controllers at the branch office
Companies that implement domain controllers at branch offices face a number of challenges, security-related and otherwise. Follow these best practices to keep branch-office domain controllers secure and effective.Continue Reading
OS virtualization vs. hypervisor: Why you should offer both
As server virtualization fever sweeps through the industry, make sure you're prepared for the eventual rise of OS virtualization. Learn about the benefits of OS virtualization and prepare to offer OS virtualization along with the hypervisor model ...Continue Reading
Troubleshooting 802.1x missing supplicant problems, part 1
Learn how to diagnose and solve 802.1x missing supplicant problems.Continue Reading
Making the most of selling antivirus services
Read Mike Rothman's observations on the antivirus market as it pertains to the channel and find out how selling antivirus services can provide other business opportunities.Continue Reading
How to extend your client's wireless access point range
Some WLAN installations require multiple access points. But before you go that route and install more WLAN access points, use these steps to determine how you can extend the wireless access point range of the current devices.Continue Reading
Penetration testing 101: How to offer pen test services
A penetration test can reveal vulnerabilities in your customer's network. Learn about the different types of pen test services to eliminate these vulnerabilities and ensure the security of your customer's network and applications.Continue Reading
How to configure wireless access points
A crucial part of any WLAN installation is configuring wireless access points. Learn which configuration options -- such as IP address, transmit power and beacon interval -- are best for your customers.Continue Reading
What are the top reasons for network upgrades?
Learn why performance, reliability and security are the three most important reasons for recommending a network upgrade to your clients.Continue Reading
Network session data analysis with Snort and Argus
This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network session analysisContinue Reading
Choosing network equipment vendors: Multi-vendor vs. single-source
A plethora of network equipment vendors means that you have limitless solution offerings at your disposal. Do you specialize in one vendor or create multi-vendor partnerships? Learn the pros and cons of supplementing your tier one vendor partner ...Continue Reading
Introduction to network centralization and decentralization
Network centralization is an attempt to improve efficiency by taking advantage of potential economies of scale. Decentralization is an attempt to improve speed and flexibility by reorganizing networks to increase local control and execution of a ...Continue Reading
Checklist: Five steps to assessing a customer's antivirus protection
Your customers' antivirus protection may not be up to par. This Channel Checklist offers service providers and VARs five steps to follow with customers to shore up their antivirus protection strategies.Continue Reading
Channel Checklist: Top five tools for troubleshooting a WLAN
Customers with WLAN connectivity problems are quick to place blame on airwaves. Service providers know the problem may run deeper. These five WLAN tools will help you investigate the problem and find the real culprit.Continue Reading
Snort frequently asked questions
Snort users are asking about its capabilities. These frequently asked questions about Snort discuss what the open source security tool can do and the right ways to use Snort.Continue Reading
How to diagnose and troubleshoot database performance problems
Database performance problems can wreak havoc with Web site performance and cost your customers lots of money. Diagnosing problems is much easier when you rely on this systematic approach.Continue Reading
Use Netstat to determine which ports to open on a Windows firewall
When troubleshooting a Windows XP firewall, the solution is often simply opening the right firewall port. But what port should you open? This tip walks you through using Netstat to identify which firewall port an application uses.Continue Reading
What are the network security risks of streaming video?
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what to do to protect your client's network.Continue Reading
SSID and wireless connection problems
Discover why changing your SSID number might be the answer to resolving wireless connection problems when your client's wireless network seems to be properly configured.Continue Reading
Choosing network vendors and service providers
Choosing the right networking partners and products is essential to your long-term success as a reseller. Learn how to choose wisely using this tried-and-tested methodology.Continue Reading
How to troubleshoot five common routing errors
Troubleshooting router errors is made easier with this tip, which covers the five major routing errors -- filtering redistribution, mismatched neighbor parameters in OSPF, subnets, metrics and tweaking EIGRP metrics.Continue Reading
An introduction to penetration testing and its legal implications for VARs and consultants
Penetration testing has become a necessity, and you need to know the basics. Learn what qualities your potential customer is looking for in a good tester and how to protect yourself against legal risks.Continue Reading
CDMA and gold code
Gold code sequences used in CDMA allow callers to better use available bandwidth with less interference.Continue Reading
ILM vs. DLM: The importance of data management
Knowing the differences between information lifecycle management (ILM) and data lifecycle management (DLM) will ultimately determine which storage offerings you bring to a client's table.Continue Reading
A review of Skybox Security's Skybox View 3.0
Skybox View builds a detailed map of your customer's network and assesses threats against it based on feeds from VA scanners and SIMS, and also makes it possible to virtualize penetration testing. This review helps channel professionals make the ...Continue Reading
NAS for a Web server
Learn how to use NAS to provide storage for a Web server.Continue Reading
Certified Ethical Hacker (CEH) vs. Certified Network Defense Architect (CNDA) training
If you are trying to decide between taking the CEH and the CNDA exams, get advice here. You may even be able to turn your CEH credential into a CDNA certification.Continue Reading
CDMA technology explained
CDMA principles explained.Continue Reading
Formulating a scalable IP addressing plan
A scalable IP addressing plan will support your customer's network as it grows. This tip explains how to use variable-length subnet masking and route summarization to create a scalable IP addressing plan.Continue Reading