Tips
Tips
-
Measuring innovation success in co-innovation partnerships
Profits are an obvious way to measure business success, but to measure co-innovation partnerships, parties must also identify intangible benefits, such as knowledge acquired. Continue Reading
-
4 tips for managing client relationships in a virtual world
With many businesses opting to rely on remote work technologies, channel partners need new strategies for managing client relationships. Continue Reading
-
3 basic cybersecurity measures to protect MSP businesses
Numerous MSP-targeted cyberattacks have driven home the need for improved internal security practices. Here's how MSPs can secure their operations. Continue Reading
-
Federal technology upgrade could see security, SaaS outlay
Channel partners expect major shifts in the government's technology priorities. Find out which IT trends are poised to shape spending in the coming years. Continue Reading
-
Channel execs share tech talent recruitment tips
In a rapidly evolving tech market, channel partners vie for IT talent. Use these tips to find job candidates, develop skills internally and retain employees. Continue Reading
-
Launch a managed services training program in 9 steps
MSPs' internal training resources should be more than a stack of 'how to' documents. Use these best practices to build a successful managed services training program. Continue Reading
-
MSP business planning for 2021: What you should consider
From remote working to new security threats, 2020 introduced a range of new dynamics for MSPs. Here are four important considerations to address in your business planning for 2021. Continue Reading
-
Security awareness training best practices for MSPs
Human error is the root of many IT security catastrophes. Use these security awareness best practices to craft programs that users will actually learn from. Continue Reading
-
5 steps to build partnerships with IT distribution companies
Channel partners' relationships with IT distribution companies should be about more than ordering tech parts. Find out how to get the most value out of distributor relationships. Continue Reading
-
Implementing SAP S/4HANA during a pandemic
Dickinson + Associates' Brad Hiquet recounts a remote SAP S/4HANA implementation the company did on behalf of American Industrial Transport amid the COVID-19 pandemic. Continue Reading
-
When an SAP S/4HANA selective data transition makes sense
An SAP S/4HANA selective data transition might be the best approach for a customer's ECC conversion. Learn how this approach differs from brownfield and greenfield implementations. Continue Reading
-
Tips for executing an SAP S/4HANA brownfield implementation
Executing an ECC-to-S/4HANA brownfield migration involves tools such as SAP's Maintenance Planner and Software Update Manager. Read on for insight into brownfield conversions. Continue Reading
-
4 MSP pricing strategies for clients facing financial deficits
When managed IT services customers face revenue shortfalls, MSPs don't have to respond by offering discounts and taking a loss. Consider these MSP pricing options first. Continue Reading
-
How to plan an SAP S/4HANA brownfield migration
SAP S/4HANA brownfield migrations aim to convert existing SAP environments without reimplementation. Find out how to prepare for this type of conversion. Continue Reading
-
3 strategies for SAP ECC to S/4HANA conversion projects
In part one of this five-part series on SAP ECC to S/4HANA conversions, learn about the history of transformation at SAP and three approaches to migrations. Continue Reading
-
3 key phishing prevention strategies for MSPs
MSPs need a solid phishing prevention strategy for protecting clients against evolving threats. Learn about the key pieces of anti-phishing arsenals: tools, policies and training. Continue Reading
-
4 tips for proper cyber hygiene during the remote workforce era
IT services firms have a responsibility to secure their clients' remote workforces. Here are four tips for maintaining cyber hygiene in the cloud, using AWS as an example. Continue Reading
-
Tips for successful virtual sales and consulting meetings
Channel partners should learn to make the most of virtual sales and consulting meetings. Scott Ford of Pronesis Technology Group offers advice on tactics that work. Continue Reading
-
3 tips for marketing and selling MSP cybersecurity to SMBs
The growing demand for MSP cybersecurity services makes it more important to know how to effectively market and sell your offerings. Here are three ways to improve your approach. Continue Reading
-
How to offer managed IT services for construction firms
Commercial construction firms have a growing need for managed IT services. The CTO of Level5 Management explains how MSPs can break ground in this burgeoning vertical market. Continue Reading
-
How to evaluate MSP peer groups
Peer groups can help MSPs improve in any number of business areas. Ed Mana, chief technologist at Technology on Demand, offers tips for finding the right peer group for you. Continue Reading
-
5 tips for multi-cloud strategy and management success
Multi-cloud environments can unleash a host of management challenges. Cloud solutions architect Jacob Picart offers advice on making multi-cloud work. Continue Reading
-
Office 365 managed services call for workflow, vertical skills
Subscription business models, a focus on automating workflow and becoming a thought leader are important for taking advantage of the Microsoft Office 365 opportunity. Continue Reading
-
Self-service analytics at Accenture boosts knowledge workers
Accenture's enterprise analytics and AI models are helping the firm on a number of fronts, including determining sales opportunities, pricing deals and complying with internal and customer expense policies. Continue Reading
-
AI applications: Cloud vs. on-premises deployment options
Should clients build on-premises infrastructures for their AI needs or turn to cloud-based AI? Insight Enterprises' Brandon Ebken and Juan Orlandini discuss these options. Continue Reading
-
How to revamp your managed services pricing for predictable revenue
Many MSPs still rely heavily on an hourly billing rate and cost-plus pricing. Michael Backers, an MSPAlliance board member, offers advice on moving to managed services pricing. Continue Reading
-
7 channel marketing strategy tips for 21st-century success
Channel companies need to develop a marketing strategy that goes beyond word of mouth and vendors' programs. Those alone just don't cut it these days. Continue Reading
-
Network design checklist: How to design a local area network
Local area network design considerations for IT consultants range from IP default gateway redundancy to device standardization. Browse these tips iIf you are building a LAN. Continue Reading
-
Network documentation checklist: 10 steps for channel partners
Network documents can provide service providers with valuable insight when it's time to troubleshoot problems. Follow these 10 steps for a smooth documentation process. Continue Reading
-
4 tips for MSPs building a cloud backup services business
Getting started as a cloud-based backup services business requires a grasp of the target market, a solid mix of backup vendors and a sound pricing formula. Continue Reading
-
Building a partnership: How to link up with other service providers
Partnering with your fellow IT service providers can help expand the services you offer clients without incurring the cost of hiring and retaining talent. Continue Reading
-
IT RFP: How to influence the bid as a channel partner
Channel partners may find the formal RFP process challenging, but they can influence the bid in advance -- and boost their chances for success -- through digital marketing. Continue Reading
-
Five pitfalls in the merger and acquisition process
Channel partners working through the merger and acquisition process must deal with cultural, financial and personnel issues before the ink is dry. Continue Reading
-
How to become a Microsoft partner, and Microsoft Partner Network details
Find out how to become a Microsoft partner in this description of the MPN, which includes changes to the program effective in January 2014. Continue Reading
-
Cloud demands new IT organizational structure: How providers can help
Enterprises don't build true private clouds because most IT organizations aren't structured for them. Cloud providers can help customers get there. Continue Reading
-
Unified storage architecture approaches: Modular vs. integrated
Find out what the considerations are for VARs with customers looking for both file and block storage in a single device. Continue Reading
-
The risk of using Windows kernel-mode drivers in systems management
Windows kernel-mode drivers can pose risks if used in IT efficiency systems management tools. Continue Reading
-
Guiding customers through cloud automation platform selection
Cloud-shopping customers need help with cloud selection, and IT solution providers can guide them in the selection of a cloud automation platform. Continue Reading
-
Cloning virtual machines in vCenter Server
Learn how to identify and clone virtual machines in vCenter Server, from the parameter selection in vSphere 5 to the actual steps to creating the clone. Continue Reading
-
Virtual storage appliance vs. traditional shared storage
A virtual storage appliance can be a viable way to allocate storage for their virtual server infrastructure; it offers cost and complexity benefits compared with traditional shared storage. Continue Reading
-
How to do penetration testing: Overcoming problems and concerns
A lot can go wrong with pen testing. Dave Shackleford discusses potential problems and how to fix them, or avoid them altogether. Continue Reading
-
Seven questions for backup and disaster recovery customers
To determine whether your customers need to outsource their backup and disaster recovery services, they need to answer these questions, such as when was their most recent backup test, and allow you to explain the value you can provide in each area. Continue Reading
-
Guide to PCI documents: PCI levels, assessments and reports
There are a myriad of different documents for understanding, assessing and reporting PCI DSS compliance. This guide explains which documents to use and where to find them. Continue Reading
-
Open source Xen vs. Citrix XenServer
Our expert compares the three major open source Xen contenders with Citrix XenServer to help you determine which Xen management product is best for your customers. Continue Reading
-
Hypervisor comparison: Weighing hybrid environments
Last year, a hypervisor comparison meant choosing one hypervisor to suit a particular environment. Now, solutions providers must consider the hybrid approach. Continue Reading
-
Traffic Talk: Testing Snort with Metasploit
Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Continue Reading
-
Getting to know the NERC CIP standards
Recently imposed security regulations on the electric grid have electric utilities scrambling to become compliant. Solution providers can offer a valuable service to these utilities by becoming familiar with the North American Electric Reliability ... Continue Reading
-
Network security monitoring using transaction data
Using transaction data -- or application-specific traffic data -- in network security monitoring can give you a new line of defense. Continue Reading
-
Router and switch upgrades: Five reasons your customer should invest
Mid recession, customers are avoiding investment in even basic router and switch upgrades, but one surefire way to convince them is long-term savings that will outweigh investment. Continue Reading
-
VMware ESX essentials: Virtual Machine File System
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's network file system devices. Continue Reading
-
Best practices for securing domain controllers at the branch office
Companies that implement domain controllers at branch offices face a number of challenges, security-related and otherwise. Follow these best practices to keep branch-office domain controllers secure and effective. Continue Reading
-
OS virtualization vs. hypervisor: Why you should offer both
As server virtualization fever sweeps through the industry, make sure you're prepared for the eventual rise of OS virtualization. Learn about the benefits of OS virtualization and prepare to offer OS virtualization along with the hypervisor model ... Continue Reading
-
Troubleshooting 802.1x missing supplicant problems, part 1
Learn how to diagnose and solve 802.1x missing supplicant problems. Continue Reading
-
Making the most of selling antivirus services
Read Mike Rothman's observations on the antivirus market as it pertains to the channel and find out how selling antivirus services can provide other business opportunities. Continue Reading
-
How to extend your client's wireless access point range
Some WLAN installations require multiple access points. But before you go that route and install more WLAN access points, use these steps to determine how you can extend the wireless access point range of the current devices. Continue Reading
-
Penetration testing 101: How to offer pen test services
A penetration test can reveal vulnerabilities in your customer's network. Learn about the different types of pen test services to eliminate these vulnerabilities and ensure the security of your customer's network and applications. Continue Reading
-
How to configure wireless access points
A crucial part of any WLAN installation is configuring wireless access points. Learn which configuration options -- such as IP address, transmit power and beacon interval -- are best for your customers. Continue Reading
-
Network session data analysis with Snort and Argus
This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network session analysis Continue Reading
-
Choosing network equipment vendors: Multi-vendor vs. single-source
A plethora of network equipment vendors means that you have limitless solution offerings at your disposal. Do you specialize in one vendor or create multi-vendor partnerships? Learn the pros and cons of supplementing your tier one vendor partner ... Continue Reading
-
Introduction to network centralization and decentralization
Network centralization is an attempt to improve efficiency by taking advantage of potential economies of scale. Decentralization is an attempt to improve speed and flexibility by reorganizing networks to increase local control and execution of a ... Continue Reading
-
Checklist: Five steps to assessing a customer's antivirus protection
Your customers' antivirus protection may not be up to par. This Channel Checklist offers service providers and VARs five steps to follow with customers to shore up their antivirus protection strategies. Continue Reading
-
Channel Checklist: Top five tools for troubleshooting a WLAN
Customers with WLAN connectivity problems are quick to place blame on airwaves. Service providers know the problem may run deeper. These five WLAN tools will help you investigate the problem and find the real culprit. Continue Reading
-
Snort frequently asked questions
Snort users are asking about its capabilities. These frequently asked questions about Snort discuss what the open source security tool can do and the right ways to use Snort. Continue Reading
-
How to diagnose and troubleshoot database performance problems
Database performance problems can wreak havoc with Web site performance and cost your customers lots of money. Diagnosing problems is much easier when you rely on this systematic approach. Continue Reading
-
Use Netstat to determine which ports to open on a Windows firewall
When troubleshooting a Windows XP firewall, the solution is often simply opening the right firewall port. But what port should you open? This tip walks you through using Netstat to identify which firewall port an application uses. Continue Reading
-
Choosing network vendors and service providers
Choosing the right networking partners and products is essential to your long-term success as a reseller. Learn how to choose wisely using this tried-and-tested methodology. Continue Reading
-
How to troubleshoot five common routing errors
Troubleshooting router errors is made easier with this tip, which covers the five major routing errors -- filtering redistribution, mismatched neighbor parameters in OSPF, subnets, metrics and tweaking EIGRP metrics. Continue Reading
-
An introduction to penetration testing and its legal implications for VARs and consultants
Penetration testing has become a necessity, and you need to know the basics. Learn what qualities your potential customer is looking for in a good tester and how to protect yourself against legal risks. Continue Reading
-
ILM vs. DLM: The importance of data management
Knowing the differences between information lifecycle management (ILM) and data lifecycle management (DLM) will ultimately determine which storage offerings you bring to a client's table. Continue Reading
-
A review of Skybox Security's Skybox View 3.0
Skybox View builds a detailed map of your customer's network and assesses threats against it based on feeds from VA scanners and SIMS, and also makes it possible to virtualize penetration testing. This review helps channel professionals make the ... Continue Reading
-
Formulating a scalable IP addressing plan
A scalable IP addressing plan will support your customer's network as it grows. This tip explains how to use variable-length subnet masking and route summarization to create a scalable IP addressing plan. Continue Reading