dcsimg

3 Takeaways from FireEye’s 2020 Predictions Report

<p>The security industry publishes reports on threats, trends, and other topics several times each year. It’s hard enough keeping up with the everyday demands required of managed services providers (MSPs)—trying to stay in the loop on these reports can be a nightmare. So I want to make things easier on you by giving you the highlights—and what I think it means for you on a practical … [Read more...]

What Skills Levels Should You Hire at and When?

<p>There is no one-size-fits-all answer to the above title question. However, we <i>can </i>provide some tips to help you figure out what works best for you.&nbsp;</p> <p>There are two main things to consider:&nbsp;</p> <ul> <li>Where is your gap?</li> <li>What are your resources?</li> </ul> Read More … [Read more...]

SNMP Monitoring and Management

<p>As a managed services provider (MSP), you need fast, remote access to your customers’ networks and accurate insights into their infrastructure—enter Simple Network Management Protocol (SNMP).&nbsp;</p> Read More … [Read more...]

How to Move Up the Automation Maturity Model 

<p>In a recent blog, <a href="https://www.solarwindsmsp.com/blog/automation-week-upgrading-powershell…; target="_blank">Upgrading PowerShell and Automation in 2019</a>, I talked about how automation has evolved and how I see our partners fitting into four different categories with respect to their automation maturity. Read More … [Read more...]

Data Deduplication Overview

<p>Backup technology has seen a huge number of advancements over the past couple of decades, but few have been as significant as the development of data deduplication. Data deduplication, which removes duplicates of data entries to save storage space, has been around in some form since the 1970s. At that time, redundant data was identified by clerks who went through data line by line, … [Read more...]

Department of Homeland Security Issues Emergency Directive for Microsoft Critical Vulnerabilities

<p>Today Microsoft released several patches to address critical vulnerabilities. Several were of enough concern to prompt the Department of Homeland Security to issue an <a href=" https://cyber.dhs.gov/ed/20-02/">Emergency Directive</a> ordering all Federal agencies to patch these vulnerabilities within the next ten days.</p> Read More … [Read more...]

IT Infrastructure Monitoring

<p>IT infrastructure monitoring is the unsung hero of the modern workplace. It’s a hero because it sustains our technology systems in ways that allow them to function continuously, reliably, and seamlessly. It’s unsung because most employees don’t notice it, so long as the technologies they rely on continue to work without interruption.&nbsp;</p> Read More … [Read more...]

Take a Flexible Approach to Data Protection This Year

<p>The new year means it’s time to take a fresh look at the state of your data protection. Sure, you take backups—but how confident are you that your customers’ data is truly protected and quickly recoverable in the event of a ransomware attack, disaster, or user error? And how many hours are you spending every week to maintain the status quo?</p> Read More … [Read more...]

How Do You Get Your Customer to Buy into Hardware Upgrades

<p>In general, there are two reasons to upgrade or replace hardware outside of a direct customer request; the first is performance and the second is security. Performance issues cause losses in productivity that, if not quantified, the business owner may not realize how much they’re losing. Security is top of mind for many business owners today, but it may still be hard to justify the … [Read more...]

Converged IT Infrastructure Overview and Benefits

<p>The history of converged systems proves everything old becomes new again. The most popular data management systems started out as single, unified mainframes before the prevailing trend shifted and data management became decentralized in the 1980s and 1990s. In 2008, Oracle reinvigorated the converged infrastructure era when it debuted its HP Oracle Database Machine—and managed services … [Read more...]