Kaseya Celebrates and Rewards Techies on SysAdmin Day 2017

Friday, July 28 is the 18th annual SysAdmin Day. At Kaseya, we service two classes of admins — those who work within internal IT and those who are technicians at MSPs.

We love both kinds! In honor of your work, we aren’t celebrating just the day – we are also going to keep the party going for weeks.

That is the goal of the Kaseya SysAdmin Day contest and celebration. Here you, presumably a technical pro, can get free Heroes of IT wallpaper and custom T-shirts, or win a $500 Loot Box! This is in addition to what you may (or may not) get from your less-appreciative co-workers who we know can barely compute without you. Continue Reading…

5 Features You Need in Your Software Management Solution

Keeping operating systems and third-party software current is a vital step in ensuring your infrastructure is performing optimally and securely. For MSPs, this means keeping customers’ systems patched and up to date. With increasingly vicious ransomware attacks like WannaCry and Petya on the rise, this is more important than ever.

Automatically downloading all patches and updates may seem the easiest way to go to accomplish this. However, not all patches or systems are of equal importance, and not all updates are risk-free. For an MSP managing a small number of systems, deciding on a case-by-case basis what and when to update and doing so manually may make sense. But as you grow, this quickly becomes untenable. Continue Reading…

What’s Worse, an Insider or Outsider Threat?

When IT pros think of hackers, images of young men sitting around a smoky room in Eastern Europe staring at monitors may come to mind. And yes, many hacks, especially large scale incursions, do come from organized groups of outsiders and often foreign entities. This outside threat is why firewalls, and intrusion detection and prevention systems are so common.

But these perimeter defenses do little to fend off what may be the biggest threat – an attack from inside!

Insiders not only have network access, sometimes at a high level, they also know much of what is on the network, and where exactly that data resides. Continue Reading…

GUEST BLOG: Is Your MSP Business Dedicated to Removing Bad Apples?

I believe most MSP business executives have read the book Good to Great and probably took away at least one solid principal. The most common lesson that IT providers learned from the book is that employees who don’t believe in their mission and core values, “should get off the bus.”

However, after spending some time embedded with computer consultants I have started to doubt whether this powerful message from Good to Great has really permeated their decision-making process. Are MSPs today as committed to firing rouge employees as Steve Jobs was at Apple? Continue Reading…

Kaseya Powered Services – Authentication and Network Management in an On-Demand Box

Kaseya today announced the fastest, easiest and most effective way for MSPs to deliver authentication and network management as a service. The new Kaseya Powered Services, known as Go-to-Market in a Box, include cloud-based on-demand versions of Traverse and AuthAnvil custom made for fast set up and speedy service creation.

With these powered services, Kaseya has done much of the heavy lifting in developing the services. The MSP can easily take the Kaseya cloud services and offer them as its own. Continue Reading…

Creating the Most Helpful Service Desk Possible

If there is a bread and butter aspect to a successful MSP, it has to be the service desk. Here is where the rubber meets the road, client IT problems addressed, and is the focal point for how clients interact with your company.

A mediocre or substandard service desk is a death knell. In contrast, a superb service desk creates customer loyalty, SLA compliance and great word of mouth. At the same time, such a desk is efficient, creating more revenue and profit opportunity. Continue Reading…

GUEST BLOG: Can You Use a Psychologist’s Technique From Good Will Hunting to Make a Breakthrough With IT Marketing?

The Importance of Morale

IT marketing is a cutthroat game where personal feelings do not play into business decisions. No one’s going to buy from your MSP because it will make your salespeople “feel good.” They’re going to buy based on shifting factors which may or may not be legitimate. Oftentimes, clients buy not based on service, but on the perception of quality. They perceive that a given provider will yield a certain level of quality Continue Reading…

Instant Access Taps Kaseya VSA, MSP to Perfect Mobile Workforce Management

The relationship between an IT organization and its Managed Service Provider (MSP) is critical to efficient IT. Instant Access, an Australian supplier of aluminium scaffolding and elevated working platforms, works closely with MSP CustomTec on network support. The solution to many of Instant Access’ problems is Kaseya VSA, remote monitoring and management (RMM) that keeps end points running properly and securely.

This task is all the more difficult because Instant Access has 100 professionals that operate in New Zealand and Australia. Managing all these end points is tricky as they are spread across 10 offices. Not only do these end user end points need to kept running, they also need to support constant connectivity. Continue Reading…

Enterprise Management Associates (EMA) Finds Rich MSP Value in Kaseya Traverse

When noted IT research firm EMA, Enterprise Management Associates, wanted to understand the value of Kaseya Traverse, it went to the best source it could find, a managed service provider (MSP) that bases client services on the network and cloud monitoring solution.

EMA interviewed the customer extensively, and then reached its own conclusions. The EMA study “highlights a dialog with a managed services provider (MSP) using Kaseya’s Traverse for requirements that span management of the full application infrastructure in legacy, virtualized, and cloud environments. The report explores the value of Traverse in providing unified, contextual, service-aware insights with the versatility to adapt to a wide variety of verticals and individualized customer needs,” EMA explained. Continue Reading…

Petya May be the Worst Ransomware Ever

Ransomware has been wreaking havoc for years, locking up data and decrypting and releasing it only when money is paid, usually through Bitcoin.

Like any successful malware, new variants are based on the old ones, making it a snap for even amateur-hour hackers to tweak an old exploit and unleash it as new.

So now we have Petya, whose victims already include banks, airports, the metro in Kiev, and even Chernobyl radiation detectors. And this is only the beginning, as the malware is still very much in the wild. Continue Reading…

Page 1 of 6512345»102030...Last »
-->