MSSP Reports

MicroScope – December 2019: Time for change
sponsored by MicroScope
EZINE: In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider
Posted: 08 Feb 2021 | Published: 06 Dec 2019

MicroScope

MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 08 Feb 2021 | Published: 06 Sep 2019

MicroScope

MicroScope – February 2021: The forecast on channel security
sponsored by MicroScope
EZINE: MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working
Posted: 08 Feb 2021 | Published: 05 Feb 2021

MicroScope

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
sponsored by OpenText Security Solutions
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 15 May 2013 | Published: 15 May 2013

OpenText Security Solutions

Presentation Transcript: Customer Experience Focused Transformation
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: This presentation transcript discusses Telecom Service Provider Transformations as well as business strategies and models to improve quality of experience, including customer experience management planning and the role-managed services can play in this transformation.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Alcatel-Lucent

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

MicroScope Seminar: How to Succeed in Managed Services
sponsored by Kaseya International Limited
VIDEO: Access this essential resource to discover the top reasons why managed service providers (MSPs) should embrace end-point management and learn how to achieve breakthrough success in the IT managed services business
Posted: 22 Nov 2011 | Premiered: 22 Nov 2011

Kaseya International Limited

E-Guide: 6 Things Every New MSP Needs to Know about the Business
sponsored by Nimsoft, Inc.
EGUIDE: While many VARs, integrators and solution providers are offering “services,” there remains a substantial portion that either have only a small amount of revenue coming from managed services or no managed services practices at all. This guide will walk you through the 6 best practices you need to know about being a managed service provider.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Nimsoft, Inc.

A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE: Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
sponsored by Panda Security
CASE STUDY: Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
Posted: 03 Dec 2009 | Published: 20 Nov 2009

Panda Security