FEATURE ARTICLES

More Featured Editorial

EDITOR'S DESK

  • What VARs & MSPs Can Learn From The Trump Campaign’s IT Provider
    What VARs & MSPs Can Learn From The Trump Campaign’s IT Provider

    The Wall Street Journal’s homepage on January 17 featured a headline that included the words “IT Firm.” VARs and MSPs take note: a fellow solutions provider is caught up in a nasty, politically-charged debate being litigated on a national scale. Obviously, your clients are not paying you in large sums of cash handed over in plastic Wal-Mart bags. This story is preposterous in so many ways, and it’s far outside the realm of what’s normal for how VARs and MSPs operate. As absurd as the entire situation might be, this story does raise a few legitimate questions about IT service provider business models that are worth rehashing.

VARs: What Is Your Plan B?

Getting to Plan B: Breaking Through to a Better Business Model is a must-read for leaders in the channel who come from a tech background and not from a business background. Here are some of the top takeaways for VARs.

Client Security Training: Partnership Drives The Opportunity

In a sweeping interview for Channel Executive Magazine, seasoned IT executive and SRC Technologies President and CEO BJ Havlik shared the wisdom behind his new-solution onboarding philosophy. In doing so, he zeroed in directly on the relatively new client IT security training opportunity.

4 Prime Examples Of Uncomfortable IT Services Growth

I just returned from the Ingram Micro ONE event in Washington, DC and here’s what I liked most about it. If I’ve heard one vendor or distributor exec implore a crowd of their VAR and MSP customers to do something innovative, something non-traditional, with their clients, I’ve heard a million.

How VARs Can Make Customers Raving Fans

We dedicate a good amount of editorial to encouraging VARs to innovate, to add to their line cards, and to transition their business models. We should spend more time reminding VARs the importance of keeping existing customers happy by ensuring your customer support operation is up to par.

GUEST CONTRIBUTORS

  • Finding The Right Fit For Your Merchant’s Spa, Salon POS System
    Finding The Right Fit For Your Merchant’s Spa, Salon POS System

    The salon and spa industry are categorized under wellness, the state of being in good health. After all, everyone wants to look and feel good and these services accomplish both. According to IBIS World, “Salons and spas in the United States generate $4 billion in revenue each year. From 2012 to 2017, the industry grew at an average annualized rate of 1.8%.” Salons and spas typically generate profits through the provision of both services as well as product sales.”

  • How Your Merchants Can Make The Most Of Mobile Food Service POS Systems
    How Your Merchants Can Make The Most Of Mobile Food Service POS Systems

    Operating a mobile food truck often means that your merchant must be able to make changes on the fly. Whether they operate a taco truck or an ice cream truck, a key to success in the mobile food business is to be able to work quickly and accurately.

  • Don’t Be Shocked By Your Processing Partner’s Fees
    Don’t Be Shocked By Your Processing Partner’s Fees

    If you’re like most people, when you’re handed a 30-page contract, you skim over it, make sure it looks okay and sign on the dotted line. When it comes to payment processing, resellers should cross all the t’s, dot all the i’s and read it from cover to cover. Yes, it may take some time, but that dedication could save your merchants’ hundreds if not thousands of dollars, and even your reputation.

  • Ten Steps To Save Your Merchants From Data Breaches

    According to Accenture, “The most expensive component of a cyber-attack is information loss, which represents 43 percent of costs.” It is not uncommon for businesses to maintain at least some sensitive data. If your merchants are not taking steps to protect their information, they could be at risk.

  • Seeing Green: Eye Scans And The Evolution Of The Payment Industry

    The evolution of the payment industry dates back thousands of years. Whether it was the early days of bartering goods and livestock, or the introduction of precious metal coins and leather money, we’ve come a long way. As time marches on, we see a shift from paper currency such as checks and dollar bills to credit card payments. No longer is cash the true king.

More From Guest Contributors

VAR WHITE PAPERS

  • Securing DECT Devices

    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

  • An Introduction To Bluetooth® Security

    Bluetooth® is a wireless technology standard for exchanging voice and data over short distances between Bluetooth enabled devices. Ericsson introduced Bluetooth to the market in 1994 to overcome the challenges of connecting devices with different types of technology and communication protocols.

  • Show Your Clients That Their Online Presence Can Make Or Break Their Business

    Your client’s online presence matters — and it matters in a big way. Resellers can help clients grow their businesses and simultaneously deepen their relationships by guiding them in the use of digital tools and explaining why they matter.

More VAR White Papers

FEATURED SUPPLIERS

  • CloudBerry
    CloudBerry

    CloudBerry Lab™ is a vendor for CloudBerry Backup, a leading cross-platform cloud backup and disaster recovery solution integrated with major public cloud services, such as Amazon Web Services, Microsoft Azure and Google Cloud Platform, and almost every S3-compatible or OpenStack based cloud storage service.

  • Taylor Business Group
    Taylor Business Group

    Taylor Business Group is an executive coaching and peer group firm that focuses on IT Solution Providers and Copier Dealers. Founded in 2001, Taylor has brought efficiencies and higher profits to IT Solution Providers through a focused effort in delivering best practices to the Service Provider and Copier Dealer's service, sales and administrative functions.

  • Sennheiser
    Sennheiser

    Sennheiser is one of the world’s leading manufacturers of headphones, microphones, and wireless transmission systems. With 20 sales subsidiaries and long-established trading partners, the company is active in more than 50 countries and operates its own production facilities in Germany, Ireland, and the USA.

  • SherWeb
    SherWeb

    SherWeb has been helping businesses around the world work smarter in the cloud since 1998. Our cloud solutions help companies be more agile in today’s competitive market and trim IT costs.

  • Webroot
    Webroot

    Webroot delivers intelligent cybersecurity for endpoint, mobile and web to channel partners, consumers, businesses, and enterprises worldwide. Powered by its BrightCloud® collective threat intelligence network, Webroot protects the internet of everything. Our cloud-based threat detection, high performance, lightweight agents, and single, web-based point of control have changed the way businesses think about protecting mobile devices, PCs and servers. Named a ‘Visionary’ in Gartner’s Magic Quadrant for Endpoint Protection Platforms, Webroot’s smarter approach to security is why companies including Cisco, F5 Networks, GateProtect, HP, Microsoft, Palo Alto Networks, Proofpoint, RSA and others choose our solutions for advanced threat protection for their security products and services.

  • ConnectWise
    ConnectWise
    ConnectWise is the leading business management solution designed exclusively for technology organizations, such as IT solution providers, MSPs, software companies, hardware/software resellers, and System Integrators.  

     

INDUSTRY PARTNERS AND ASSOCIATIONS

ASCII CompTIA HTG Peer Groups Small Biz Thoughts
SMB TechFest 2112 Group RSPA Money 20/20
Shoptalk ASP Drone Dealer Expo Michael E Gerber Companies

 

INDUSTRY INSIGHTS

  • Where To Start Your Documentation Journey
    Where To Start Your Documentation Journey

    You know developing a documentation rhythm will benefit you, but with so much to document, where do you start? We get it. You’re swamped with information and data, and it’s all important for different reasons. That’s why we’ve developed 6 steps to get you started, and mastering, your documentation.

  • Use Templates For Documentation Success
    Use Templates For Documentation Success

    Does documentation ever seem like a daunting task that’s missing a clear starting point? We get it. With so much crucial information to document, it can be difficult to nail down how to do it. However, the key to mastering your documentation is to first master the use of documentation templates. Not only is a documentation template going to increase company-wide consistency and save you a ton of time, but it’s going to help you get started.

  • Looking Beyond PCI Compliance: More Ways To Increase Security
    Looking Beyond PCI Compliance: More Ways To Increase Security

    In the past few years, there has been a significant effort to curb debit and credit card fraud, especially through the integration of mobile and EMV payment processing. However, while these platforms tend to be effective shields against bogus payments, merchants should still seek to do more when it comes to ensuring they and their customers aren’t hit by fraud on a regular basis.

  • Positioning Value-Added Resellers As Trusted Security Advisors
    Positioning Value-Added Resellers As Trusted Security Advisors

    Everyone has skin in the game when it comes to security within the payments ecosystem. Consumers need their account information protected to avoid fraud, merchants need to safeguard all data they collect to avoid liability for breaches, and payment processors need to avoid payouts for fraudulent losses.

  • Tips For Making POS Systems Less Vulnerable To Cyber Attacks
    Tips For Making POS Systems Less Vulnerable To Cyber Attacks

    In just the last few years, the retail and hospitality industries have been prime targets for a multitude of cyberattacks. Point of sale (POS) systems have been particularly vulnerable, with debit and credit card readers being targeted in an effort to steal confidential financial information. While some of the most well-known victims of cyberattacks on POS systems have included Target and Home Depot, restaurant chains Chipotle, Chilis, and Applebees were also affected recently as a result of malware.

  • Preventing Security Breaches: Reducing Merchant Risk
    Preventing Security Breaches: Reducing Merchant Risk

    Data breaches are a continual risk for companies of all sizes that must maintain customer data. The situation has now evolved into a question of not if a business will become the victim of a data breach, but when and how many times it will happen. A data breach is defined as, “the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

More Industry Insights

FEATURED PRODUCTS

  • Business Improvement Peer Groups
    Business Improvement Peer Groups

    Business Improvement Groups (or BIGs) consist of 10-12 non-competing members. The group will become a close network of advisors that you can call upon when you have any business issue facing you that you would like input from outside the company. Every member signs a non-disclosure agreement, so whatever is said or presented stays within the group.

  • Barracuda Intronis Backup - MSP
    Barracuda Intronis Backup - MSP

    Offer value to your customers by protecting what matters most, while creating new opportunities to expand your margins and grow your business.

  • Finance And Accounting
    Finance And Accounting

    Using Proven Accounting Principles to Help Resolve Financial Challenges.

  • Cash Drawer Caddy™ SP Organizer
    Cash Drawer Caddy™ SP Organizer

    The Caddy™ SP Organizer is a slim profile POS integration tray that brings easy cable routing and organization to APG heavy duty cash drawers.

More Featured Products