FEATURE ARTICLES

More Featured Editorial

EDITOR'S DESK

  • A Call For VAR Innovation
    A Call For VAR Innovation

    There’s a repetitive scene that plays out each month as my team sits down to review and plan our varinsights.com and Channel Executive magazine editorial content. Our modus operandi, in a nutshell, is to feature executives who apply innovative solutions to often complex problems associated with being in the IT services business. With that M.O. in mind, we struggle to strike a balance between our coverage of traditional VARs and that of managed service providers.

Sorensen Named RSPA W2W Leader Of The Year

The work my friend and colleague Abby Sorensen put into the IT Channel is paying dividends even after she shifted her focus to the greater software business community. Last week at its RetailNOW event, the Retail Solutions Providers Association’s Women-to-Women (W2W) Committee named her its 2018 Leader Of The Year. Committee Chair and business owner Kelli Stewart, owner/operations manager at Advanced Data Systems, bestowed the honors from the mainstage.

HTG Peer Groups Is Now IT Nation Evolve

At the top of the New Year, ConnectWise and HTG Peer Groups collaboratively announced that the former was acquiring the latter. Among the HTG associate, member, and greater MSP communities, the news incited a lot of speculation about the future of the HTG empire led by Arlin Sorensen and family. This week, the speculation was put to rest. HTG is now IT Nation Evolve, a new brand that reflects the Arnie Bellini-inspired ConnectWise flavor of channel community building.

Why Every POS VAR Should Read “Built To Last”

The technologies VARs sell and the services VARs provide change drastically in short periods of time, and it takes persistence to evolve your business to keep up. That’s why Built To Last is a must-read for VARs.

Men: Let’s Get Past The Discomfort Of Sexism In IT

Men outnumber women in this industry by something on the order of 8 to 2, and the margin is even wider in the c-suite. By and large, we’re the ones approving salaries, greenlighting recruits, and setting the cultural tones of our companies. That requires us to be involved in solving the pay gap, recruiting more women into the field, and most importantly, driving cultures that demand equal respect across gender lines. None of that will happen if we’re not talking about it.

GUEST CONTRIBUTORS

  • The Increase In Cloud Platform Cyberattacks Could Be Good News For VARs
    The Increase In Cloud Platform Cyberattacks Could Be Good News For VARs

    As more companies shift their IT infrastructure, data, and applications to the cloud, the need for reliable cloud security has become more acute. Fact is, the cloud has increasingly become a target for cyberattacks, as criminals follow the data from on-premises servers to cloud platforms.

  • Everything You Need To Know About Phishing
    Everything You Need To Know About Phishing

    Low-tech security strategies are a vital part of protecting customers from email-borne threats.

  • 9 Proactive Security Best Practices For MSPs
    9 Proactive Security Best Practices For MSPs

    For MSPs, the traditional approach to cybersecurity focuses on defense and prevention, but as cybercriminals get bolder and more sophisticated, that’s no longer enough. What’s needed is a proactive security posture that MSPs can enforce with their clients using these nine best practices.

More From Guest Contributors

VAR WHITE PAPERS

  • Securing Users And Devices Across All Stages Of A Malware Attack

    Educating users is an undeniably effective way to protect them from phishing and other malware, but it takes much more than that to stop attacks. There are many risks to networks that user education can’t reduce—from malicious sites mistakenly categorized as benign to watering-hole attacks that infect trusted sites. To combat these challenges, businesses need well-designed antimalware that protects across a variety of attack vectors and infection stages. That’s where multi-vector protection comes in.

  • Diversify Your Business With Managed Cloud Backup

    As cloud storage becomes more affordable, organizations of all sizes are exploring new ways to meet their increased storage demands and streamline operations. This steady decline in cost and improvements in security have made cloud storage a viable alternative to traditional on-premises storage options.

  • What Makes Real Threat Intelligence

    First popularized in terminology several years ago, threat intelligence means many things to many people. This is due, in part, to the wide variety of producers, consumers, formats, intended uses, and quality of this type of data. This wide variety of definitions is exacerbated by the spectrum of qualitative and quantitative data called threat intelligence.

More VAR White Papers

FEATURED SUPPLIERS

  • Shift4 Payments
    Shift4 Payments

    Shif4 Payments is a leading national provider of touch-screen point of sale (POS) systems and payment processing services. As pioneers of the "as a service" model, Shif4 Payments offers an unprecedented "free" POS program that allows the company's sales partners to offer a full-featured POS system with no up-front costs.

  • RSPA
    RSPA
    RSPA stands for Retail Solutions Providers Association. We are the only association dedicated to the retail technology industry.  

     

  • CompTIA
    CompTIA

    CompTIA is the voice of the world's information technology (IT) industry.

  • The ASCII Group
    The ASCII Group

    The ASCII Group is a vibrant community of independent MSPs, VARS and solution providers in North America. The organization offers members leveraged purchasing programs, education and training, knowledge sharing among peers, discounts on business services, and more. Founded in 1984 by Alan Weinberger, ASCII is the oldest and largest group of independent IT solution providers, integrators and VARS in the world.

  • SherWeb
    SherWeb

    SherWeb has been helping businesses around the world work smarter in the cloud since 1998. Our cloud solutions help companies be more agile in today’s competitive market and trim IT costs.

  • APG Cash Drawer, LLC
    APG Cash Drawer, LLC

    For more than 30 years, APG Cash Drawer has been designing and delivering cash drawers with a variety of size, color, interface, and integration options. An APG cash drawer will provide years of smooth, trouble free service with virtually no downtime, no service required, and no headaches. Our cash drawers are so well constructed and so reliable that our customers install them and forget them - even in the most demanding environments.

INDUSTRY PARTNERS AND ASSOCIATIONS

ASCII CompTIA HTG Peer Groups Small Biz Thoughts
SMB TechFest 2112 Group RSPA Money 20/20
Shoptalk ASP Drone Dealer Expo Michael E Gerber Companies

 

INDUSTRY INSIGHTS

  • Synthetic Backup Vs. Full Backup
    Synthetic Backup Vs. Full Backup

    The Schrödinger’s backup is such a backup, that was not yet tested for a recovery. Having a full backup is essential for making sure you can recover everything, especially if you have a widespread system failure, compromised data, or even an employee error that leads to loss of a substantial part of your information. While traditional full backup methods used to be the only option for having a complete copy of your data, synthetic full backup is providing a new alternative.

  • 3 Tips For An Efficient Backup Strategy
    3 Tips For An Efficient Backup Strategy

    If you care at all about the security of your data, you already know that you need a backup strategy in place. Cyber attacks, technology failures, and human error (especially human error) can all lead to loss of important information that can put you at risk. However, not all backup strategies are equal. To keep your data backed up and secure, follow these three tips.

  • 10 Steps To Successfully Educate Your Clients’ End Users About Cybersecurity
    10 Steps To Successfully Educate Your Clients’ End Users About Cybersecurity

    In the last year, phishing was involved in 93% of successful security breaches. But we shouldn’t point the finger at human error alone. Today’s phishing attacks can be pretty convincing. And, ultimately, we’re all in this together. What your clients really need is a solution that empowers end users to be a strong line of defense. They need cybersecurity awareness training.

  • 10 Reasons MSP Clients Need A Layered Security Strategy To Stay Safe
    10 Reasons MSP Clients Need A Layered Security Strategy To Stay Safe

    They say recognizing a problem is the first step in solving it. Whereas in the past many small to medium-sized businesses (SMBs) didn’t believe they had a cybersecurity problem, today many executives in those businesses know that hackers will focus their attention on and exploit them. Particularly if they don’t have adequate cybersecurity defenses in place. The rampant growth in ransomware and increasing volume and velocity of cyber-attacks has meant the “it won’t happen to me” mentality is at last being left behind.

  • 10 Reasons MSP Success Relies Upon Multi-Vector Security Solutions
    10 Reasons MSP Success Relies Upon Multi-Vector Security Solutions

    “With 7.5 million new malware variants introduced each month,” organizations need to prepare for an all-out war on cyberattacks. Cyber threats are attacking users from multiple angles—or “vectors.” And what’s worse, their attacks can hit in multiple stages. As an MSP, you must leverage solutions that keep users and devices infectionfree across all endpoints. Unfortunately, two-thirds of MSPs are short on qualified IT professionals who can help them ramp up their security offerings. Thankfully, Webroot multi- vector protection can help.

  • Making MSP Security Easier With Machine Learning

    As an MSP or VAR, you’re looking for new ways to improve services without adding overhead. The addition of providing security to your clients is an absolute necessity in today’s threat landscape, but MSPs and VARs need ways to ensure the highest levels of security without draining staff and profits. So, how can artificial intelligence (AI) and machine learning (ML) help?

More Industry Insights

FEATURED PRODUCTS

  • Service Organization: Toolset And Process Optimization
    Service Organization: Toolset And Process Optimization

    Good processes support your team, not stifle them, enabling them to operate at their highest levels.  This is doubly true for managed service providers, where operational efficiency and effectiveness are critical to client retention, team retention, and profitability.

  • Business Improvement Peer Groups
    Business Improvement Peer Groups

    Business Improvement Groups (or BIGs) consist of 10-12 non-competing members. The group will become a close network of advisors that you can call upon when you have any business issue facing you that you would like input from outside the company. Every member signs a non-disclosure agreement, so whatever is said or presented stays within the group.

  • Cash Drawer Caddy™ SP Organizer
    Cash Drawer Caddy™ SP Organizer

    The Caddy™ SP Organizer is a slim profile POS integration tray that brings easy cable routing and organization to APG heavy duty cash drawers.

  • Barracuda Sentinel – MSP
    Barracuda Sentinel – MSP

    Barracuda Sentinel – MSP combines three powerful email protection tools: an artificial intelligence engine, domain fraud visibility, and training simulations. Together, these layers guard against spear phishing, impersonation attempts, business email compromise, and cyber attacks. Barracuda Sentinel – MSP integrates directly with Microsoft Office 365 to help MSPs protect their customers from these personalized attacks in real time, with zero impact on network performance.

More Featured Products