We’re thrilled to introduce MSP360 RMM 2.2, the latest version of our remote monitoring and management software. This release brings impactful updates, including the RMM Alert Profiles for streamlined alert configuration and control, the ability to trigger post-actions from alerts, and support for software installation directly from a network share or local disk. It also includes several other enhancements designed to optimize your workflow. Continue reading
Does Your BDR Solution Provide Freedom of Choice in Backup Storage?
Vendor lock-in is a thing of the past. It’s all too easy for MSPs today to discover alternative solutions when they’re determined to cut costs, find better support or track down superior products in the market. MSPs should apply the same line of thought to building backup and disaster recovery (BDR) strategies for their customers. Continue reading
Managed Services Sales Process: What MSPs Need for Success
There’s simply no substitute for the novelty factor in order to generate an “Aha!” moment in whatever you do. Developing a practical sales approach is no exception to this golden rule. Continue reading
Windows Native Backup vs MSP360 Managed Backup
One important step in planning your backup strategy is choosing a backup solution that will fit your needs. It should be compatible with your IT infrastructure and be able to back up all your vital data – not only files and folders, but also system images, servers, etc. In this article, we compare native Windows backup tools and MSP360 Managed Backup. Continue reading
Offering a Cloud-First Bundle Is Key in 2024
Bundling services isn’t a new concept in the IT channel. MSPs have been deploying this pricing strategy successfully for years. But cloud-first bundles, on the other hand, are still relatively new, and many MSPs are struggling with how to offer them. Continue reading
Why You Should Switch from Microsoft RDP to MSP360 Connect
With the number of people working remotely consistently growing, the importance of having a remote desktop solution has grown as well. These solutions have to provide an opportunity to help users in the same way as if the administrator was dealing with the issue in person, as workplaces are often decentralized and specialists might struggle to be in a given place at a given time. Along with this, the remote desktop service has to be secure, as vital data might be transmitted during sessions. Continue reading
SLA vs. SLO vs. SLI: The Difference Explained
As a modern-day managed services provider, you should know that the key is not which services or solutions you provide. It is how you deliver your services. This means that, at any given moment and during the whole lifetime of your company, you should strive towards achieving operational excellence. Continue reading
News You Might’ve Missed. May 2021
What's new this month in the news for MSPs?
Microsoft acquires Linux distribution maker Kinvolk; AWS introduces Saas Boost, an open-source toolkit; AWS launches App Runner for container management; Google and CrowdStrike join hands, and more. Continue reading
6 Crucial Tips for Creating an SLA
A service level agreement, or SLA for short, is one of the contracts between a managed services provider and their client. This contract can either guide your client about the right way to communicate with you or lead you to penalties or court. Continue reading
How to Test Your Backups: A Comprehensive Guide
Some believe that backups are a routine that should be set and forgot about. Such people also believe that ransomware attacks, downtime caused by hardware failures, and human mistakes that lead to data loss are things that happen to people in the news, or topic starters on Reddit – in other words, to someone else. Continue reading
3 Ways to Acquire Your First Three Customers
When you’re starting from scratch, building your customer base takes time. No matter what industry you’re in, a solid customer base doesn’t happen overnight. Continue reading
Types of Malware Attacks MSPs Should Protect Clients From
As MSPs continue to upscale their clients’ cybersecurity resources, cybercriminals are seemingly not taking it lying down. They are, instead, increasingly responding with more sophisticated types of malware attacks. Continue reading