Operations | Monitoring | ITSM | DevOps | Cloud

N-able

TAP Tank-keeping MSPs up-to-date with the latest cool tech and services in our sector

You may have seen we announced recently that we have more than 50 technology providers active within our Technology Alliance Program (TAP). These providers include many well-known technology leaders, like Cisco, Sophos, and Webroot, alongside emerging innovators, including Liongard and Zomentum.

How you can harden your N-central server

My colleague Lewis Pope, our head security herd, wrote an excellent blog last week about hardening N-able™ RMM. I thought it prudent, in light of recent developments, to do the same for the N-able N-central® product. A lot of it is common knowledge, but I wanted to put together a checklist so you can review the security of your N-central platform and ensure you’re meeting some of these best practices.

6 Tips to maximize your use of social selling to generate new leads

I’m a big fan of Saturday Night Live, and one of my most favorite skits is from the 1994/1995 season called Bathroom Monkey with Janeane Garafalo. It’s a fake television ad of a woman sitting on her couch, talking about how difficult it is to keep her bathroom clean. She describes this new product she discovered called “Bathroom Monkey” and how the Bathroom Monkey system can keep her entire bathroom clean for up to eight whole months—and she is loving it.

Introducing MarketBuilder: a new way for MSPs to market their business

Providing exceptional customer service can leave little time for businesses to focus on marketing, which could be why a majority of MSPs rely on word-of-mouth referrals to grow. But relying on word-of-mouth referrals can lead to inconsistent growth, leaving you unable to accurately plan for the future. Marketing, on the other hand, allows you to sell your services with intention—helping you increase revenue by generating more consistent new customer leads and upselling current customers.

Do you reward your staff for doing a great job? The Top MSPs do

One of the top Elite partners I enjoy working with is an MSP based out of White Salmon, Washington called Radcomp. Over the years, I’ve worked closely with their manager of operations, Tyrell Midland. We’ve had all sorts of candid conversations in that time, but one we had last week I thought would make a great blog post.

Kaseya VSA Cyberattack: A Statement on Solidarity from N-able CSO Dave MacKinnon

The recent Kaseya VSA cyberattack is an important reminder of how security works best when we approach it as a community. The adversarial pivot to supply chain-based attacks for delivering ransomware underscore the role we all must play in helping to keep each other protected.

Hardening N-able RMM

When security is done well it’s not always convenient. Advanced security can sometimes even mean minor inconveniences to MSPs and their employees. But the rise in ransomware attacks requires improved security measures and harder environments, making small inconveniences worth it in the long run. In this blog I’ll look at some options for how you can harden your N-able™ RMM dashboard.

Gain peace of mind and leave backup complexity behind

Fast, reliable recovery is the whole reason we do backups in the first place. But the complexity of managing multiple backup products, juggling ever-growing local storage, keeping backup chains error free, and coordinating off-site backup storage can have a negative impact on the reliability that brings peace of mind. The more staff, people, and vendors are involved, the less likely your process will be consistent and error-free.

The Big Book of Selling Data Protection Ebook

If your SMBs don't seem to care about their backup solution, change the conversation to one about data protection to help increase recurring revenue. Painting a picture of the cost a worst-case scenario would have on your customer's business can help drive them to sign up for proactive, managed data protection services. Comprehensive data protection services can include safeguarding your customer's data against compromise and accidental loss. This helps ensure their data is immediately recoverable with minimal downtime while providing personalized services with data security, privacy, and legal requirements in mind.