Operations | Monitoring | ITSM | DevOps | Cloud

N-able

MarketBuilder: Driving your MSP marketing, socials, and more

Please Note: The following article details the experience one of our partners had using MarketBuilder. As such, individual results may vary. When asked about N-able MarketBuilder, George Ioannides’ response is effusive: “I love it.” Although George, who owns Cleveland, Ohio-based MSP, Fidelity Systems, hasn’t yet been able to use MarketBuilder to its full potential, he’s an avid user of its social media and marketing capabilities.

Six Tips to Getting SEO Right For Your MSP

When prospects do a Google search on your MSP, where do they find you? Is your MSP landing on Page 1, or is it being relegated to Page 2 or even worse? According to quicksprout.com, the top result on Google has a 33% chance of getting clicked, and they have found that 75% of people won’t scroll beyond the first page. (I know I never do—if what I’m looking for can’t be found on Page 1, why bother even seeing what is on Page 2?)

MSP Regulations: What legislation exists today and what's on the horizon

Any mature industry, at some point, will be regulated by local, state, or federal laws. Restaurants did not always have to have food safety inspections. Gas stations did not always have to have pumps calibrated and certified. Vehicles have not always required seat belts. As a society, we are well served by these regulations that help keep us safe and protect consumer interests.

Thinking Smarter About M&A-Are you secure?

With the continued focus in our space on the movement from MSP to MSSP, it’s crucial to remember that products alone don’t necessarily make you an MSSP. For smaller customers, although you might be able to provide a range of security solutions (like EDR and backup) and compliment these with an RMM to provide insight and control over end user devices, this is not enough to call yourself an MSSP.

How to develop a successful threat-hunting program

According to the 2021 Cost of Data Breach report, the average attack “dwell time”—the period between an attacker’s breach of an organization’s network and the point at which the organization finds out about it—is 287 days. During this time, the attacker can stealthily look to gather valuable information to steal or compromise data, incurring huge costs for affected companies.

The business case for MSPs adding Mac support

I’ve written extensively about the technical aspects to consider when expanding your horizons and embracing the Mac platform. What I haven’t covered much up to now is why. Why bother learning an entirely new skillset, targeted at supporting a minority platform, when you’ve got your hands full just keeping up with Windows?

Beyond Backup: To data protection, and beyond

A while back, we wrote about the differences between backup and data protection. While the points made there are still valid, the industry’s definitions of these terms have continued to evolve, as has our thinking on the topic. At N-able, we’ve settled on a definition shared by analyst firm William Blair in a recent report: data protection solutions should include backup, disaster recovery, and archiving/retention of backups.