Operations | Monitoring | ITSM | DevOps | Cloud

May 2024

What MDR Means for MSPs with Dave MacKinnon

In this conversation, Dave MacKinnon, Chief Security Officer at N-able, talks to Pete Roythorne about Managed Detection and Response (MDR) and its relevance for MSPs. They explore the differences between MDR and other technologies, the benefits of MDR for MSPs, and the cost effectiveness of implementing MDR. Dave highlights the challenges of building a Security Operations Center (SOC) and emphasizes the importance of technology selection and effective threat detection in MDR.

Two-Way Mac Chat on N-able N-sight

Check out the new two-way chat functionality for Mac devices with N-able Head Nerd Joe Ferla. This powerful new feature allows technicians to communicate seamlessly with end users while performing remote background work, ensuring minimal disruption and maximum productivity. Stay tuned as Joe walks you through the steps to use this feature and highlights its benefits for your daily service delivery.

UniSuper Google Cloud Outage Reveals Need for Keen Backup and DR Planning

Earlier this month, Google Cloud disclosed that it accidentally deleted the account of its customer UniSuper, a $125 billion Australian pension fund. According to a joint statement from Google Cloud and UniSuper, the deletion occurred due to an “inadvertent misconfiguration.” As a result, more than 600,000 pension fund users were unable to access their accounts for over a week. UniSuper had geographical redundancy built into its Google Cloud environment, according to the statement.

How, and Why, We Applied Machine Learning to Cove Continuity, Part 2

If you haven’t already read part 1, click here to do that first. If you look at the screenshots, they’re actually quite simple to understand. Anyone can easily identify whether the OS booted successfully at first glance. Look at the following examples and you’ll see what I mean : So, rather than the existing deterministic method, which relied on indirect evidence, we opted to use machine learning and neural networks to analyze and classify screenshots like a human being.

Using Customer-based Custom Properties in Ncentral

What’s this Paul, are you banging on about Custom Properties in N‑central again? Yes I am. For those of you familiar with my work, you’ll know I’m a big fan of Custom Properties and how they can help expand what you can do in N‑central. But I’ve been thinking about this recently and I found that when I talk about Custom Properties I tend to just focus on what you can do with device-based Custom Properties, which leaves customer-based Custom Properties out in the cold.

Feature Focus - N-central Filters

Join Paul Kelly from the N-able Head Nerds as he showcases the latest enhancements to the filtering options in N-central. Filters are a vital tool for MSPs, enabling the creation of device groups for targeted rules, feature deployments, and automation. In this video, you'll learn how to navigate and utilize these new filter capabilities to streamline your IT management processes. Key topics include.

Cybersecurity Strategies for MSPs: Expert Advice from Chris Krebs & David MacKinnon

An in-depth keynote conversation from N-able's Empower Conference in Frisco, Texas, featuring cybersecurity experts Chris Krebs and David MacKinnon. Moderated by David Weeks, this discussion dives into the latest trends in cybersecurity, the evolving threat landscape for Managed Service Providers (MSPs), and practical advice on building resilient security strategies. Learn how to navigate ransomware threats, understand regulatory impacts, and prepare your organization for future challenges.

The State of M&A, and Centralized vs. Decentralized Acquisitions with Matt Takhar

Explore the reasons behind the decline in global channel M&A activity in 2023 and the increasing number of buyers compared to sellers in this conversation with Matt Takhar, Business Development Director at N-able. Takhar also delves into the factors driving M&A, such as the need for strategic fit and expansion into new markets. The conversation highlights two key models for structuring MSP acquisitions: the centralized model, where the acquired MSP is consolidated into the buyer's brand, and the decentralized model, where the acquired MSP retains its own brand but receives support from the buyer. The pros and cons of each model are discussed, along with the importance of due diligence for both buyers and sellers.

Leveraging Google Business Listings and Reviews to Grow Your MSP

In today’s business environment, much of the success of any MSP relies heavily on their online presence and reputation. This is because the vast majority of business consumers use the internet as their first port of call to discover, research, and select service providers. In this blog, I’m going to look at the pivotal role Google Business Listings can play in this process and how getting reviews for your MSP businesses can help to foster growth and enhance credibility.

How, and why, we applied machine learning to Cove Continuity, part 1

Over the next three blogs, I want to explain how we used machine learning to increase Cove Continuity boot-check accuracy to 99%. Cove Continuity offers the ability to restore source (protected) servers/workstations to virtual machines (VMs) in Hyper-V, ESXi, or Azure. After a VM is restored, Cove performs a boot-check test to prove that the system was properly restored.

Hitting the Right Notes: Luis Giraldo's Path to Advocating for MSPs

In this revealing episode of "Now That's IT," Luis Giraldo, Chief Experience Officer at ScalePad, shares his unique journey from a world-class musician to a revered MSP advocate, discussing cthe pivotal transitions and decisions that shaped his career and how his background in music provided a rhythmic foundation for his innovative approach to MSP advocacy.

PSA, ITSM, or ESM: Choosing the Right Platform for MSPs

Choosing the right management platform is crucial to Managed Service Providers (MSPs) that need to scale their business and improve service delivery. But with options like PSA, ITSM, and ESM available, how do you know which is right for your particular maturity level? In this blog, I want to quickly help you find your level when it comes to service delivery, by breaking things down into three simple stages: Ealy, Developing, and Mature.

Demystifying Zero Trust: Understanding the Zero Trust Security Model

In the previous blog post we looked at why it’s important for MSPs to get to grips with Zero Trust and Zero Trust Network Access, as well as how to explain the benefits to customers. In this post we’re going to take a deeper dive into some of the philosophy and principles behind Zero Trust.

World Password Day: 5 Best Practices for Password Management

In a world where data carries such huge importance, safeguarding sensitive information is critical for all organizations. In our current landscape, where cyber threats lurk around every corner, passwords serve as the frontline defense, shielding both MSPs and their customers from potential breaches and data compromises. World Password Day, is the perfect opportunity for MSPs emphasize the importance of robust password management to their customers.

Four Common MSP Marketing Mistakes and How to Avoid Them

Marketing plays a pivotal role in helping to drive MSP growth and success. Yet, this is something that many MSPs can struggle with and too often find themselves grappling with common marketing mistakes that can hinder their ability to attract and retain clients. From overlooking the importance of a cohesive brand identity to neglecting the power of data-driven decision-making, these are just some of the things that can prove detrimental to an MSP’s bottom line.