Operations | Monitoring | ITSM | DevOps | Cloud

N-able

N-able Backup and Other Keys to Our Success: Lionel Naidoo of Dragon Information Systems

N-able™ Backup has provided a refreshing take on backup and disaster recovery, as Dragon IS Director Lionel Naidoo learned firsthand. By looking beyond the traditional legacy backup solutions on the market, Dragon uncovered a golden nugget in N-able Backup.

N-able Backup and Other Keys to Our Success: Nicholas Paulukow, One2One

N-able™ Backup has proven to make a real difference in the efficiency and profitability of managed IT services provider One2One. Hear from One2One CEO Nicholas Paulukow about how the company dramatically reduced the staff time and cost needed to provide top-tier data protection services by switching to N-able Backup.

"I love it when a plan comes together"-the questions to ask your customers before the next software vulnerability

I’m probably dating myself, but I used to love the television show The A-Team when I was little. Every week, the team would be put into the middle of a problem and work together to overcome some challenge. Plus, they had Mr. T and a really cool van.

15 tips on how to market effectively when you're an MSP of one, part 1

With the end of another year, and a bright, shiny new year just ahead, many businesses take stock to reflect on their accomplishments and what they still need to do. In this vein, I have been getting quite a few questions lately about marketing and lead generation—specifically, how to conduct marketing when the MSP is small, without a lot of time or money to devote to such an initiative.

Cove Data Protection and Other Keys to Our Success: Vincent de Beer of Silverbug

N-able™ Backup offers a brilliant solution to a fairly old problem, according to Silverbug Chief Operations Officer Vincent de Beer. The cloud-first innovation from N-able has made a real difference for managed IT service provider Silverbug and its customers.

Business continuity after a ransomware attack: the case for end-to-end encryption

Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there’s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she’ll demand to know how you let her business be vulnerable to this attack. You had installed firewalls, required strong passwords, and conducted email phishing drills—and still your customer was attacked.