Blog Archives

MSP Requirements of Infrastructure Solution Providers is Different

As we covered in the blog, Managed Service Providers (MSPs) need to choose between being an agent and investing in infrastructure. The agency path may seem tempting at first, but MSPs that want to own the customer relationship and increase

Tagged with: , , , , , , ,
Posted in Blog

The Business of Being an MSP

The business side of being a managed service provider is at least as important as the technology. MSPs need to be careful in who they do business with. They need to take a long term view of their relationships and

Tagged with: , , , , , , ,
Posted in Blog

Agent or Provider? The MSP Conundrum

Managed Service Providers (MSP) have a decision to make, should they be an agent or a provider? Both choices have ramifications on the business both short term and long-term. Understanding the pros and cons of each model is critical in

Tagged with: , , , , , , ,
Posted in Blog

Selecting the Right Service Delivery Model for MSP Services

IT Services Agent or Provider Managed Service Providers (MSP) often become MSPs by evolving from a traditional IT reseller to the more services oriented approach. Other organizations specifically choose to start as MSPs after watching the challenges that traditional IT

Tagged with: , , , , , , ,
Posted in Blog

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

Asigra is Backing up Docker Containers

The first commercial solution designed for backing up containers is here. So the first question is: do you need to back up containers? The answer is really up to you. Whether or not they need backup depends on how you

Tagged with: , , , , , ,
Posted in Blog

Easing Amazon EBS Snapshot Pain, for Free

It’s a major pain to manage snapshots in Amazon Web Services Elastic Block Storage (AWS EBS). It’s essentially a single command line with very limited capabilities. The result is that developers writing applications for AWS find themselves building tools to

Tagged with: , , , ,
Posted in Blog