SolarWinds MSP Blog en 1440 How Does LDAP Authentication Work? <p><p>&lt;p&gt;Today’s businesses rely on a growing list of professional applications to support mission-critical operations. In fact, &lt;a href=&quot;<a href=";&gt;&lt;em&gt;The">…</a> Wall Street Journal&lt;/em&gt;&lt;/a&gt; reports that 10% of businesses now have more than 200 applications in their tech stack, with figures for both small and large organizations rising in recent years.</p> <a href="/blog/how-ldap-authentication-works" hreflang="en">Read More</a> Fri, 24 Jan 2020 00:30:37 +0000 SolarWinds MSP Kerberos Authentication Process Explained <p><p>&lt;p&gt;In Greek mythology, Kerberos (or Cerberus) is a frightening-looking dog with multiple heads and fangs capable of slicing through human bone. Kerberos is famous for guarding the gates of the underworld to prevent the dead from leaving. Until Kerberos’ capture by the divine hero Heracles, the dog’s tenacious patrol let no soul pass into the world of the living.&lt;/p&gt;</p></p> <a href="/blog/kerberos-authentication" hreflang="en">Read More</a> Thu, 23 Jan 2020 20:00:00 +0000 SolarWinds MSP Why MSPs’ Security Keeps Me Up at Night <p><p>&lt;p&gt;For at least a few years now, the press has rightly brought attention to the fact that small-to-midsized businesses (SMBs) have increasingly become targets for cybercriminal activity. SMBs often contain valuable data, yet rarely have the security controls available to their enterprise counterparts.&lt;/p&gt;</p></p> <a href="/blog/why-msps-security-keeps-me-night" hreflang="en">Read More</a> Wed, 22 Jan 2020 21:29:42 +0000 Tim Brown Is Backup Wasting Your Time and Costing You Money? <p><p>&lt;p&gt;There’s an old adage that “time is money,” and nowhere is this truer than in the world of managed IT service providers. When you sell professional services and expertise, every wasted minute is a lost revenue opportunity.&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;How many hours are you wasting on a needlessly complex backup setup? Here are some things to consider:&lt;/p&gt;</p> </p> <a href="/blog/backup-wasting-your-time-and-costing-you-money" hreflang="en">Read More</a> Tue, 21 Jan 2020 21:22:48 +0000 Carrie Reber Understanding Single Sign-On Authentication <p><p>&lt;p&gt;Single sign-on (SSO) solutions are an increasingly popular system for managing digital identity in medium and large enterprises. But what exactly is it, and how does it work? In the following article, we’ll look at the basics of how SSO can help manage user access and explore SSO’s many advantages for managed services providers (MSPs).&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;What Is Single Sign-On Authentication?&lt;/b&gt;&lt;/h3&gt;</p></p> <a href="/blog/single-sign-on-authentication" hreflang="en">Read More</a> Mon, 20 Jan 2020 20:50:43 +0000 SolarWinds MSP 3 Takeaways from FireEye’s 2020 Predictions Report <p><p>&lt;p&gt;The security industry publishes reports on threats, trends, and other topics several times each year. It’s hard enough keeping up with the everyday demands required of managed services providers (MSPs)—trying to stay in the loop on these reports can be a nightmare. So I want to make things easier on you by giving you the highlights—and what I think it means for you on a practical level.&lt;/p&gt;</p></p> <a href="/blog/3-takeaways-fireeyes-2020-predictions-report" hreflang="en">Read More</a> Fri, 17 Jan 2020 20:00:00 +0000 Tim Brown What Skills Levels Should You Hire at and When? <p><p>&lt;p&gt;There is no one-size-fits-all answer to the above title question. However, we &lt;i&gt;can &lt;/i&gt;provide some tips to help you figure out what works best for you.&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;There are two main things to consider:&amp;nbsp;&lt;/p&gt;</p> <p>&lt;ul&gt;<br /> &lt;li&gt;Where is your gap?&lt;/li&gt;<br /> &lt;li&gt;What are your resources?&lt;/li&gt;<br /> &lt;/ul&gt;</p></p> <a href="/blog/what-skills-levels-should-you-hire-and-when" hreflang="en">Read More</a> Thu, 16 Jan 2020 20:27:01 +0000 Eric Anthony SNMP Monitoring and Management <p><p>&lt;p&gt;As a managed services provider (MSP), you need fast, remote access to your customers’ networks and accurate insights into their infrastructure—enter Simple Network Management Protocol (SNMP).&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/snmp-monitoring-and-management" hreflang="en">Read More</a> Thu, 16 Jan 2020 00:00:00 +0000 SolarWinds MSP How to Move Up the Automation Maturity Model <p><p>&lt;p&gt;In a recent blog, &lt;a href=&quot;<a href=";quot">…</a>; target=&quot;_blank&quot;&gt;Upgrading PowerShell and Automation in 2019&lt;/a&gt;, I talked about how automation has evolved and how I see our partners fitting into four different categories with respect to their automation maturity.</p> <a href="/blog/how-move-automation-maturity-model" hreflang="en">Read More</a> Wed, 15 Jan 2020 17:45:35 +0000 Marc-Andre Tanguay Data Deduplication Overview <p><p>&lt;p&gt;Backup technology has seen a huge number of advancements over the past couple of decades, but few have been as significant as the development of data deduplication. Data deduplication, which removes duplicates of data entries to save storage space, has been around in some form since the 1970s. At that time, redundant data was identified by clerks who went through data line by line, manually searching for duplicates.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/data-deduplication-overview" hreflang="en">Read More</a> Tue, 14 Jan 2020 20:00:00 +0000 SolarWinds MSP Department of Homeland Security Issues Emergency Directive for Microsoft Critical Vulnerabilities <p><p>&lt;p&gt;Today Microsoft released several patches to address critical vulnerabilities. Several were of enough concern to prompt the Department of Homeland Security to issue an &lt;a href=&quot;<a href=";&gt;Emergency">;&gt;Emergency</a> Directive&lt;/a&gt; ordering all Federal agencies to patch these vulnerabilities within the next ten days.&lt;/p&gt;</p> <p>&lt;p&gt;The vulnerabilities are found in the Windows CryptoAPI, as well as Remote Desktop Protocol (RDP) on both RDP Gateway Servers and RDP Clients.&lt;/p&gt;</p></p> <a href="/blog/department-homeland-security-issues-emergency-directive-microsoft-critical-vulnerabilities" hreflang="en">Read More</a> Tue, 14 Jan 2020 14:00:00 +0000 Gill Langston IT Infrastructure Monitoring <p><p>&lt;p&gt;IT infrastructure monitoring is the unsung hero of the modern workplace. It’s a hero because it sustains our technology systems in ways that allow them to function continuously, reliably, and seamlessly. It’s unsung because most employees don’t notice it, so long as the technologies they rely on continue to work without interruption.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/data-deduplication" hreflang="en">Read More</a> Mon, 13 Jan 2020 20:00:00 +0000 SolarWinds MSP Take a Flexible Approach to Data Protection This Year <p><p>&lt;p&gt;The new year means it’s time to take a fresh look at the state of your data protection. Sure, you take backups—but how confident are you that your customers’ data is truly protected and quickly recoverable in the event of a ransomware attack, disaster, or user error? And how many hours are you spending every week to maintain the status quo?&lt;/p&gt;</p></p> <a href="/blog/take-flexible-approach-data-protection-year" hreflang="en">Read More</a> Fri, 10 Jan 2020 20:00:00 +0000 Carrie Reber How Do You Get Your Customer to Buy into Hardware Upgrades <p><p>&lt;p&gt;In general, there are two reasons to upgrade or replace hardware outside of a direct customer request; the first is performance and the second is security. Performance issues cause losses in productivity that, if not quantified, the business owner may not realize how much they’re losing. Security is top of mind for many business owners today, but it may still be hard to justify the expense. So how do you effectively communicate the need to the business owner?&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;Quantifying Performance Issues&lt;/b&gt;&lt;/h3&gt;</p></p> <a href="/blog/how-do-you-get-your-customer-buy-hardware-upgrades" hreflang="en">Read More</a> Wed, 08 Jan 2020 15:00:00 +0000 Eric Anthony Converged IT Infrastructure Overview and Benefits <p><p>&lt;p&gt;The history of converged systems proves everything old becomes new again. The most popular data management systems started out as single, unified mainframes before the prevailing trend shifted and data management became decentralized in the 1980s and 1990s. In 2008, Oracle reinvigorated the converged infrastructure era when it debuted its HP Oracle Database Machine—and managed services providers (MSPs) have never looked back.&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/converged-it-infrastructure" hreflang="en">Read More</a> Tue, 07 Jan 2020 15:00:00 +0000 SolarWinds MSP AD vs. LDAP: What's the Difference? <p><p>&lt;p&gt;For managed services providers (MSPs), Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) are kitchen sink terms. So common and familiar are they that we rarely bother to discuss their functions and how to use them most effectively. This is unfortunate, if for no other reason than the fact that AD and LDAP are critical to all the work that we do as IT experts—within our own organizations and with our customers.</p> <a href="/blog/difference-between-ldap-ad" hreflang="en">Read More</a> Mon, 06 Jan 2020 15:00:00 +0000 SolarWinds MSP Are Your Mobile Devices Making You Vulnerable to Email Threats? <p><p>&lt;p&gt;In our previous blog we covered &lt;a href=&quot;<a href=";quot">…</a>; target=&quot;_blank&quot;&gt;Top Social Engineering Techniques Trending on Email&lt;/a&gt;. We continue to see that email remains the number one attack vector for businesses. According to a study by 451 Research, email security is the biggest problem we’re not paying attention to.</p> <a href="/blog/are-your-mobile-devices-making-you-vulnerable-email-threats" hreflang="en">Read More</a> Fri, 03 Jan 2020 15:42:26 +0000 Mia Thompson How to Offboard a Customer <p><p>&lt;p&gt;During the life of your MSP, there will come a time when you need to offboard a customer. There are a variety of reasons why, but regardless of the circumstances, a well-orchestrated transfer makes you look professional and leaves the door open for the future.&amp;nbsp;&lt;/p&gt;</p> <p>&lt;p&gt;So, what can you do to make sure you are offboarding well?&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;What are the Risks?&lt;/b&gt;&lt;/h3&gt;</p> </p> <a href="/blog/how-offboard-customer" hreflang="en">Read More</a> Thu, 02 Jan 2020 15:00:00 +0000 Eric Anthony How Does Ransomware Spread? <p><p>&lt;p&gt;Today’s managed services providers (MSPs) face an increasingly sophisticated cybercriminal landscape. As the Internet of Things (IoT) and BYOD policies grow in popularity in the workplace, and as business networks become more complex, MSPs trusted with the security of their customers’ networks need to stay ahead of the curve when it comes to bad actors and the types of malware they deploy.&lt;/p&gt;</p> <p>&lt;h3&gt;&lt;b&gt;The History of Ransomware&lt;/b&gt;&lt;/h3&gt;</p></p> <a href="/blog/how-does-ransomware-spread" hreflang="en">Read More</a> Tue, 31 Dec 2019 15:00:00 +0000 SolarWinds MSP Best Practices SIEM: Educational Series Part 1 <p><p>&lt;p&gt;Security has become a critical part of daily life, requiring constant focus on protection to safeguard intellectual property and business data. The ever-evolving cyberthreat landscape requires businesses to put sophisticated cybersecurity defenses in place to help keep the bad guys out. But what do these defenses look like and how should managed services providers (MSPs) deploy advanced security services?&amp;nbsp;&lt;/p&gt;</p></p> <a href="/blog/best-practices-siem-educational-series-part-1-0" hreflang="en">Read More</a> Mon, 30 Dec 2019 15:00:00 +0000 Mia Thompson