Aller au contenu principal
SolarWinds MSP
  • Connexion
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
    • Deutsch
    • English
    • Español
    • Italiano
    • Português
    • de
    • en
    • es
    • it
    • pt
SolarWinds MSP
  • Produits
    • SolarWinds N-central Automatisez ce qui peut l’être. Attaquez-vous aux réseaux complexes. Essayez cette solution de surveillance et de gestion à distance conçue pour optimiser l’efficacité et évoluer.
    • SolarWinds RMM Commencez rapidement. Évoluez à votre rythme. Essayez cette solution simple de surveillance et de gestion à distance.
    • SolarWinds EDR Defend against ransomware, zero-day attacks, and evolving online threats with Endpoint Detection and Response
    • SolarWinds Backup Gérez la protection des données des serveurs, des applications des stations de travail, des documents et de Microsoft 365 dans un tableau de bord SaaS.
    • Protection et archivage des messages Protégez les utilisateurs contre les menaces véhiculées par e-mail et les temps d’arrêt.
    • Gestion de mot de passe Adoptez et déployez facilement des flux de travail de gestion des mots de passe et de la documentation conformes aux pratiques conseillées.
      • Passportal Demo
    • Automatisation des services professionnels et génération de tickets Gérez la génération de tickets, de rapports et de documents de facturation pour améliorer l'efficacité du support technique.
    • Support à distance Dispensez du support à vos clients et dépannez leurs périphériques avec des outils de support à distance puissants et rapides.
  • Solutions

    Je cherche...

    • Solutions de sécurité
    • Solutions de supervision
    • Solutions d’efficacité
  • Ressources
    • Blog
    • Webcasts & Events
    • Ask the N-central Experts
    • Daily Live Demos
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webinars
    • Resource Center
    • COVID-19 Resources
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • À propos
    • Contactez-nous
    • Customer Success
    • Ventes et support au niveau international
    • Carrières
    • Récompenses et reconnaissance
    • Demander un devis
    • Salle de Presse
      • Communiqués de presse
      • Actualité
      • Contacts médias
      • COVID-19 Response
    • Équipe dirigeante
    • Mentions légales
      • Politique d’utilisation des cookies
      • Confidentialité
      • Software Services Agreement
      • Conditions d’utilisation
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • IT Departments
  • Nous contacter
    • Obtenir un devis
    • Question générale
  • DÉMARRER UN ESSAI GRATUIT
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds N-central
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Accueil Ressources Rechercher
Found 134 results

EDR or Antivirus: Which Solution Is Right for You?

EDR or Antivirus: Which Solution Is Right for You?
eBooks

When it comes to protecting endpoints from cyberthreats, two main options include antivirus (AV) and endpoint detection and response (EDR) solutions. While both have their place, you’ll often have to choose one or the other, as they tend to compete for resources.

Pelycon Technologies

Pelycon Technologies Case Study
Case Studies

With more and more end users working from home, using a robust remote control support tool is a must. Michael Lynn and his partners at Pelycon Technologies knew this and found exactly what they were looking for with SolarWinds® Take Control. Take Control gave them the ability to offer instant IT support to clients—increasing productivity, satisfaction, and trust.

Calvin Wong, Troppus IT & Management

Calvin Wong, Troppus IT & Management Case Study
Case Studies

Email is a key vector for cybersecurity threats, and with more clients moving to cloud-based solutions, it’s important to have the best email security solution to help safeguard your end users.

Changing Backup Solutions: A Guide to Your Options

Changing Backup Solutions: A Guide to Your Options
White Papers

As you grow and expand your service offering, it’s important to support profitability and efficiency in every area of your business—including data protection. The right system could help save your technicians hours of work each week, freeing them up to work on more lucrative projects.

SolarWinds EDR Rollback: A Cybersecurity Time Machine

SolarWinds EDR Rollback: A Cybersecurity Time Machine
eBooks

Ransomware threats have been a scourge on business for years now. A successful attack can take a business offline for a while—and potentially cause them to lose money paying a ransom if they can’t recover their data. To keep customers happy, your goal should be to get them up and running as soon as possible.

EDR vs AV: What You Need to Know

EDR vs AV: What You Need to Know
eBooks

When it comes to security, the battle is often won or lost at the endpoint. When it comes to endpoint security, you often hear about two main solutions—antivirus (AV) and endpoint detection and response (EDR). While both play their part, they do compete for resources on an endpoint, so you will need to make a choice. But how do you choose?

Resilient Business Systems

Resilient Business Systems
Case Studies

Beginning as a family business, Resilient Business Systems has operated for more than 15 years. From day one, they emphasized meeting their customers’ needs and focused on removing barriers. Because of this “customer-first” mentality, they chose SolarWinds® Take Control for their remote support tools.

Traditional Antivirus vs Endpoint Detection and Response: Which Is for You?

Traditional Antivirus vs Endpoint Detection and Response: Which Is for You?
eBooks

Cybercriminals continue to innovate their cyberthreat tactics. Protecting customers requires a good layered security strategy. Central to that strategy involves protecting your customers’ endpoints from threats.

Endpoint Detection and Response Demystified

Endpoint Detection and Response Demystified
eBooks

For years, cybercriminals have worked to circumvent traditional security measures. Finding loopholes in defenses, flaws in systems, or new means of attack means they can turn a profit for their cybercriminal activities. As a result, cyberthreats continuously evolve, often faster than humans can keep up.

Five Cyberthreats that Slip Past Traditional Antivirus

Five Cyberthreats that Slip Past Traditional Antivirus
eBooks

It’s important to provide your customers with the best defense against cybersecurity threats. Unfortunately, traditional antivirus programs operating on signatures can’t adequately defend against some of the most hazardous cyberthreats. To protect against modern threats, MSPs need to take a layered approach to security.

2018 Trends in European Managed Services

Report on tablet
White Papers
.node--type-resource-download-form .field--name-field-resource-type, .node--type-resource-download-form #logic-blogs-breadcrumbs, .node.node--type-resource-download-form .field--name-node-title { display: none; }

2018 Trends in European Managed Services

-->

January 2019

Managed IT services continue to

2018 Trends in North America Managed Services

Report on a Tablet
White Papers
.node--type-resource-download-form .field--name-field-resource-type, .node--type-resource-download-form #logic-blogs-breadcrumbs, .node.node--type-resource-download-form .field--name-node-title { display: none; }

2018 Trends in North American Managed Services

-->

January 2019

For more than a decade, t

East Texas Council of Governments Protects Data with SolarWinds Backup

East Texas Council of Governments Protects Data with SolarWinds Backup
Case Studies

The East Texas Council of Governments (ETCOG) is a voluntary association that serves governmental agencies over a 14-county territory. With some servers located more than an hour away, the ability to work remotely is extremely important to the ETCOG IT staff.

IT Security 101: Think like a Cybercriminal

Hooded character with a laptop
eBooks
And get there before they do!

MSP Q&A: Bart Zub, Digimite Technology

MSP Q&A: Bart Zub, Digimite Technology
Case Studies

Digimite Technology is a successful managed services provider with more than 15 years in the business. Over time, they’ve honed their practices and achieved growth through a mixture of hiring great people and treating them well, and in turn, providing outstanding service that wins them referrals.

Seven Reasons to Back Up Microsoft 365 Data

Seven Reasons to Back Up Microsoft 365 Data
eBooks

Businesses are increasingly turning to cloud services for their critical business operations, and Microsoft 365™ is quickly becoming the industry standard for email, productivity software, and collaboration tools. But no service is infallible—even Microsoft 365 can be vulnerable to cyberthreats or downtime events.

Protecting Microsoft 365 with Mail Assure

Protecting Microsoft 365 with Mail Assure
eBooks

Microsoft 365 is fast becoming the de facto standard for business email communications. And while this provides a lot of convenience for companies, this also makes it an attractive target for cybercriminals. With email being mission-critical for businesses, it makes sense to fortify your Microsoft 365 email security with additional protection.

Patrolling the New Perimeter: Cybersecurity in the New Era of Remote Work

Patrolling the New Perimeter: Cybersecurity in the New Era of Remote Work
eBooks

Over time, the IT world has grown increasingly complex. Years ago, most employees worked within an office, giving IT teams and IT providers greater control of what goes on and off the network. They could think in terms of perimeter-based security—a model where you set up your defenses to protect against threats external to a corporate network in a build. 

The Cybersecurity Blueprint

The Cybersecurity Blueprint
White Papers

As the general public grows increasingly conscious of cybersecurity issues due to data breach headlines, businesses have responded by placing an increased emphasis on their security. This is good news for IT services providers who can help meet this heightened demand.

PCnet Case Study

PCnet Case Study
Case Studies

PCnet, an IT service provider based in Wichita, Texas, uses SolarWinds® Endpoint Detection and Response (EDR) to help their customers improve security. While many customers have replaced their AV with SolarWinds EDR, some customers remained hesitant.

Email Security Guide

Email Security Guide
eBooks
Companies face a constant barrage of spam, viruses, and other malware that can cause significant business harm — ranging from impaired productivity to lost business and brand damage. No business can afford to operate without an email security strategy. This free security guide looks at email security for mid-sized businesses.

MSP Pricing Guide

Work colleagues looking at a screen with pens in hand
White Papers
A mindful approach to making pricing decisions.

OryxAlign

OryxAlign Case Study
Case Studies

As your business grows, you’ll likely experience a substantial increase in service tickets related to password management. Securely and efficiently managing passwords and client information is time-consuming when a team of technicians must do it—across multiple customer environments.

5 Best Practices For Onboarding New Customers

5 Best Practices For Onboarding New Customers
eBooks

Earning new customer business is hard work—so don’t let it go to waste by starting out on the wrong foot. Make a great first impression by nailing the onboarding process. Our eBook gives you five practical tips to ensure your onboarding strategy is smooth and sets the right tone from the very beginning.

5 Cyberthreats that Slip Past Traditional Antivirus

5 Cyberthreats that Slip Past Traditional Antivirus
eBooks

As an MSP, you want to provide your customers with the best defense against cybersecurity threats.  Unfortunately, traditional antivirus programs that operate on signatures cannot adequately defend against some of the most hazardous cyberthreats. To protect against modern threats, MSPs need to take a layered approach to security.

  • Load More

Resource Type

  • ebooks
  • white papers
  • case studies
SolarWinds MSP

Produits
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Nos solutions pour les MSP
  • Manage my IT Department More Efficiently
  • Sécurité multicouche
  • Solution multiplateforme
  • Informations issues de l'analyse des données
À propos
  • À propos
  • Carrières
  • Salle de presse
  • Équipe dirigeante
  • Événements à venir
  • Préférences d'abonnement
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • MSP Anywhere Téléchargements
  • Backup & Recovery Téléchargements
  • État des services

Footer 2

  • Documents juridiques
  • Confidentialité
  • California Privacy Rights
  • Sécurité
  • Plan du site

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
Tous droits réservés.