Friday, January 31, 2025
Homecyber securityData Protection and Security Ranked Among Top Five Managed Services - Download...

Data Protection and Security Ranked Among Top Five Managed Services – Download Free E-Book

Published on

SIEM as a Service

Follow Us on Google News

Leading cloud backup, recovery and restore software provider Asigra Inc., today highlighted the findings in a new report by IT research firm Enterprise Strategy Group, revealing the activities and traits of successful managed service providers (MSPs), the technologies generating the highest recurring revenues and business practices and delivery models that ensure the highest long-term value of these organizations.

The report, titled “MSP Partner Landscape 2020” details the best practices and actions leading partners take to unlock MSP success.

Also included is how the top vendors serving MSPs structure their offerings, programs, and support in order to help partners succeed.

Finally, the report looks at what is driving partner transformation and revenues in the MSP space, shifting customer preference/consumption patterns, ongoing business viability, and service focus areas.

“Partner-led managed services are here to stay as the industry continues its shift toward subscription products,” said the author of the report, Kevin Rhone, Senior Analyst at ESG. “As detailed in this research, 86% of MSPs believe cloud-based managed services represent a fundamental change in how their business customers are consuming IT solutions.”

The managed services space was forecast by ESG to grow 11.5% CAGR from 2019 through 2024, and to reach $US319B by that year. Forward-looking tech vendors recognize that leading partners have a new set of priorities and challenges when serving customers while maintaining profitability in the transformed world of IT.

Key findings that are summarized in the report include:

• The top five security-related managed services as ranked by MSPs nationally:

1.    Endpoint protection
2.    Network security
3.    Data protection
4.    Cloud security
5.    Authentication

• In terms of the biggest internal challenges for MSPs when selling cloud-based managed services for service providers with more than 10 employees are determining the right pricing levels for different managed services (31%); poor margins on cloud-based managed services (21%); developing and executing successful marketing campaigns (29%); recruiting technical staff with cloud-oriented skills (28%), and customer billing logistics (22%).

•    The biggest external challenges for larger MSPs surrounding the delivery of cloud-based managed services are the resistance of customers to cloud-based managed services (21%); lack of pricing/margin control (27%); competition from other vendors or service providers (18%), and the lack of a centralized portal to managed services from different vendors (24%) and difficulties with getting the right training and enablement from service providers or vendors (21%).

•    Organizational attributes for large MSPs that have the most positive impact on the organization’s profitability include technical support (37%); solutions that fit with the rest of the MSP’s business (34%); fair and competitive vendor pricing (28%); ability to control pricing and margin levels (30%), and the vendor’s web-based partner portal, making it easier to do business.

In addition to building the most profit-optimized subscription-based solutions portfolio, selecting the highest value solution delivery model is especially important. For example, a common cloud brokerage model can place a drain on profits, channel healthy models provide complete control over pricing and margins, limit client communications to the MSPs and ensure greater control over the value of the MSP’s business to ensure strong recurring revenue and greater long-term valuation.

“The report provides important takeaways for both MSPs and the vendors that support them,” said Eran Farajun, EVP, Asigra. “With respect to organizations in the cybersecurity-enabled data protection space, it shows that this segment remains in high demand and in widespread use by MSPs. On the business front, it emphasizes the need for vendors and MSPs to ensure that efficiencies and the enablement of business value are built into the operator’s business.”

Download a detailed eBook summary of the report at no charge by visiting: https://library.asigra.com/c/esg-ebook-managed-services-landscape?x=vr7zfp

To learn more about Asigra, visit:www.asigra.com

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...