Monday, July 15, 2024

Data Protection and Security Ranked Among Top Five Managed Services – Download Free E-Book

Leading cloud backup, recovery and restore software provider Asigra Inc., today highlighted the findings in a new report by IT research firm Enterprise Strategy Group, revealing the activities and traits of successful managed service providers (MSPs), the technologies generating the highest recurring revenues and business practices and delivery models that ensure the highest long-term value of these organizations.

The report, titled “MSP Partner Landscape 2020” details the best practices and actions leading partners take to unlock MSP success.

Also included is how the top vendors serving MSPs structure their offerings, programs, and support in order to help partners succeed.

Finally, the report looks at what is driving partner transformation and revenues in the MSP space, shifting customer preference/consumption patterns, ongoing business viability, and service focus areas.

“Partner-led managed services are here to stay as the industry continues its shift toward subscription products,” said the author of the report, Kevin Rhone, Senior Analyst at ESG. “As detailed in this research, 86% of MSPs believe cloud-based managed services represent a fundamental change in how their business customers are consuming IT solutions.”

The managed services space was forecast by ESG to grow 11.5% CAGR from 2019 through 2024, and to reach $US319B by that year. Forward-looking tech vendors recognize that leading partners have a new set of priorities and challenges when serving customers while maintaining profitability in the transformed world of IT.

Key findings that are summarized in the report include:

• The top five security-related managed services as ranked by MSPs nationally:

1.    Endpoint protection
2.    Network security
3.    Data protection
4.    Cloud security
5.    Authentication

• In terms of the biggest internal challenges for MSPs when selling cloud-based managed services for service providers with more than 10 employees are determining the right pricing levels for different managed services (31%); poor margins on cloud-based managed services (21%); developing and executing successful marketing campaigns (29%); recruiting technical staff with cloud-oriented skills (28%), and customer billing logistics (22%).

•    The biggest external challenges for larger MSPs surrounding the delivery of cloud-based managed services are the resistance of customers to cloud-based managed services (21%); lack of pricing/margin control (27%); competition from other vendors or service providers (18%), and the lack of a centralized portal to managed services from different vendors (24%) and difficulties with getting the right training and enablement from service providers or vendors (21%).

•    Organizational attributes for large MSPs that have the most positive impact on the organization’s profitability include technical support (37%); solutions that fit with the rest of the MSP’s business (34%); fair and competitive vendor pricing (28%); ability to control pricing and margin levels (30%), and the vendor’s web-based partner portal, making it easier to do business.

In addition to building the most profit-optimized subscription-based solutions portfolio, selecting the highest value solution delivery model is especially important. For example, a common cloud brokerage model can place a drain on profits, channel healthy models provide complete control over pricing and margins, limit client communications to the MSPs and ensure greater control over the value of the MSP’s business to ensure strong recurring revenue and greater long-term valuation.

“The report provides important takeaways for both MSPs and the vendors that support them,” said Eran Farajun, EVP, Asigra. “With respect to organizations in the cybersecurity-enabled data protection space, it shows that this segment remains in high demand and in widespread use by MSPs. On the business front, it emphasizes the need for vendors and MSPs to ensure that efficiencies and the enablement of business value are built into the operator’s business.”

Download a detailed eBook summary of the report at no charge by visiting:

To learn more about Asigra,

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles