MSP business strategy
News and features on all aspects of running a service provider business, from executing an MSP business model to automating operations.
Top Stories
-
News
27 Sep 2024
Hyperscalers' mass, AI role dominate partner ecosystems
Seemingly saturated, the massive partner networks of the top cloud vendors still attract service providers and often serve as their top ecosystems, according to a new survey. Continue Reading
By- John Moore, Industry Editor
-
Feature
20 Sep 2024
FinOps consulting grows as IT cost management efforts expand
IT service providers pursue advisory, training and automation opportunities as customers adopt FinOps and apply its cost optimization principles across more IT resources. Continue Reading
By- John Moore, Industry Editor
-
News
10 Nov 2017
IT Nation 2017: ConnectWise sets sights on a 'connected ecosystem'
At its annual partner conference, PSA software vendor ConnectWise said it aims to build out its ecosystem of integrated vendors and highlighted its recently announced alliance with Cisco. Continue Reading
By- Spencer Smith, Site Editor
-
Blog Post
19 Sep 2017
Former president Clinton shares advice at Autotask Community Live
At the Autotask Community Live 2017 conference this week, managed service providers got some words of advice from former president Bill Clinton. Clinton, the 42nd president who was in office from ... Continue Reading
By- John Moore, Industry Editor
-
News
19 Sep 2017
Autotask Community Live 2017: MSP tools meet transformation
Autotask discussed digital transformation, product line unification and technology roadmaps at the company's annual meeting for service providers. Continue Reading
By- John Moore, Industry Editor
-
News
13 Jun 2017
DDoS report shows spike in attacks. Will channel opportunities follow?
Channel partners have more than ransomware attacks to consider in the cybersecurity field. A newly released report points to a rising tide of DDoS activity. Continue Reading
-
Feature
05 Jun 2017
How to start a cloud business: A channel partner guide
Channel companies entering the cloud computing business must prepare for a subscription-based revenue model, cultivate partnerships and differentiate their services. Continue Reading
By -
Feature
12 Apr 2017
Recruitment techniques for IT channel companies
Channel firms must rethink their recruitment techniques to win in today's competitive job market. Get tips for updating your channel recruitment strategy and retaining talent. Continue Reading
By -
Answer
06 Apr 2017
How to protect your clients from ransomware infections
Client education, advanced endpoint protection and image-based backups are some of the steps channel partners can encourage customers to take to thwart ransomware. Continue Reading
By- Scott Beck, BeckTek
-
News
28 Mar 2017
MSPWorld 2017: MSPs can't ignore cybersecurity market
Throughout the MSPWorld 2017 conference, speakers looked to drive home the message that MSPs must focus on security issues and protect customer data. Continue Reading
By- Spencer Smith, Site Editor
-
Feature
29 Dec 2016
The Trump economy: IT channel weighs business opportunities for 2017
What's ahead for channel businesses? According to industry experts, the channel should prepare for significant changes. Continue Reading
By- Spencer Smith and John Moore
-
News
11 Nov 2016
ConnectWise software takes strides toward a unified suite
ConnectWise unveiled an integrated user interface, a software rebranding initiative and a number of new product features during its annual channel partner meeting, IT Nation. Continue Reading
By- John Moore, Industry Editor
-
Feature
13 Sep 2016
Business influencers: What guides your IT channel decisions?
Channel executives are responsible for making tough decisions that impact the fates of their companies. We asked a few company chiefs to name the top influencers that shape their leadership. Continue Reading
By -
Opinion
09 Sep 2016
IT security strategy: Help clients build these three pillars
User education, access management and data backup are the three pillars of a sound security strategy that partners should build and reinforce for their customers. Continue Reading
By- Joshua Smith
-
Blog Post
15 Aug 2016
Trace3 grows its innovation research program
Trace3 is growing its innovation research program, which aims to help CIOs obtain early access to emerging technologies. Continue Reading
By- John Moore, Industry Editor
-
Blog Post
09 Aug 2016
Partner-to-partner: Teaming with peers to grow a channel business
Partner-to-partner collaboration can help channel companies deliver more complex offerings and address customers' pressing business problems, according to Tiffani Bova. Continue Reading
By- John Moore, Industry Editor
-
News
05 Aug 2016
ChannelCon 2016: Cloud and data protection moves at CompTIA show
Vendors in the cloud and data protection markets were among the partner-oriented companies making moves at CompTIA ChannelCon 2016. Continue Reading
By- John Moore, Industry Editor
-
Tip
28 Jul 2016
Building a partnership: How to link up with other service providers
Partnering with your fellow IT service providers can help expand the services you offer clients without incurring the cost of hiring and retaining talent. Continue Reading
By- Stanley Louissaint, Fluid Designs Inc.
-
News
12 Jul 2016
Azure partners cite platform's maturity at WPC 16
Channel partners at Microsoft's Worldwide Partner Conference suggested Azure is moving into a more mature phase in which it is seeing more interest among customers. Continue Reading
By- John Moore, Industry Editor
-
Blog Post
11 May 2016
Key Channel Market Trends: 2016
As midyear approaches, there are several channel market trends-- from DRaaS to compliance -- shaping the partner landscape in 2016. Continue Reading
By- John Moore, Industry Editor
-
News
29 Apr 2016
CompTIA: IT industry business confidence dips in Q2
CompTIA's business confidence index saw a slight decline in Q2, but most companies surveyed say they are on track to meet their 2016 revenue objectives. Continue Reading
By- John Moore, Industry Editor
-
News
01 Apr 2016
IT automation software: Atera offers all-in-one MSP platform
Atera targets MSPs with a platform that incorporates remote control, remote monitoring and management, and professional services automation; more IT channel news from the week. Continue Reading
By- John Moore, Industry Editor
-
News
23 Mar 2016
CompTIA Channel Standards program takes on business best practices
CompTIA will roll out a free program that helps IT industry companies adopt business best practices. Continue Reading
By- Spencer Smith, Site Editor
-
News
01 Feb 2016
Vendor training, certification gets new twist at Atrion
In a departure from typical vendor relations scenarios, Atrion, a consulting and managed services firm, is asking vendors to certify themselves in a reciprocal loyalty program. Continue Reading
By- Lynn Haber, Senior Writer
-
News
12 Jan 2016
Autotask survey: IT service providers experiencing growth
IT service providers are recruiting personnel, as demands for endpoint management and other managed services increase, according to an Autotask survey. Continue Reading
By- John Moore, Industry Editor
-
Blog Post
23 Dec 2015
FASB lease accounting changes to impact channel
FASB lease accounting changes will impact channel partners involved in IT leasing. Managed services could get a boost from the new standard. Continue Reading
By- John Moore, Industry Editor
-
Feature
14 Dec 2015
2016 channel trends: Digital transformation to alter relationships
A look ahead: Digital transformation trends will persist into 2016, impacting channel shops, their vendor partners and end clients. Notable techs will include cloud, security and IoT. Continue Reading
By- Lynn Haber, Senior Writer
-
News
23 Oct 2015
MSPWorld 2015 spotlights MSP sales craft
What makes a good MSP salesperson? How should you compensate sales staff? Execs tackled these and other MSP sales-related questions at MSPWorld this week; plus, more channel news. Continue Reading
By- Spencer Smith, Site Editor
-
Feature
27 Jul 2015
Managed services business model relies on careful client acquisitions
When it comes to customer acquisitions, MSPs have to be particularly selective. Learn best practices to steer clear of bad clients and wasted time. Continue Reading
By- Spencer Smith, Site Editor
-
Tip
14 May 2015
Five pitfalls in the merger and acquisition process
Channel partners working through the merger and acquisition process must deal with cultural, financial and personnel issues before the ink is dry. Continue Reading
By- Mont Phelps
-
Feature
14 Jan 2015
Vendor relationship management: Best practices for solution providers
Vendor relationship management is no less important than customer relationship management for solution providers looking to unlock business growth. Learn best practices and why small solution providers especially should make VRM a top priority. Continue Reading
By- Spencer Smith, Site Editor
-
Feature
04 Jun 2014
White labeling cloud services pros and cons
The decision to white label a vendor's cloud services requires careful consideration. Weigh the pros and cons to decide if it's right for your firm. Continue Reading
By -
Feature
27 Mar 2014
Managed services pricing models: Per-device vs. SLA-based approach
A per-device and per-user pricing model is easy for MSPs, but experts caution it carries business risk and leads managed services to commoditization. Continue Reading
-
Feature
29 Jan 2014
Microsoft managed partner designation: What it takes, what it's worth
A Microsoft managed partner designation can get you a warm body within Microsoft whose job it is to help you. Get info on how partners are selected. Continue Reading
By -
News
10 Jan 2014
Growth best practices and key performance indicators for IT solution providers
Business consultant Larry Schulze outlines key performance indicators for IT solution providers, including optimal cost and profitability percentages. Continue Reading
By- Lynn Haber, Senior Writer
-
Tip
21 Aug 2013
How to become a Microsoft partner, and Microsoft Partner Network details
Find out how to become a Microsoft partner in this description of the MPN, which includes changes to the program effective in January 2014. Continue Reading
By- Bianca Rawson, Editorial Assistant
-
Feature
10 May 2013
KPIs: Monitoring VAR business metrics for a better bottom line
Find out how your peers are monitoring their VAR business metrics, identifying trends and making operational changes to improve the bottom line. Continue Reading
By- John Moore, Industry Editor
-
Tip
24 Aug 2011
How to do penetration testing: Overcoming problems and concerns
A lot can go wrong with pen testing. Dave Shackleford discusses potential problems and how to fix them, or avoid them altogether. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Feature
07 Mar 2011
Creating, viewing and installing Oracle Solaris 10 into a domain
Check out the proper commands to create a guest domain, view its devices and install Oracle Solaris 10 into it while monitoring the domain's activity. Continue Reading
By- Jeff Victor, Jeff Savit, Gary Combs, Simon Hayler and Bob Netherton, Prentice Hall publishing
-
Feature
26 Jan 2011
Working with configuration files in Linux systems
Learn how to find and edit configuration files in your customers' Linux systems by using the shell commands provided in this chapter excerpt. Continue Reading
-
Feature
26 Jan 2011
Linux/UNIX directories and shell commands for VARs
The Linux/UNIX directories and shell commands listed in this chapter excerpt will be valuable to solution providers trying to customize their customers' Linux environments. Continue Reading
-
Tutorial
24 Nov 2010
CISSP quiz: Business continuity and disaster recovery
This CISSP quiz, which is a part of the SearchSecurityChannel.com CISSP Study Guide will test your knowledge of business continuity and disaster recovery best practices and help you pass the CISSP exam. Continue Reading
-
Feature
10 Nov 2010
Parallel processing: Using parallel SQL effectively
Using parallel processing only makes sense for your customers in specific situations. Find out when to use parallel SQL with the Oracle databse to avoid excessive usage. Continue Reading
-
Feature
10 Nov 2010
Using parallel SQL with Oracle parallel hint to improve database performance
Enhance customers' Oracle database performance by using parallel SQL with an Oracle parallel hint, enabling a SQL statement to be simultaneously processed by multiple threads or processes. Continue Reading
-
Feature
10 Nov 2010
Parallel execution: Determining SQL suitability, benefits
When deciding whether SQL is suitable for parallel execution, consider the factors listed in this chapter excerpt, such as the execution time needed for SQL statements. Continue Reading
-
Feature
23 Jun 2010
How to restore system state backup in Windows Server 2008 R2
Use this chapter excerpt to find out how to perform a bare-metal recovery and system state recovery in Windows Server 2008 R2, including how to use Windows system recovery tools. Continue Reading
-
Feature
23 Jun 2010
Windows server backup in Windows Server 2008 R2
Take a look at the best practices for Windows server backup in Windows Server 2008 R2, including configuring backup settings and performing system state and bare-metal backups. Continue Reading
-
Feature
21 Apr 2010
PowerShell remoting in Windows Server 2008 R2
Learn the best methods to enabling PowerShell remoting in Windows Server 2008 R2, including using cmdlets or the Server Manager to configure PowerShell remoting. Continue Reading
-
Feature
21 Apr 2010
PowerShell commands in Windows Server 2008 R2
Use this chapter excerpt to learn about PowerShell commands for Windows Server 2008 R2, as well as other PowerShell uses, features, enhancements and command types. Continue Reading
By- Rand Morimoto, Michael Noel, Omar Droubi and Ross Mistry
-
Feature
21 Apr 2010
Using PowerShell ISE and alias cmdlets
This chapter excerpt details what PowerShell ISE can offer solutions providers, including command and script panes, and how to use alias cmdlets to administer new aliases. Continue Reading
-
Feature
05 Apr 2010
Using Remote Desktop Services Manager, RDS CAL
Solutions providers can use the Remote Desktop Services Manager and its tab options to view user information and get expert advice on identifying and adding a RDS CAL. Continue Reading
-
Feature
05 Apr 2010
Adding Remote Desktop Services and RemoteApp programs
There are factors that solutions providers need to consider when adding Remote Desktop Services, such as which role services to use, and steps to follow to add RemoteApp programs. Continue Reading
-
Feature
17 Mar 2010
Windows 7 system monitoring: Resource Monitor, Performance Monitor
Help your customers get a handle on PC resource usage and bottlenecks with two built-in Windows 7 system monitoring tools: Resource Monitor and Performance Monitor. Continue Reading
-
Feature
17 Mar 2010
IT systems management: The production acceptance process
This chapter excerpt on IT systems management explains how solutions providers can benefit from production acceptance and details the steps to effective implementation. Continue Reading
-
Feature
17 Mar 2010
Windows 7 system diagnostic reports: Using Performance Monitor
Using the Performance Monitor, solutions providers can view Windows 7 system diagnostic reports to resolve performance issues and prevent problems before they occur. Continue Reading
-
Feature
10 Mar 2010
Troubleshooting Windows 7 hardware and performance issues
Solutions providers need to be aware of the top methods for troubleshooting Windows 7 hardware and performance issues, including how to properly deal with error messages. Continue Reading
-
Feature
13 Jan 2010
Performing an automated Ubuntu install using preseeding
When performing an automated Ubuntu install, preseeding is an integral part of the process. Learn the different variables and settings necessary for a basic preseed configuration. Continue Reading
-
Feature
09 Dec 2009
Understanding run-level scripts in Fedora 11 and RHEL
Solutions providers can use run-level scripts in Fedora 11 and Red Hat Enterprise Linux (RHEL) to start certain services and execute various commands. Continue Reading
-
Feature
11 Nov 2009
SQL Server 2008 hardware and software requirements
Solutions providers can use this chapter excerpt to learn about the various hardware and software requirements for SQL Server 2008 in 32-bit and 64-bit environments. Continue Reading
-
Tip
25 Sep 2009
Getting to know the NERC CIP standards
Recently imposed security regulations on the electric grid have electric utilities scrambling to become compliant. Solution providers can offer a valuable service to these utilities by becoming familiar with the North American Electric Reliability Corporation (NERC) CIP standards, which are mandated by the Federal Energy Regulatory Commission (FERC). Continue Reading
By- Ernie Hayden, CISSP, CEH, Contributor
-
Feature
20 May 2009
Using the Ubuntu Linux system monitor tool
Learn how to use the Ubuntu Linux system monitor tool with this chapter excerpt from "Ubuntu Linux Secrets." Continue Reading
-
Feature
13 May 2009
Ubuntu Linux installation and hard drive setup guide
Learn how to set up a client's hard drive for proper Ubuntu Linux installation with this chapter excerpt. Continue Reading
-
Feature
24 Nov 2008
Introduction to business intelligence tools and reporting
As businesses grow and accumulate more data, the role of business intelligence reporting grows and becomes more complicated. Learn about the business intelligence tools and approaches VARs use to grow their businesses and stay ahead of the competition. Continue Reading
-
Feature
25 Sep 2008
What should be included in a managed services agreement?
A well-written managed services agreement should provide a common understanding of the services to be performed by the managed services provider for the client. Learn why the managed services agreement is often the first step taken by MSPs, the value that an agreement should provide to your customer and how to properly prepare the agreement. Continue Reading
-
Feature
25 Sep 2008
What are the 3 core deliverables of basic MSP offerings?
Developing an efficient managed services offering is essential to building loyal clientele. Learn about the three core deliverables that comprise a managed services offering. Continue Reading
By- Erick Simpson, John Moore
-
Feature
19 Sep 2008
How to write an IT service-level agreement
A service-level agreement (SLA) is a document that clearly lays out your responsibilities as a client's managed services provider. Learn how to write an SLA to protect your managed services business by avoiding confusion with customers that can lead to expensive lawsuits. Continue Reading
By- Yuval Shavit, TechTarget
-
Definition
25 Aug 2008
freemium
Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features. The term, which is a combination of the words 'free' and 'premium,' was coined by Jarid Lukin of Alacra in 2006 after venture capitalist Fred Wilson came up with the idea... (Continued) Continue Reading
-
Feature
31 Jul 2008
What are federated databases?
Federated databases are a possible solution to your customers' database search issues. This IT Channel Explained will explain what a federated database is and how it works and give you the info you need to determine whether it's a good fit for your customers. Continue Reading
-
Feature
01 Jul 2008
The benefits of metadata and implementing a metadata management strategy
This section of the chapter excerpt will introduce and explore the basics of metadata. Continue Reading
-
Feature
30 Jun 2008
Managing Data in the Data Hub
This section of the chapter excerpt deals with acquiring, rationalizing, cleansing, transforming, and loading data into the Data Hub. Continue Reading
-
Tip
12 Jun 2008
Making the most of selling antivirus services
Read Mike Rothman's observations on the antivirus market as it pertains to the channel and find out how selling antivirus services can provide other business opportunities. Continue Reading
By- Mike Rothman, Securosis
-
Feature
19 May 2008
What are the tangible deliverables of the security assessment?
Learn what standard deliverables are for a security site assessment and how to tailor them to the expected audience. Continue Reading
-
Feature
19 May 2008
What is the scope of the assessment?
Before beginning a security assessment on IT systems, service providers should discuss the scope of the assessment. Learn why it is important to decide the scope of an assessment before its execution. Continue Reading
-
Feature
15 May 2008
Advantages and disadvantages of Hyper-V
Microsoft's Hyper-V is at the release candidate stage, and some companies already have it in production use. Find out the advantages and disadvantages of the virtualization tool so you can help customers at a server virtualization decision point. Continue Reading
-
Tip
22 Apr 2008
Penetration testing 101: How to offer pen test services
A penetration test can reveal vulnerabilities in your customer's network. Learn about the different types of pen test services to eliminate these vulnerabilities and ensure the security of your customer's network and applications. Continue Reading
By- Mike Rothman, Securosis
-
Feature
20 Mar 2008
Managed services contracts
Value-added resellers venturing into managed services need to consider the details of the managed services contract they provide to customers. Learn what goes into a managed services contract in this edition of Channel Explained. Continue Reading
-
Tip
12 Mar 2008
Choosing network equipment vendors: Multi-vendor vs. single-source
A plethora of network equipment vendors means that you have limitless solution offerings at your disposal. Do you specialize in one vendor or create multi-vendor partnerships? Learn the pros and cons of supplementing your tier one vendor partner offerings with those from niche players. Continue Reading
-
Feature
28 Feb 2008
Goals of SOA: Integration and interoperability
This excerpt from "SOA: Principles of Service Design" defines the term "interoperability" and describes how service orientation can benefit the process of sharing data. Continue Reading
-
Feature
28 Feb 2008
Understanding service-oriented technology today
This excerpt from "SOA: Priniciples of Service Design" revisits fundamental service design elements and depicts how they work in relation to one another. Continue Reading
-
Feature
28 Feb 2008
Service-oriented computing: Goals and benefits
This excerpt from "SOA: Principles of Service Design" lays out seven goals of service-oriented computing and talks about how businesses can benefit from this technology. Continue Reading
-
Feature
28 Feb 2008
Entity services and business entities explained
This excerpt from "SOA: Principles of Service Design" explains the entity service model and how it can be leveraged to automate multiple business processes. Continue Reading
-
Tip
25 Jan 2008
Checklist: Five steps to assessing a customer's antivirus protection
Your customers' antivirus protection may not be up to par. This Channel Checklist offers service providers and VARs five steps to follow with customers to shore up their antivirus protection strategies. Continue Reading
By -
Tip
02 Jan 2008
How to diagnose and troubleshoot database performance problems
Database performance problems can wreak havoc with Web site performance and cost your customers lots of money. Diagnosing problems is much easier when you rely on this systematic approach. Continue Reading
-
Feature
12 Dec 2007
How many different types or levels of vendor certification are there?
Learn about the different types and levels of vendor certification. Continue Reading
-
Feature
16 Nov 2007
What kind of incentives and partner programs does VMware offer to its resellers?
Learn about VMware's three reseller partner levels: Professional, Enterprise and Premier. These levels increase in both the commitment expected from the reseller and benefits offered by VMware. Continue Reading
-
Definition
17 Oct 2007
turnkey solution provider
A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration... (Continued) Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Feature
30 Aug 2007
Understanding security risk management: Recovery time requirements
After you help your clients see the need for security risk analysis and establish a methodology and priorities for security risk mitigation, the next step is to assess recovery time. This will able you to help your clients understand the operational consequences of malicious attacks on their IT infrastructure. Continue Reading
-
Feature
30 Aug 2007
Understanding security risk management: Criticality categories
Security risk management involves a sober assessment of your client's business operations and the relative security risks of each. Once the need for security risk analysis has been recognized by your client, the next step is to establish catageories — such as mission-critical, vital, important and minor — in which to place each operational area. When this is done, it becomes easier to establish priorities for strengthening security measures where they are most needed. Continue Reading
-
Tip
28 Aug 2007
Choosing network vendors and service providers
Choosing the right networking partners and products is essential to your long-term success as a reseller. Learn how to choose wisely using this tried-and-tested methodology. Continue Reading
By- James D. McCabe
-
Definition
25 Jul 2007
CONUS (continental United States)
Refers to the continental United States. To state that delivery is CONUS is to say that delivery could be anywhere in the continental U.S. Continue Reading
-
Tip
17 Jul 2007
An introduction to penetration testing and its legal implications for VARs and consultants
Penetration testing has become a necessity, and you need to know the basics. Learn what qualities your potential customer is looking for in a good tester and how to protect yourself against legal risks. Continue Reading
-
Feature
09 May 2007
Oracle RAC: Log directory structure in cluster ready services
When diagnosing Oracle 10g problems in cluster ready services do what Oracle support does -- examine installation log files and respective directories. Learn more in this book excerpt from "Oracle Database 10g: Real Application Clusters Handbook." Continue Reading
-
Feature
09 May 2007
Oracle RAC: Debugging node eviction issues
Oracle RAC's node eviction root cause analysis (RCA) is common and complex. This excerpt from "Oracle Database 10g: Real Applications Clusters Handbook" shows you how to recover from a communication failure in Oracle 10g. Continue Reading
-
Feature
09 May 2007
Oracle RAC: ON and OFF
Disabling Oracle's RAC options may be necessary when testing the Oracle Database 10g. Steps are outlined in this excerpt from "Oracle Database 10g: Real Application Clusters Handbook." Continue Reading
-
Feature
09 May 2007
Oracle RAC: Database performance issues
Oracle's RAC databases share resources with other applications which are also in demand. Sometimes resource management runs into a deadlock. This excerpt from "Oracle Database 10g: Real Applications Clusters Handbook" examines what happens to a hung database and how to fix it. Continue Reading
-
Feature
15 Apr 2007
Ethical hacking tools and techniques: Password cracking
In this portion of a tip on network penetration testing and ethical hacking tools and techniques, security consultants and value-added resellers (VARs) will learn about password cracking. Continue Reading
-
Feature
15 Apr 2007
Ethical hacking tools and techniques: Information gathering
This portion of a tip on network penetration testing and ethical hacking tools and techniques discusses information gathering for security consultants and value-added resellers (VARs). Continue Reading
-
Feature
04 Apr 2007
Partnering with a managed service provider (MSP) vendor
Managed service provider (MSP) partnerships are rarely as fruitful as both sides would like. When choosing an MSP vendor, ask these questions to determine if your partnership will be a good one. Continue Reading
By- Paul Myerson
-
Feature
25 Mar 2007
Common SQL Server Integration Services (SSIS) package management scenarios
Whether connecting to SQL Server Integration Services (SSIS), running packages or viewing package summaries, these scenarios will answer basic SSIS package management questions, from the book "Inside Server SQL Tools." Continue Reading
-
Feature
20 Mar 2007
SQL Server Integration Services (SSIS) tools
Server 2005 Integration Services (SSIS) introduces a rich toolset that supports development, deployment and administration of extract, transform, load (ETL) solutions. Learn more about these SQL Server tools in this excerpt from "Inside SQL Server 2005 Tools". Continue Reading
-
Tip
21 Feb 2007
A review of Skybox Security's Skybox View 3.0
Skybox View builds a detailed map of your customer's network and assesses threats against it based on feeds from VA scanners and SIMS, and also makes it possible to virtualize penetration testing. This review helps channel professionals make the right decision about pen testing equipment. Continue Reading
By- Brent Huston
-
Answer
14 Feb 2007
Certified Ethical Hacker (CEH) vs. Certified Network Defense Architect (CNDA) training
If you are trying to decide between taking the CEH and the CNDA exams, get advice here. You may even be able to turn your CEH credential into a CDNA certification. Continue Reading