Tag: AI

GenAI
GenAI FOMO plays to the strengths of MSPs

GenAI FOMO plays to the strengths of MSPs

Interest in generative artificial intelligence (GenAI) remains high. However, a survey of over 250 executives shows that only 22 percent believe their organization’s data foundation is fully ready to support GenAI applications, while 53 percent think their organization is somewhat...

/ November 5, 2024
AI shift
AI monitoring: An untapped MSP opportunity

AI monitoring: An untapped MSP opportunity

A survey of 400 IT operations professionals finds that the rise of artificial intelligence (AI) is prompting more organizations to reassess the platforms they use to monitor their IT environments. Conducted by the market research firm Vanson Bourne on behalf...

/ October 30, 2024
MSP Opportunity 5G
Unpacking the 5G IoT MSP opportunity

Unpacking the 5G IoT MSP opportunity

Internet of Things (IoT) security has been a hot topic among cybersecurity professionals for some time now. However, cybersecurity is a moving target. Once someone figures out and secures a vulnerability, cybercriminals quickly move on or change their approach. One...

/ October 28, 2024
Barracuda Managed XDR AI
The future is now: AI-driven innovation in Barracuda XDR

The future is now: AI-driven innovation in Barracuda XDR

The rapid proliferation of cyberthreats is forcing the cybersecurity industry to rethink defenses. Innovative, AI-powered security solutions are urgently needed to protect against evolving attacker tactics, techniques, and procedures (TTPs) and sophisticated and potentially business-crippling AI-enabled threats. Barracuda Managed XDR is...

/ October 23, 2024
The era of LLMs, transformers, and FLMs in AI

The era of LLMs, transformers, and FLMs in AI

“Hello, how are you today?” A simple enough statement, often used to start a conversation. A generative AI (GenAI) interaction will result in a simple human response, such as “I’m fine, thanks.” The GenAI engine can then move on to...

/ October 16, 2024
risk
Cybersecurity roadmap: How MSPs can guide customers through the risk landscape

Cybersecurity roadmap: How MSPs can guide customers through the risk landscape

As cyber threats evolve and proliferate business systems, managed security providers (MSPs) are vital in helping businesses counter attacks by adopting a comprehensive strategy for risk mitigation. This includes preparation, response, and recovery, while also understanding the organization’s cybersecurity risk...

/ October 14, 2024
cloud services
Unlock new opportunities: How cloud services can fuel MSP growth

Unlock new opportunities: How cloud services can fuel MSP growth

A report from Synergy Research Group finds total global spending on cloud services and infrastructure reached $427 billion in the first half of 2024, a 23 percent year-over-year increase. During this time, consumption of infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service...

/ October 7, 2024
Guide
The ultimate guide to creating a winning marketing automation strategy

The ultimate guide to creating a winning marketing automation strategy

Since the introduction of consumer-ready artificial intelligence (AI) tools the digital marketing landscape is changing faster than ever, and having a solid marketing automation strategy is essential for staying ahead of the competition. Marketing automation enables AI startups to thrive by enabling them...

/ October 1, 2024
MSPs survey
Spotlight on how MSPs can influence organizations’ profitability

Spotlight on how MSPs can influence organizations’ profitability

A recent PwC report shows that organizations with strategic relationships with managed service providers (MSPs) are far more profitable than those that simply employ them to reduce costs or plug capabilities gaps. According to a survey of 2,000 business leaders,...

/ September 30, 2024 / 1 Comment
MSP at the forefront against credential stuffing

MSP at the forefront against credential stuffing

Credential stuffing has been around for a while, and it is exactly what it sounds like: an attack in which hackers use a cache of compromised usernames and passwords to break into a system. However, hackers have recently found new...

/ September 26, 2024