As we pointed out in our last blog, 70 percent of successful cyberattacks originate at endpoints, which should make them a focal point in your clients’ cyber resilience [CF2]efforts. That means the partner provider your MSP works with is essential, too. We’ve provided some tips:
Choose One Provider that Handles Both Pieces
To grow your MSP effectively, you need a single-solution provider for all things cyber resilience, not just endpoint security and backup. But even sticking with those two solutions, relying on a single provider partner to deliver both pieces can dramatically simplify your life. You get a single channel team to help with both, a single point of accountability for problems, and access to sales engineering and closing support to deliver the right solutions for each customer. It’s also an easier sell to your clients, many of whom are overwhelmed by the scope and scale of cyberthreats. The more you can provide a simple solution to a complex problem, the better.
Endpoint Protection Features to Look For
- Simple installation: Your solution shouldn’t conflict with other software and should install quickly and easily. As in three seconds fast.
- Cloud-based control of all endpoints: Endpoint security management should be centralized in a cloud control center. No on-site maintenance on the one hand and the ability to control security from anywhere on the other.
- Reliable automation: Updates, infection alerts and remediation should be as automated as possible (assuming the solution is loaded with reliable detection and threat intelligence) to ensure fast responses and low operational costs.
- A lightweight solution: Choose a solution that performs the heavy lifting—malware discovery and analysis—in the cloud, so endpoint devices don’t become bogged down.
- Online and offline protection: Advanced solutions can monitor, journal and contain infections, even when an endpoint is offline.
- Cutting-edge threat intelligence and detection: Your solution is only as good as what goes into it. That means you need to catch emerging threats without creating an avalanche of false positives. Look for AI- and ML-powered solutions that learn to adapt to user behavior, spot threats and remediate most problems instantly.
Endpoint Backup Features to Look For
- Simple installation: Installation should be automated, centralized and secure over both public and private networks.
- Secure operation: Help your clients avoid the all-to-common error of failing to encrypt their backups by sourcing a solution with 24-bit AES encryption.
- Mitigation power: Global location tracking and the ability to remotely wipe data are must-haves.
- Hyper-flexible policy controls: You should be able to handle any level of backup protection your clients need—even if that means backup up every minute.
- Advanced administration: From hidden (to end users) legal holds to the ability to force a restoration, your solution should enable centralized management of all vital endpoint backup needs.
- Incremental restoration: Make sure your solution has the power to restore only new or changed files. This is where the rubber meets the road in terms of developing true resilience that empowers your clients to weather attacks, recover from ransomware or migrate devices.
Get Help from Your Provider
If you’ve got a good provider partner on your side, you’ll be able to access the training, materials and sales support you need to push endpoint resilience to your prospects and customers. Ask for tutorials, webinars (recorded or live), case studies, literature and any proven “campaign in a box” materials they have on hand to help you get a jumpstart.