Commvault for MSPs: Unified data protection for hybrid and SaaS environments
If you count the number of backup tools currently running across your client base, the number is probably higher than you’d like to admit. One for on-prem, one for M365, maybe another for cloud VMs. And that’s before you factor in the clients who are running something you didn’t set up. Client environments are simply more complex than they used to be. With data scattered […]
Shadow AI: The hidden security risk in your clients’ browsers
You might have firewalls and discovery scans in place, but a new kind of risk is slipping right past them. Your clients’ employees just want to get their work done faster, but that drive for efficiency is creating a massive blind spot. We call it shadow AI, and it happens when employees grab AI tools like ChatGPT, Claude or even sneaky AI features baked […]
The MSP security community I wish I had 10 years ago
“Am I the only one who has no idea if this is a big deal?” That’s the question you can’t ask out loud. Not to your clients, who expect you to be the expert. Not to your team, who looks to you for answers. And definitely not on LinkedIn, where everyone’s a thought leader with all the answers. But it’s the question that runs through […]
Top 5 security priorities for MSPs in 2026
It’s officially 2026 and it’s the season of reinvention, new goals and #NewYearNewMe posts on social media. For MSPs though, it’s a time to refocus our efforts on security and risk management for our clients. The threat landscape has evolved rapidly, and the tools and tactics that worked last year may not be enough to protect against today’s attacks. With that in mind, here are the […]
Identity-first security: The new perimeter for MSPs
Identity-first security is a modern approach that treats identity as the new perimeter for cybersecurity. With users, devices and applications accessing resources from anywhere, the traditional network perimeter no longer suffices. Instead, every access decision is based on verifying the identity, device health, user behavior and contextual risk factors, and continuously enforcing policies throughout the session. This approach is critical for […]
