Tech Data Blog

Laura Vanassche

Find me on:

Recent Posts

Three ways ConnectWise partners can boost Office 365 profitability

December 15, 2016   |   Laura Vanassche

As a ConnectWise partner, you have the tools to build the foundation of your cloud service provider (CSP) business. The self-proclaimed Swiss Army knife for MSPs, partners running ConnectWise Manage and CloudConsole together are set up for success with Office 365 via the CSP program. To continue the path to profitable business, here are three tips to help you make the most of your efforts.

Read More

Topics: Cloud Console, Cloud

Windows Server 2016: Complete Guide and FAQs

November 17, 2016   |   Laura Vanassche

It may be an understatement to say that Microsoft has caused quite a bit of disruption with the new release of Windows Server 2016. In summary, here are the highlights of the new licensing rules:

Read More

Topics: Data Center

4 reasons why you would never choose a cloud backup solution

November 1, 2016   |   Laura Vanassche

On-premise or cloud backup solution? That is the question. 64% of IT pros say a data loss event is literally a life-or-death situation for their small business. Every minute that a system (or application) is down, your business is losing money and using 100% of its IT resources to get it back. With many options available to build your proactive and reactive plans, here are four reasons why you would never consider a cloud backup solution.

Read More

Topics: Cloud, Backup

Three Profitable Microsoft CSP Scenarios [INFOGRAPHIC]

October 13, 2016   |   Laura Vanassche

You’ve probably heard about Microsoft’s Cloud Solution Provider (CSP) program and how it’s the wave of the future in delivering Microsoft Office 365 to your customers. However, the key to success in delivering productivity solutions via cloud services takes more than just a new program…it requires a deeper commitment to solution selling than ever before. 

Read More

Topics: Cloud

Tips for securing your data with a mobile workforce

September 13, 2016   |   Laura Vanassche

The affordability of devices—including smartphones, tablets, laptops and desktops—has changed the way we work and communicate on many levels. These technologies allow employees to work from any location and remain connected to the company network at all times. Nearly all of my coworkers have constant access to their work email and calendar through their smartphones, as well as the capability to work from home if needed. However, this freedom may create vulnerability and open companies up to cyberattacks. How can IT departments ensure the company’s sensitive information remain secure with the increased use of personal phones, tablets, laptops and desktops?

Read More

Topics: Security, Client & Mobility, Cloud