Customers Chime in About Ways to Leverage The Latest Features In Kaseya
Now that Vegas has mostly recovered from our visit during Kaseya Connect 2013, we’d like to share with you a little bit from one of this year’s best sessions: “Customer Perspectives on Leveraging the Power of 6.3.”
The best information about the value of the lastest version of Kaseya, comes from service provider customers who have already deployed it and can share the ways that it has helped them become better at proactively managing IT assets by applying a consistent process that uses the discover, manage, automate, validate methodology.
Although a recording of the full session is available below, I would like to share a few of the key points about the value of Kaseya 6.3 made by each of the participants.
“With the new reporting engine you are definitely able to pull a lot more out of the system than you could before. Instead of just the pre-canned reports or aggregate tables, you can really get in the database and pull nice, pretty charts, graphs, reports…We have been leveraging badges pretty heavily…what a badge does is you can give special instructions on an agent. It’s a pretty handy little feature to be able to leave a special instruction for my techs.” - Scott Brown, President of TimbuckTech, Inc. of Peoria, IL
“I’m just crazy about the agent procedure editor…copy and paste, multitab editing is great, undo, go to line…it feels like a real scripting language… I have been leveraging it with policy management module to automate remediation and to eliminate superfluous tickets.” -Brian Dagan, Senior Systems Support Engineer from CWPS of Washington, DC
“Machine search. I can’t tell you how much machine search has meant to us. The ability to stay on what you’re doing without losing where you are. There is discussion that machine search may not be just machine search but that the future is ability to search tickets, knowledge base.” -Brian Greene, President of Adaptive Technology Group, LLC of Seattle, WA
“We manage 1500 endpoints and about ten percent of them are MAC OS. We have been using Kaseya for five years. As of 6.3, KLC remote control is using the native X11 VNC server on MAC OS 10, so that significantly improved our ability to remote control macs, and the connection is much more consistent.” -Kerry DeVilbiss, Tools Manager for Anchor Point IT Solutions in Santa Barbara, CA
Discover the rest of the ways that Kaseya customers are leveraging 6.3. Catch the full session of “Customer Perspectives on Leveraging the Power of 6.3” now!
Industry Expert Viewpoint: SMART IT Project Planning for Success
One of the 3 Service Delivery areas a Solution Provider can become very profitable in; or tremendously unprofitable, is in Project Management.
If the Solution Provider’s Project Management processes are solid and delivered effectively, their project outcomes will have the best chance to meet their established criteria for success. If; however, the Provider’s Project Management processes are weak or non-existent, it will be very difficult to manage timelines, schedules and resources along with change and communications. This will effectively erode customer satisfaction, profitability and the opportunity for additional services.
As the person responsible for overall project success, the Project Manager participates in the Solution Provider’s professional service delivery process, and creates project plans that include activities, phases and timelines, and schedules and assigns resources to deliver all project-based services. In addition, the Project Manager manages every aspect of project delivery from the project kick-off meeting through provisioning, implementation, go-live and sign-off.
Once a prospect or customer has agreed to the Project Proposal and its Terms, the Project Manager can begin the process of planning for Project Implementation. Project Planning is the first component of Project Management, which is defined as the effective organization and management of resources to insure a Project’s completion within its defined scope, timeline and budget. Project Planning includes the following:
Definition of the Project Scope
Methods to be utilized during Project Implementation
The Identification of all tasks to be completed during Project Implementation
The creation of a timeline and expected duration for each task’s completion
The estimation and allocation of resources for each task’s completion
Managing Risk, Change and the Communications and Status Reporting processes
Determining the criteria for success of each phase and the overall Project
In order to move to the implementation phase of the Project, it is important that the customer approve the overall Project Plan, which includes the Project Scope, the methods utilized during Project Implementation and the Project timeline and schedule. In addition, customer resources such as staff and vendors may be required as assets during Project Implementation, and their involvement must also be approved by the customer.
An effective Risk Management Plan will support Project Implementation as a contingency strategy should the need to roll back during any phase of the Project becomes necessary, and a Change Control process is required, should additional tasks or services outside of the agreed-upon Project Plan and Proposal need to be authorized by the customer to insure Project completion.
A solid communication and status reporting process must be agreed to by all parties in order to keep all affected resources including the customer apprised of Project status at all times and facilitate effective decision-making throughout the lifecycle of the Project.
Accountability to tasks and their timely completion can only be enforced once all resources have agreed to their roles and responsibilities, as well as to Project milestones and timelines.
Kaseya Industry Experts are some of the best and brightest professionals in their areas of expertise, ranging from IT Operations, to Service Provider Sales, Service Management Best Practices., and more.
With Centralized IT Systems Management, Your Network Won’t Run Amok
Anyone who has been to a schoolyard or daycare center knows the importance of managing and keeping track of children at all times.
That’s why rules to walk in a single file exist. Or hold hands while moving. Or sit in assigned seats. Otherwise, it’s a free-for-all. When moving from one place to another, one child might decide to hop, another would crawl, a few would race each other, and the rest would find some individual, creative ways to amplify the chaos.
And if you’ve seen a group of children running amok, you’ve seen chaos. You even might have felt a little envious of their carefree ways.
Chaos in an IT network, however, is nothing to envy. If machines are running under different rules in different places, or out of the sight of administrators, you’ve got problems. You may have problems you don’t even realize, which can surely translate to security risks and higher operational costs.
A well-managed network requires four essential steps – discovery, management, automation and validation. After you find and start tracking all your IT assets in the discovery phase, it’s important to follow that up with sound management. That means having uniform policies, ongoing monitoring and centralized control.
Efficient Management with Kaseya
Replicating processes and procedures for consistent, efficient management is next to impossible without some level of automation, especially as a network expands in multiple locations. Documentation typically is either spotty or non-existent, and manual processes take up a lot of time.
Kaseya changes all that, first by helping you discover assets you don’t even know exist, or forgot you have, and then by letting you remotely manage and monitor the whole network from a central location. What Kaseya does is akin to the difference between the cacophonous sound of an orchestra tuning up and the playing of a melodious symphony.
Order replaces chaos. Administrators gain control and flexibility. They know where network components are, and they can organize them as they see fit. For instance, an administrator might choose to manage groups of machines by type, OS or location – or by some other characteristic that makes sense in the context of the organization’s structure.
Centralized IT systems management control is key – through a dashboard that gives administrators visibility into the entire network. This makes management a straightforward, consistent process that removes manual tasks, guesswork and blind decisions. When a new security or management policy is needed, an administrator can set up the policy from the central dashboard and disseminate it to distributed machines. From the same dashboard, the administrator can monitor compliance and issue updates when necessary.
In addition, Kaseya makes it possible to manage machines when they are on the road and not connected to the network, a feature that is especially critical in the age of mobility. And this means that even when users are traveling, you can instill the kind of order in your network that a good teacher applies in a classroom full of unruly kids.
I am very pleased to announce yet another wonderful and very successful Kaseya user conference. Kaseya Connect 2013 was held April 29 – May 1 at the Four Seasons Las Vegas. Our largest user conference to date, we had more than 700 in attendance and 35 sponsors. Conference goers came in from 24 countries and as far as Australia, the United Kingdom, Netherlands, Sweden and Brazil.
Connect was packed with educational and fun events, including a golf tournament, insightful keynotes, customer presentations and expert panels, product demo sessions, an experts lab, vertically focused breakout sessions and a feature presentation by former professional boxing champion Sugar Ray Leonard.
Our goal for Connect 2013 was to bring customers, partners and industry experts together to share new ideas and best practices in IT systems management, learn how to get the most out of our award-winning Kaseya family of customizable ITSM products, discuss industry trends and provide a venue for peer interaction. I’m delighted to say we achieved all of these things. When polled following the event, 95% of attendees reported they had a better understanding of Kaseya technology and how Kaseya can help their IT operations and service delivery. Ninety-seven percent said they’d recommend attending Connect to a colleague.
In terms of sponsors, independenceIT (iIT) was a Platinum sponsor of the event and Autotask a Gold sponsor. Many other respected industry technology companies participated as Silver and Bronze sponsors, including Intel, Kaspersky Labs and Axcient. To see a full list, go to the conference site.
And don’t just take it from me, this is what others had to say about Kaseya Connect 2013:
“Kaseya Connect 2013 was a home run of positive, productive energy and real relationships! Kaseya’s renewed emphasis on personal relationships with their customers, and with their key third-party partner program allies, such as HEROware, made this event an extremely high ROI investment for us. Industry events should be about deepening relationships, creating new ones and forming a measurable sales ROI. By those standards, for HEROware, Connect 2013 hit it out of the park,” said Rob Ryan, president of HEROware.
“This was the most productive Kaseya Connect to date! Great speakers, great content and the opportunity for the industry experts to provide quality business content to assist Kaseya customers in growing their business,” said Larry Schulze, co-founder and principal consultant for The Taylor Business Group.
“Kaseya Connect provided me with a terrific opportunity to network with my peers. In doing so, I advanced my understanding of the Kaseya family of products and ultimately improve service to my customers,” an unnamed IT manager.
Kaseya Connect 2014 will be held April 14 – 16 at the Four Seasons Las Vegas – only 11 months away! See you there!
I'm going to dispel a social media fallacy right now: Not only is it OK to delete a comment, post or thread – in some cases you should.
Suddenly the granite of the social media Commandments is showing its age. "Thou shalt not delete a user comment!" It can be done, and it can be done in a proper fashion.
"You can get a head start by publishing a community guidelines document explaining what will and won't get deleted." – John Frost, TheDisneyBlog.com
First and foremost, whether you are a personal blogger or the professional social media representative of a brand or business, you need a publicly accessible social media standards document. This document should outline any and all reasons why a user might have their comments deleted within your social channel. The terms by which you will delete a post are subject to scrutiny. I'm certainly not trying to advocate that you delete every negative thing said about you.
Deleting should be one of the last things that you are forced to do for reasons such as, but not limited to:
Any and all comments associated with inflicting harm on another individual
Any and all comments that would subject your audience to content uncharacteristic of your voice and tone
Any and all comments that could be perceived as litigious (if this is the case be sure to take a screengrab, C&P the content to a TXT file, make a note of the date, time and exactly what/why was deleted)
McDonald's even goes so far as to advocate that their fans "play nice:"
Help us create a positive experience. - We are here to share with you and we invite an open dialogue. To help this Fan Page be a positive experience for the entire community, please be respectful toward others by complying with the terms and policies of Facebook and avoid posting spam or comments that attack or discriminate against other users, contain expletives, include inflammatory religious content, or reference a third party pages or websites. This content may be removed. If an individual repeatedly violates this policy, that user will be blocked from posting in the future.Be forewarned however, this is a slippery slope, there are many people (such as me, dammit!) who utilize profanity for emphasis – not necessarily just for shock value or in a lowbrow way. As long as this does not deviate from any boundaries you have put in your standard operating procedures, I would just leave it.
Remember the rules of engagement when it comes to trolls. Analize, Assess, Reply and in some limited cases remove.
It's Best To Let It Die
The simple rule of thumb in most cases is to just LEAVE IT! The exceptions are when a statement might damage the company economically, cast you in a light that could create legal action, or openly insult your audience and create a mass exodus. People are entitled to their opinion, even when you don’t want to hear it. It's also important to understand that people who challenge your messaging often provide you with an opportunity to test your brand and ensure its mission is rock solid.
They Should Be Lovin' It
What's most important is creating an environment where your audience can thrive. Rick Wion of McDonald's (a man I have the highest professional respect for) says of their social media efforts, "Brands should want to create a pleasant experience for our fans."
That being said, it's also equally important to remember that you get what you give. If your tone and manner is consistently enticing the wrong people, then they will come. And while it's good to challenge your audience with compelling debate, it's best not to encourage discussion that will prime people to turn against your overall brand position.
What's your take? Have you deleted comments? Why, and how did you go about doing so? I want to hear the way you run your social. Let's talk!
Today’s enterprise IT manager faces two major headaches: unplanned network growth and increased mobile device use. These all-too-common pain points complicate the lives of already-overwhelmed IT managers who know that a security attack can bring a lot of misery to themselves and their companies.
Successful security attacks occur at a rate of 1.8 weekly*, making the job of securing enterprise IT a daunting task. Doing the job right hardly gets you noticed by top brass, but when something goes wrong, IT managers are put under scrutiny as they drop everything to fix the problem. Of course, a security breach is when you least want to be noticed.
IT security is complicated by the unplanned ways in which networks tend to grow as companies add users, applications and hardware, open new locations, and expand existing ones. Immediate needs are addressed with little thought to long-term ramifications, so using traditional “Big IT” applications to keep track of what is running on the network, and how it is configured, simply doesn’t cut it.
Groups of employees end up using different versions of software and operating systems, and sometimes applications are deployed without IT’s knowledge. Highly distributed endpoints and off-network systems hinder accurate, real-time audits for asset management and compliance. Different security protocols and tools are implemented from one location to another, creating management and data-protection challenges.
As if that weren’t enough, today’s IT administrators face another major challenge, – the proliferation of mobile devices. End users buy smartphones and tablets, get attached to them, and bring them to the office. This IT headache, now referred to as BYOD (Bring Your Own Device) means that personal devices tap into the network, often without the knowledge of IT managers.
It all adds up to a security nightmare that would prove challenging to even the most organized of IT administrators – the very people whose necks are on the line for managing hard-to-tame networks and avoiding security disasters.
So what’s the answer? The Kaseya command & control center serves as an integrated, modular platform that leverages existing systems to enable visibility, management orchestration and reporting across the entire IT network.
Kaseya: Easing the Burden of IT Administration
The Kaseya command & control center effectively addresses the three key obstacles to successful enterprise IT security management:
1. Heterogeneous networks lack a centralized view of all IT assets, including network infrastructure and endpoints.
If you can’t see it, you can’t manage it. And, if you can’t manage it, you can’t secure it. With Kaseya, administrators don’t have to sweat it out daily to manage different silos with multiple security policies and practices. Instead, they get centralized management and visibility into the entire IT environment from a single console. From The Kaseya command & control center, administrators can audit computers without interrupting users, and manage groups of machines according to type, OS, location or some other trait that is relevant to the organization’s structure.
2. Disparate monitoring tools and Big IT applications complicate management.
The command & control center enables 24/7 monitoring and real-time IT infrastructure status. All devices, be they stationary servers and desktops or mobile devices such as notebooks, smartphones and tablets, are managed and monitored from the same place to ensure top performance and prevent security incidents. Kaseya can work with all leading antivirus and anti-malware tools, so multiple tools can be managed centrally. Administrators can keep tabs on endpoints connected to the Internet, even when disconnected from the network.
3. Lack of standardized processes and automation makes networks error-prone.
Kaseya automates the following IT tasks to ensure consistency, accuracy and compliance with internal policies and regulations:
Kaseya’s centralized management puts an end to unplanned growth and blind mobile device administration. Deploying the platform takes only a few days, bringing much-needed relief for IT managers overwhelmed by daily IT management and security tasks.
*According to “2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies”, Ponemon Institute, October 2012
It's been a while that a video clip moved me to post it to my website. I thought this clip (and its narration from Alan Watts, noted thinker and lecturer) a noble reminder to parents that our true motivation should be that of raising our children to be happy, not what society deems as successful.
Posted on May 21, 2013 by Justice Mitchell and filed under Film, Parenting, People and tagged motivation advice parenting happiness love work life.