Your time is precious. You have more important issues to deal with than your computer network. It is, however, a critical enabler to your business and in need of attention to ensure it’s running predictably, optimally, and securely. Our fully managed program is the ideal solution for an organization like yours, one that demands the utmost in network reliability and quality service.
Thank you for shining a light on this systemic vulnerability. I don't think organizations realize that, in many ways, they inherit the security of their service providers. As another commenter noted, the RMM is overdue for radical reinvention. Security-minded MSPs may need to think about delegated access to customer environments, privileged access workstations, or other methods for remotely administering customer environments without that big fat one-to-many target that RMM represents. I think the MSP tooling ecosystem is general is problematic - MSPs design for scale and efficiency (making them an economical option for customers as opposed to hiring internally), but do I really want my password manager integrated into my RMM? Maybe not... There's a lot of market share out there waiting for MSPs that can develop real cybersecurity maturity.
Cloud computing has allowed managed IT services to expand beyond the regions and borders that would constrain the average break/fix IT through the adoption of Software as a Service (SaaS) technologies, as well as Infrastructure as a Service (IaaS) and Platform as a Service(PaaS) also. These capabilities allow managed IT services to scale at a rate dramatically larger and faster than in-house IT operation or break/fix providers.
×