Jul 20, 2020
Learn to Run Your I.T. Business
Support This Show
Main Topic: Managed SOC Platform
Built for MSPs delivering cyber security to SMBs
ENDPOINT | NETWORK | CLOUD
Call to Action:
Our friends over at Syncro are hosting a giveaway for a few weeks. Those who sign up for a free trial of Syncro and attend a product tour will receive a nifty Syncro mug! Visit the URL to book your demo today: https://bit.ly/mugpl
In this new day and age you need to re-adjust your sales process and comfort. My good friend blah blah blah
Accidentally deleted an important file? Wiped clean your hard drive? Unsure of what to do with corrupted data? Windows File Recovery can help recover your personal data.
** Do not ignore the Store for Microsoft tools that might help. - Windows Scan, Microsoft Whiteboard, Wireless Display, etc.
WhatsMyIP.org started in April of 2001 when I bought this domain name on a whim. This site was originally hosted on an Apple Mac Quadra 700, connected to a residential internet connection, and the IP Addresses were retrieved via AppleScript. We've come a very long way. If you want to see how long, check us out on Archive.org!
** Port Scanners, WhoIs & DNS, Website Rankings, Password Generator, MAC Address Lookup, etc., etc., etc.
VOIP Tips (rant)
If you are going to be a VOIP provider you ARE going to be a network engineer.
Have insight and visibility into customer account authentications.
Guest: Billy Austin - President & Co-founder at RocketCyber
RocketCyber's threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required.
Each App is purposely built to detect malicious/suspicious activity spanning endpoint, network, and cloud attack pillars. When threats are detected, RocketCyber provides the MSP operator reporting, a triage view, and the ability to generate tickets to your PSA.
What is a firewall Syslog - firewall log monitoring acting as a syslog collector. Messages are parsed, analyzed, and enriched with threat intel for potential threat indicators. When a threat or security event is detected, message details show up in the console.
DISCLAIMER: This description contains affiliate links, which means that if you click on one of the product links, we’ll receive a small commission.
Music By Jim Holley