SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
HOW TO TRANSITION FROM
SELLING SECURITY PRODUCTS
ToSellingProfitableSecurityServices
DON’T BE SHY!
● Askquestionsatanypoint
● I’llalsopausebeforewefinish
MY DEFINITION OF A
MANAGED SERVICE PROVIDER
1. 24x7x365MonitoringandMaintenance
2. “AllYouCanEat”TechnicalSupport
3. VendorManagement
SSL
denialofservice
financialinstitutions
darkwebcyberspace
anonymous
adwares
porn
bitcoin
trojan
servers
remoteadministrationtools
corporations
internet backdoor
wikileaks
malwares
distributed
denialofservice
access
worldwideweb
surveillance
stuxnetwarezactivism
defacement
government
data
root dataspoofing
keylogger
antivirus
hackers
whitehat
database
blackhat
privacy
firewall
worms
encryption
scriptkids
Informationtechnology
socialengineering
CYBER
SECURITY
DOWNLOAD THE
RESOURCE KIT!
tubb.co/GFI20
WWW.TUBBLOG.CO.UK

Weitere ähnliche Inhalte

Was ist angesagt?

NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNorth Texas Chapter of the ISSA
 
Philadelphia Tech Summit: New Network & Wireless Technologies by Qlicket
Philadelphia Tech Summit: New Network & Wireless Technologies by QlicketPhiladelphia Tech Summit: New Network & Wireless Technologies by Qlicket
Philadelphia Tech Summit: New Network & Wireless Technologies by QlicketQlicket
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud EnvironmentsProtectWise
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Cristian Garcia G.
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?Scott Carlson
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10 Avanade Nederland
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
 
Security horrors
Security horrorsSecurity horrors
Security horrorsBoy Baukema
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - VaronisHarry Gunns
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksKeepnet Labs.
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
Fortinet NSE 4   fortigate ii certificate attendance cert 2 - nov 2016 - mikh...Fortinet NSE 4   fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...Mikhongelo Madingana
 
Making Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUMMaking Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUMKongossa (KWS)
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 

Was ist angesagt? (20)

NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
Philadelphia Tech Summit: New Network & Wireless Technologies by Qlicket
Philadelphia Tech Summit: New Network & Wireless Technologies by QlicketPhiladelphia Tech Summit: New Network & Wireless Technologies by Qlicket
Philadelphia Tech Summit: New Network & Wireless Technologies by Qlicket
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
Security horrors
Security horrorsSecurity horrors
Security horrors
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacks
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
Fortinet NSE 4   fortigate ii certificate attendance cert 2 - nov 2016 - mikh...Fortinet NSE 4   fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Sprint Secure Portfolio
Sprint Secure PortfolioSprint Secure Portfolio
Sprint Secure Portfolio
 
Making Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUMMaking Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUM
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 

Ähnlich wie How to transition from selling security products to selling profitable security services

Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfinfosec train
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedJermaine Isaac
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune Systemcentralohioissa
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service ProviderVishvendra Saini
 
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For CybersecurityNathan Anderson
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 

Ähnlich wie How to transition from selling security products to selling profitable security services (20)

Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
Blockchain Security Solution.pdf
Blockchain Security Solution.pdfBlockchain Security Solution.pdf
Blockchain Security Solution.pdf
 
Blockchain Security Service
Blockchain Security ServiceBlockchain Security Service
Blockchain Security Service
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web Optimized
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Seminar
SeminarSeminar
Seminar
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 

Mehr von Richard Tubb

Building a Compelling MSP Brand Story
Building a Compelling MSP Brand StoryBuilding a Compelling MSP Brand Story
Building a Compelling MSP Brand StoryRichard Tubb
 
The Secret To Thriving and Growing in the MSP Industry
The Secret To Thriving and Growing in the MSP IndustryThe Secret To Thriving and Growing in the MSP Industry
The Secret To Thriving and Growing in the MSP IndustryRichard Tubb
 
The Future of the MSP and Security
The Future of the MSP and SecurityThe Future of the MSP and Security
The Future of the MSP and SecurityRichard Tubb
 
Protect Your MSP from Phishing Attacks
Protect Your MSP from Phishing AttacksProtect Your MSP from Phishing Attacks
Protect Your MSP from Phishing AttacksRichard Tubb
 
How To Build A Virtual Team
How To Build A Virtual TeamHow To Build A Virtual Team
How To Build A Virtual TeamRichard Tubb
 
The Mistakes MSPs Make - 08.08.18
The Mistakes MSPs Make - 08.08.18The Mistakes MSPs Make - 08.08.18
The Mistakes MSPs Make - 08.08.18Richard Tubb
 
Journaling for business success - 12.06.19
Journaling for business success - 12.06.19Journaling for business success - 12.06.19
Journaling for business success - 12.06.19Richard Tubb
 
How to Build Strong MSP Alliances
How to Build Strong MSP AlliancesHow to Build Strong MSP Alliances
How to Build Strong MSP AlliancesRichard Tubb
 
Artificial Intelligence for Managed Service Providers (MSPs)
Artificial Intelligence for Managed Service Providers (MSPs)Artificial Intelligence for Managed Service Providers (MSPs)
Artificial Intelligence for Managed Service Providers (MSPs)Richard Tubb
 
The Mistakes MSPs Make
The Mistakes MSPs MakeThe Mistakes MSPs Make
The Mistakes MSPs MakeRichard Tubb
 
How to build a successful MSP
How to build a successful MSPHow to build a successful MSP
How to build a successful MSPRichard Tubb
 
Effectiveness, Efficiency and a Cheeky Nando's
Effectiveness, Efficiency and a Cheeky Nando'sEffectiveness, Efficiency and a Cheeky Nando's
Effectiveness, Efficiency and a Cheeky Nando'sRichard Tubb
 
Webinar - How to Build a Successful MSP from Scratch
Webinar - How to Build a Successful MSP from ScratchWebinar - How to Build a Successful MSP from Scratch
Webinar - How to Build a Successful MSP from ScratchRichard Tubb
 
How IT Businesses Can Effectively Outsource and Delegate
How IT Businesses Can Effectively Outsource and DelegateHow IT Businesses Can Effectively Outsource and Delegate
How IT Businesses Can Effectively Outsource and DelegateRichard Tubb
 
If I Were to Start a Managed Service Provider (MSP) again...
If I Were to Start a Managed Service Provider (MSP) again...If I Were to Start a Managed Service Provider (MSP) again...
If I Were to Start a Managed Service Provider (MSP) again...Richard Tubb
 
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...Richard Tubb
 
Five Unusual Strategies to help MSPs retain clients, win new business and gai...
Five Unusual Strategies to help MSPs retain clients, win new business and gai...Five Unusual Strategies to help MSPs retain clients, win new business and gai...
Five Unusual Strategies to help MSPs retain clients, win new business and gai...Richard Tubb
 
Channel Co-operation - A Distant Dream?
Channel Co-operation - A Distant Dream?Channel Co-operation - A Distant Dream?
Channel Co-operation - A Distant Dream?Richard Tubb
 
Three Examples of MSP's Making Money with Autotask
Three Examples of MSP's Making Money with AutotaskThree Examples of MSP's Making Money with Autotask
Three Examples of MSP's Making Money with AutotaskRichard Tubb
 
Learnings from the Life of a Geek - Grow Yourself, Grow Your Business
Learnings from the Life of a Geek - Grow Yourself, Grow Your BusinessLearnings from the Life of a Geek - Grow Yourself, Grow Your Business
Learnings from the Life of a Geek - Grow Yourself, Grow Your BusinessRichard Tubb
 

Mehr von Richard Tubb (20)

Building a Compelling MSP Brand Story
Building a Compelling MSP Brand StoryBuilding a Compelling MSP Brand Story
Building a Compelling MSP Brand Story
 
The Secret To Thriving and Growing in the MSP Industry
The Secret To Thriving and Growing in the MSP IndustryThe Secret To Thriving and Growing in the MSP Industry
The Secret To Thriving and Growing in the MSP Industry
 
The Future of the MSP and Security
The Future of the MSP and SecurityThe Future of the MSP and Security
The Future of the MSP and Security
 
Protect Your MSP from Phishing Attacks
Protect Your MSP from Phishing AttacksProtect Your MSP from Phishing Attacks
Protect Your MSP from Phishing Attacks
 
How To Build A Virtual Team
How To Build A Virtual TeamHow To Build A Virtual Team
How To Build A Virtual Team
 
The Mistakes MSPs Make - 08.08.18
The Mistakes MSPs Make - 08.08.18The Mistakes MSPs Make - 08.08.18
The Mistakes MSPs Make - 08.08.18
 
Journaling for business success - 12.06.19
Journaling for business success - 12.06.19Journaling for business success - 12.06.19
Journaling for business success - 12.06.19
 
How to Build Strong MSP Alliances
How to Build Strong MSP AlliancesHow to Build Strong MSP Alliances
How to Build Strong MSP Alliances
 
Artificial Intelligence for Managed Service Providers (MSPs)
Artificial Intelligence for Managed Service Providers (MSPs)Artificial Intelligence for Managed Service Providers (MSPs)
Artificial Intelligence for Managed Service Providers (MSPs)
 
The Mistakes MSPs Make
The Mistakes MSPs MakeThe Mistakes MSPs Make
The Mistakes MSPs Make
 
How to build a successful MSP
How to build a successful MSPHow to build a successful MSP
How to build a successful MSP
 
Effectiveness, Efficiency and a Cheeky Nando's
Effectiveness, Efficiency and a Cheeky Nando'sEffectiveness, Efficiency and a Cheeky Nando's
Effectiveness, Efficiency and a Cheeky Nando's
 
Webinar - How to Build a Successful MSP from Scratch
Webinar - How to Build a Successful MSP from ScratchWebinar - How to Build a Successful MSP from Scratch
Webinar - How to Build a Successful MSP from Scratch
 
How IT Businesses Can Effectively Outsource and Delegate
How IT Businesses Can Effectively Outsource and DelegateHow IT Businesses Can Effectively Outsource and Delegate
How IT Businesses Can Effectively Outsource and Delegate
 
If I Were to Start a Managed Service Provider (MSP) again...
If I Were to Start a Managed Service Provider (MSP) again...If I Were to Start a Managed Service Provider (MSP) again...
If I Were to Start a Managed Service Provider (MSP) again...
 
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...
Effectiveness, Efficiency and a Cheeky Nando's - how to free up your time to ...
 
Five Unusual Strategies to help MSPs retain clients, win new business and gai...
Five Unusual Strategies to help MSPs retain clients, win new business and gai...Five Unusual Strategies to help MSPs retain clients, win new business and gai...
Five Unusual Strategies to help MSPs retain clients, win new business and gai...
 
Channel Co-operation - A Distant Dream?
Channel Co-operation - A Distant Dream?Channel Co-operation - A Distant Dream?
Channel Co-operation - A Distant Dream?
 
Three Examples of MSP's Making Money with Autotask
Three Examples of MSP's Making Money with AutotaskThree Examples of MSP's Making Money with Autotask
Three Examples of MSP's Making Money with Autotask
 
Learnings from the Life of a Geek - Grow Yourself, Grow Your Business
Learnings from the Life of a Geek - Grow Yourself, Grow Your BusinessLearnings from the Life of a Geek - Grow Yourself, Grow Your Business
Learnings from the Life of a Geek - Grow Yourself, Grow Your Business
 

Kürzlich hochgeladen

Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...pujan9679
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Kürzlich hochgeladen (20)

Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

How to transition from selling security products to selling profitable security services