Quest Technology Management

Helping clients manage their technology for over 30 years.

Security Risk and Reward

informationSecurity
Market experts love to talk about Information Security. And why wouldn’t they?! It is a beautiful market of evolving requirements and according to a new report by Global Industry Analysts, it’s projected to surpass $125 billion by 2015. Market research and revenue projections aside, what does the growing need for security practices at all levels mean for the Channel? What does it mean to the SMB space? Even large enterprises get breached, and they’ve invested billions of dollars in information security and have CIO’s and Directors overseeing teams of security admins, network security professionals, and quality control processes for application delivery. Threats can come from any level, Cisco projects that 50 billon devices will be connected to the Internet of Everything (IoE) by 2020. Applications, email, networks, remote workers, Cloud hosted databases. If your clients’ business has touched the internet, it’s likely that automated malware and botnets are searching their systems for vulnerabilities. The motives behind these infected emails, watering hole attacks and zero day threats are not always known until it is too late. Corporate databases are breached, users personally identifiable information (PII) is lost and regulators penalties and damaged consumer confidence is inevitable. Continue reading

Cloud-Reluctant Customers: Do You Walk Away?

Thus far, much of cloud computing has been “coin-operated”. Put in your quarter and out comes X amount of real-time data storage or Y period of email service, forms analysis, payroll processing, etc. The payoff: An affordable OpEx transaction that instantly delivers. So easy, so hassle-free — as long as you “fit in the box” of offerings available from the Cloud Provider. But what about those customers that don’t fit, or that aren’t willing to accept the tradeoff between affordable-instant-easy transactions and what they perceive to be loss of control over their data and processes – do you just walk away? In short, you’d be making a terrible mistake to assume these apparently cloud-reluctant customers are beyond your reach. I recommend checking out this post from Quest’s Director of Sales, Gary Schick, originally published on Channel Partners Peer-to-Peer blog.

Selling Cloud-based Virtual Desktops: A Reality Check

guyTabletWorld
Ideas are cheap, the ability to execute is priceless. Nowhere else in technology is this more apparent than in the delivery of virtual desktops. Why you ask? Because virtual desktops put DaaS providers, their partners, and clients internal IT, directly in the crosshairs of the end users and their expectations. The margin for error is razor thin. If the end user cannot easily access their virtual desktop and work from their preferred device — the best laid plans, and cost benefits for leveraging virtualization at the desktop level are meaningless. Implementing Virtual Desktop Infrastructure (VDI) is not an easy endeavor. Many CIO’s and IT staff have been “restructured”, due to costly mistakes. There are big rewards for those who can successfully deliver DaaS and VDI offerings to the market. And as with anything worth doing there are going to be challenges and risks, especially for those looking for a simple transaction. Continue reading

Channel Partners features byline article by Quest CTO – Selling Cloud Desktops 101

Channel Partners is featuring a bylined article by Mike Dillon, Quest CTO. In the article, Selling Cloud Desktops 101, Mike explains the key drivers for hosted virtual desktops, the typical questions to help qualify opportunities, and most importantly what to look out for when selecting a service provider to host your customers virtual desktops. Read more …

Do-It-Yourself Consumers of Cloud

bunch of gears shaped like a cloud
We have all been in that conversation, when a customer is describing a need, a capability or a solution requirement that is a perfect fit for a Cloud-based platform. Before they even finish speaking, we have the “answer”! We cannot wait to jump in and prove how “smart we are”, how our company, our ecosystem partners, or our Cloud offerings are cutting-edge. One problem. What if your client doesn’t buy into the Cloud strategy? What if they want to manage their core infrastructure, keep their data in-house and be able to “touch” their production? Regardless of the fact that Cloud-based solutions can remove complexities, this type of DIY IT buyer is impervious to white papers, TCO models, ROI calculators and any other presales tool used to funnel their IT spend to Cloud computing. Now what? Continue reading

Differentiation Begins with a Customer-Focused Agenda

When the products and services you offer look pretty much like everyone else’s products and services, what can you do to differentiate yourself? If your only option is to stand out with price, you risk eventually cannibalizing your own business. That’s not all. By focusing only on price quotes for the immediate transaction, you’re leaving other unrecognized opportunities on the table. So you need to resist the knee-jerk into a price quote and find ways to describe your value-add in terms other than price. To learn more about how you can be unique and grow your margins, I recommend reading this post from Quest’s Director of Sales, Gary Schick, originally published on Channel Partners Peer-to-Peer blog.

How secure do your customers think they really are?

Man looking up at giant words like: Malware, Security, Cloud Services, Virus, etc.
These days, one of the biggest challenges your customers face is keeping their data, apps, and infrastructure secure from malware, hackers, and thieves. Quest can help you keep your customers safe and identify vulnerabilities that are often overlooked. With comprehensive state-of-the-art security capabilities, Quest has built the understanding that to be effective, security measures need to work together in awareness of each other. That’s why we customize, integrate, and fine-tune our security offerings to precisely fit your customers’ particular needs. Continue reading

Optimizing Clients Backup and Recovery Strategies

How many of your customers can reliably backup their data, then reliably recover it?   Data backup has moved beyond traditional tape, which is notoriously unreliable. Fortunately, with Quest’s help you can offer your customers alternatives that provide a range of reliable and affordable data availability options.
Continue reading

It’s About the Relationship

a handshake
We all tend to focus on bringing in new customers. But don’t be fooled — retaining the customers you currently have is critical and sometimes easy to neglect. How do you proceed when you’ve brought aboard a new project from one of your existing customers that stretches beyond your current comfort zone, such as cloud services, where you’ll need a Partner’s help to deliver? To help you navigate those waters of finding a Partner that you can trust will deliver the level of service your customers expect, I recommend checking out this post from Quest’s Director of Sales, Gary Schick, originally published on Channel Partners Peer-to-Peer blog.

Quest’s Global Network of Service Delivery Centers are Ready Right Now to Meet Your Clients’ Needs

Map of Quest's global network of Service Delivery Centers
When it comes to choosing a partner to help you meet changing client demands, you face some tough decisions. As I see it, you need three things to make a successful partnership:
  1. A partner who’s willing to share — i.e., when you make a sale, you get a piece of the proceeds, including a portion of ongoing revenue from Cloud service subscriptions.
  2. A partner with the right offerings — i.e., a solid bench of Cloud and other technology solutions that truly address your clients’ requirements.
  3. A partner who fields sufficient resources to reliably deliver what you’ve promised your clients — i.e., not merely strong technical experience/expertise but also a network of leading edge data centers specifically designed with the virtualization, automated management, and security capabilities.
Continue reading