Quest Technology Management

Helping clients manage their technology for over 30 years.

Protect the Base: Network Support

Network Support by Quest

As cloud and managed services play a larger and larger role in your customers’ IT operations, the state of their network services, which underpin these more visible cloud and managed services, is likely to become an issue — if it hasn’t already.

After all, your customers’ networks must accommodate new business-essential demands like secure application delivery, mobile user access, and end user authentication. These demands on networks often designed for earlier eras with earlier technologies can trigger problems related to network performance, application workloads, security and compliance, monitoring and management, and, as always, cost.

And when that happens, your customers will be calling you seeking a right-now-hurry-up fix.

Continue reading

Quest Partner Playbook: for when your customer needs extra help

Partner Playbook by Quest

In the industry of business technology, your customer relationships are crucial to your success. But to “land and expand” often means integrating capabilities or solutions that your organization may not cater to.

So what do you do when you’ve won a customer project that stretches beyond your current comfort zone, and you’re not sure you’ll be able to deliver?

Head to the Quest Partner Playbook – your go-to resource for those moments when you don’t want to leave a customer hanging, but still need a game plan for options and next steps.

Continue reading

Meet Do-it-Yourself Dave… He does it all!

When it comes to technology, you and I both know that it’s best to let the experts take the lead. Your customers, well-intentioned though they may be, may disagree—and not to their benefit. Do you have a “Do-it-Yourself” client?.

With thousands of different brands that are not always compatible, millions of different configurations, and innumerable ways a network can be compromised, your customers’ technology should not be a DIY job.



Continue reading

On Security

Security spelled out underneath a padlock

I was visiting with a friend recently when the topic of Target’s security breach came up. We both had been part of the massive data breach and lost some of our banking information. We both had replaced our credit cards and that is where the similarities ended.

Although alarming as this latest breach was, it did not really impact my consciousness or my day-to-day consumer habits.  We live in a world where data is our identity and I have taken certain steps to secure myself and those I care about. Continue reading

Security Risk and Reward

informationSecurity
Market experts love to talk about Information Security. And why wouldn’t they?! It is a beautiful market of evolving requirements and according to a new report by Global Industry Analysts, it’s projected to surpass $125 billion by 2015. Market research and revenue projections aside, what does the growing need for security practices at all levels mean for the Channel? What does it mean to the SMB space? Even large enterprises get breached, and they’ve invested billions of dollars in information security and have CIO’s and Directors overseeing teams of security admins, network security professionals, and quality control processes for application delivery. Threats can come from any level, Cisco projects that 50 billon devices will be connected to the Internet of Everything (IoE) by 2020. Applications, email, networks, remote workers, Cloud hosted databases. If your clients’ business has touched the internet, it’s likely that automated malware and botnets are searching their systems for vulnerabilities. The motives behind these infected emails, watering hole attacks and zero day threats are not always known until it is too late. Corporate databases are breached, users personally identifiable information (PII) is lost and regulators penalties and damaged consumer confidence is inevitable. Continue reading

Do-It-Yourself Consumers of Cloud

bunch of gears shaped like a cloud
We have all been in that conversation, when a customer is describing a need, a capability or a solution requirement that is a perfect fit for a Cloud-based platform. Before they even finish speaking, we have the “answer”! We cannot wait to jump in and prove how “smart we are”, how our company, our ecosystem partners, or our Cloud offerings are cutting-edge. One problem. What if your client doesn’t buy into the Cloud strategy? What if they want to manage their core infrastructure, keep their data in-house and be able to “touch” their production? Regardless of the fact that Cloud-based solutions can remove complexities, this type of DIY IT buyer is impervious to white papers, TCO models, ROI calculators and any other presales tool used to funnel their IT spend to Cloud computing. Now what? Continue reading

Best Practices for Adding Managed IT Services (Even if You’re Not an IT Guy)

Channel Partners Magazine cover featuring article mentioned in blog post
If you are an “IT guy” offering managed services may be a no-brainer, but that doesn’t necessarily mean you’ve done it or are doing it successfully. If you aren’t an IT guy, but a telecom reseller or agent, and you see the opportunity, but are concerned about your lack of IT expertise. Either way, building a new line of business can be intimidating — not to mention capital- and time-intensive — without reasonable assurances of success. Khali Henderson, Editor in Chief, Channel Partners recently interviewed Tim Burke, CEO of Quest regarding best practices for adding managed services, including turnkey and resell options that can jumpstart your time to profitability in the managed services space. To read the rest of the interview, click here: Best Practices for Adding Managed IT Services (Even if You’re Not an IT Guy)