SlideShare a Scribd company logo
Building Recurring Revenue from Reactive Customers 
© 2014 N-able Technologies, Inc.All rights reserved.
Some thoughts on the market 
© 2014 N-able Technologies, Inc.All rights reserved.
IT Service Maturity Model 
Reactive 
Managed
75% of the market is reactive 
•They aren’t interested in fixed-fee managed services 
•Your opportunity is selling a new service or replacing existing consumer software 
© 2014 N-able Technologies, Inc.All rights reserved.
Show them a better way 
© 2014 N-able Technologies, Inc.All rights reserved. 
Current Products 
Revenue Opportunity 
Windows Update 
Managed patch 
ConsumerAntivirus 
Managed security 
Consumer Backup 
Managed backup 
Ad-hoc hardware upgrades 
PC refresh planning
Building recurring revenue from reactive customers 
© 2014 N-able Technologies, Inc.All rights reserved.
Step 2: Build Trust 
© 2014 N-able Technologies, Inc.All rights reserved. 
Step 1: Audit 
Step 3: Sell
© 2014 N-able Technologies, Inc.All rights reserved. 
Step 1: Audit
Step 1: Learn their network 
Patch Status 
Antivirus Status 
Backup Status 
Network security 
Hardware Inventory 
Warranty Information 
Agents 
© 2014 N-able Technologies, Inc.All rights reserved.
Step 1: Learn their network 
N-central® 
Agents 
© 2014 N-able Technologies, Inc.All rights reserved. 
Patch Status 
Antivirus Status 
Backup Status 
Network security 
Hardware Inventory 
Warranty Information
Step 1: Learn their network 
N-central 
Provide value and sell 
Keep your foot in the door 
Fast remote control 
Agents 
© 2014 N-able Technologies, Inc.All rights reserved. 
Patch Status 
Antivirus Status 
Backup Status 
Network security 
Hardware Inventory 
Warranty Information
Step 2: Build Trust 
© 2014 N-able Technologies, Inc.All rights reserved. 
Step 1: Audit
Provide value before you sell 
Show customers the current state of the network 
© 2014 N-able Technologies, Inc.All rights reserved.
Free audit & assessment 
Warranty of critical equipment 
–Don’t want to have server out of warranty 
–Reduce chance of lengthy downtime 
Installed software report 
–Identify software for replacement 
–Identify custom software (had a custom application built, only works in Windows XP) 
License key inventory for Microsoft 
–Customer’s rarely on top of their licensing 
–Consolidate licenses (20 licenses of MS project but only 1 project manager) 
Open ports review –Security Audit 
–FTP ports, VNC or remote control ports open 
Network share inventory 
–Permissions audit 
–Have the info so you can restore properly
Identify Revenue Opportunities 
Antivirus status 
–Identify unprotected nodes and the quality of their AV product 
Full patch status overview 
–Identify Security vulnerabilities and performance issues 
Capacity planning 
–Systems in need of upgrade Disk, RAM, etc 
Full asset & hardware inventory 
–PC refresh planning 
–Understanding what they have in their network
Step 2: Build Trust 
© 2014 N-able Technologies, Inc.All rights reserved. 
Step 1: Audit 
Step 3: Sell
A-la-carte Managed Services 
RMM agent 
Managed Security 
Managed Backup 
Managed Patch
Sell Managed Security 
© 2014 N-able Technologies, Inc.All rights reserved. 
Consumer AV 
ManagedSecurity 
Range of protection 
Have to manually add new nodes 
Typically no centralizedalerting 
Antivirus and Anti-malware protection 
Auto-discovers new nodes 
Centralized alerting 
Comprehensive reporting
Sell Managed Backup 
© 2014 N-able Technologies, Inc.All rights reserved. 
Consumer Antivirus 
ManagedBackup 
Many SMBs perform little/no backup 
No verificationof backups 
No alerting 
No reporting 
Secure their critical systems and data 
Reliablebackup 
Fasterrestores lead to lessdowntime 
Off-site replication 
Monitoring backup processes 
Centralized alerting 
Comprehensivereporting
Sell Managed Patch 
© 2014 N-able Technologies, Inc.All rights reserved. 
Windows Update 
ManagedPatch 
Users ignore updates 
Users miss updates dueto travel 
Nobaseline across applications 
Ensure all systems are patched regardless of where they are 
Uniform versionsdecreases problems 
Require authorization for patches
Sell Additional Services 
© 2014 N-able Technologies, Inc.All rights reserved. 
Additional Services 
Hardwarerefresh 
Warranty management 
License management 
Project services
© 2014 N-able Technologies, Inc.All rights reserved. 
Conclusion 
Step 1: Audit 
Learn as much as you can about theirnetwork and environment 
Step2: Build Trust 
Provide valuewith free assessments and reports 
Step 3: Sell 
Fillin their gaps and replace their consumer IT products that aren’t delivering the value that you can
Provide GreatService 
Automation Manager 
Help Desk Manager 
Report 
Manager 
Remote Control Manager 
Build Recurring Revenue 
Security 
Manager 
Backup 
Manager 
Patch 
Manager 
Audit 
Manager 
Mobile 
Manager 
N-central RMMAn MSP’s complete toolkit 
© 2014 N-able Technologies, Inc.All rights reserved.
Download now: http://bit.ly/Nablepricing2014 
© 2014 N-able Technologies, Inc.All rights reserved.
Legal Information 
The N-able Technologies and N-central trademarks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries.All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. 
© 2013 N-able Technologies, Inc.All rights reserved. 
© 2014 N-able Technologies, Inc.All rights reserved.

More Related Content

What's hot

Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
Elena Benson
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
SwiftTech Solutions, Inc.
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
Elena Benson
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Servicesjoshua paul
 
NOC Service desk
NOC Service deskNOC Service desk
NOC Service desk
america.gss
 
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
AllianceTechnologies
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
 
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
ManageEngine, Zoho Corporation
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
Muhannad Kalbouneh
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
Elena Benson
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
Power Admin LLC
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
ManageEngine, Zoho Corporation
 
Leading oil company in China manages 1500 devices with OpManager
Leading oil company in China manages 1500 devices with OpManagerLeading oil company in China manages 1500 devices with OpManager
Leading oil company in China manages 1500 devices with OpManager
ManageEngine, Zoho Corporation
 
WANO - IND - Product Presentation
WANO - IND - Product PresentationWANO - IND - Product Presentation
WANO - IND - Product PresentationYudi Rachman
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopal
Charles Symons
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentationGraeme Spice
 
Network operation center
Network operation centerNetwork operation center
Network operation center
MapYourTech
 

What's hot (20)

Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
 
Inform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support ServicesInform Interiors Proposal for Managed Support Services
Inform Interiors Proposal for Managed Support Services
 
NOC Service desk
NOC Service deskNOC Service desk
NOC Service desk
 
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
Solving Your IT Challenges with Alliance Technologies and Invision Managed Se...
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
doinell.bautista
doinell.bautistadoinell.bautista
doinell.bautista
 
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...Retail conglomerate in Latin America monitors 8000+ app components with Appli...
Retail conglomerate in Latin America monitors 8000+ app components with Appli...
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Leading oil company in China manages 1500 devices with OpManager
Leading oil company in China manages 1500 devices with OpManagerLeading oil company in China manages 1500 devices with OpManager
Leading oil company in China manages 1500 devices with OpManager
 
Network Audit
Network AuditNetwork Audit
Network Audit
 
WANO - IND - Product Presentation
WANO - IND - Product PresentationWANO - IND - Product Presentation
WANO - IND - Product Presentation
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopal
 
Support
SupportSupport
Support
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentation
 
Network operation center
Network operation centerNetwork operation center
Network operation center
 

Similar to Build recurring revenue from reactive customers 20140924

June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
Solarwinds N-able
 
Automating your Microsoft® World - Part 2: Cloud and Application Management B...
Automating your Microsoft® World - Part 2: Cloud and Application Management B...Automating your Microsoft® World - Part 2: Cloud and Application Management B...
Automating your Microsoft® World - Part 2: Cloud and Application Management B...
Solarwinds N-able
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
Solarwinds N-able
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
Solarwinds N-able
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
Solarwinds N-able
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
Solarwinds N-able
 
Automating your Microsoft World Part one
Automating your Microsoft World Part one Automating your Microsoft World Part one
Automating your Microsoft World Part one
Solarwinds N-able
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1
Solarwinds N-able
 
Backup manager
Backup manager Backup manager
Backup manager
Tracy Trottier
 
Spur Infrastructure Performance With Proactive IT Monitoring
Spur Infrastructure Performance With Proactive IT MonitoringSpur Infrastructure Performance With Proactive IT Monitoring
Spur Infrastructure Performance With Proactive IT Monitoring
CA Technologies
 
N-able Report Manager 4.3 -- Patch Management Just Got Easier
N-able Report Manager 4.3 -- Patch Management Just Got EasierN-able Report Manager 4.3 -- Patch Management Just Got Easier
N-able Report Manager 4.3 -- Patch Management Just Got Easier
Solarwinds N-able
 
Reporting the value of your managed services
Reporting the value of your managed servicesReporting the value of your managed services
Reporting the value of your managed services
Solarwinds N-able
 
Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010
Jonnyhyde
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
CA Technologies
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
Shawn Jordan
 
Audit Manager -- Compliance made easy
Audit Manager -- Compliance made easyAudit Manager -- Compliance made easy
Audit Manager -- Compliance made easy
Solarwinds N-able
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
Nguyen Binh
 
Report Manager 4.3 Launch
Report Manager 4.3 LaunchReport Manager 4.3 Launch
Report Manager 4.3 Launch
Solarwinds N-able
 

Similar to Build recurring revenue from reactive customers 20140924 (20)

June 09 - build recurring revenue from reactive customers
June 09  -  build recurring revenue from reactive customersJune 09  -  build recurring revenue from reactive customers
June 09 - build recurring revenue from reactive customers
 
Automating your Microsoft® World - Part 2: Cloud and Application Management B...
Automating your Microsoft® World - Part 2: Cloud and Application Management B...Automating your Microsoft® World - Part 2: Cloud and Application Management B...
Automating your Microsoft® World - Part 2: Cloud and Application Management B...
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Automating your Microsoft World Part one
Automating your Microsoft World Part one Automating your Microsoft World Part one
Automating your Microsoft World Part one
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1
 
Backup manager
Backup manager Backup manager
Backup manager
 
Spur Infrastructure Performance With Proactive IT Monitoring
Spur Infrastructure Performance With Proactive IT MonitoringSpur Infrastructure Performance With Proactive IT Monitoring
Spur Infrastructure Performance With Proactive IT Monitoring
 
N-able Report Manager 4.3 -- Patch Management Just Got Easier
N-able Report Manager 4.3 -- Patch Management Just Got EasierN-able Report Manager 4.3 -- Patch Management Just Got Easier
N-able Report Manager 4.3 -- Patch Management Just Got Easier
 
Reporting the value of your managed services
Reporting the value of your managed servicesReporting the value of your managed services
Reporting the value of your managed services
 
Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
AME Support & Service
AME Support & Service AME Support & Service
AME Support & Service
 
Audit Manager -- Compliance made easy
Audit Manager -- Compliance made easyAudit Manager -- Compliance made easy
Audit Manager -- Compliance made easy
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Report Manager 4.3 Launch
Report Manager 4.3 LaunchReport Manager 4.3 Launch
Report Manager 4.3 Launch
 

More from Solarwinds N-able

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
Solarwinds N-able
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
Solarwinds N-able
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
Solarwinds N-able
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
Solarwinds N-able
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
Solarwinds N-able
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
Solarwinds N-able
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
Solarwinds N-able
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
Solarwinds N-able
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
Solarwinds N-able
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
Solarwinds N-able
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
Solarwinds N-able
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Solarwinds N-able
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
Solarwinds N-able
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
Solarwinds N-able
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
Solarwinds N-able
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
Solarwinds N-able
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
Solarwinds N-able
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
Solarwinds N-able
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
Solarwinds N-able
 

More from Solarwinds N-able (20)

5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery5 ways MSP N-central 11 will revolutionize your service delivery
5 ways MSP N-central 11 will revolutionize your service delivery
 
MSP Business Plan in a Box
MSP Business Plan in a BoxMSP Business Plan in a Box
MSP Business Plan in a Box
 
The Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales ProducersThe Math and Science of Top MSP Sales Producers
The Math and Science of Top MSP Sales Producers
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
The Math and Science of Top MSP Profitability
The Math and Science of Top MSP ProfitabilityThe Math and Science of Top MSP Profitability
The Math and Science of Top MSP Profitability
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Pricing and packaging for MSPs
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPs
 
N central 10 1 launch webinar
N central 10 1 launch webinarN central 10 1 launch webinar
N central 10 1 launch webinar
 
3 ways to optimize it business management
3 ways to optimize it business management3 ways to optimize it business management
3 ways to optimize it business management
 
Advance your business using Report Manager
Advance your business using Report ManagerAdvance your business using Report Manager
Advance your business using Report Manager
 
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
Marketing for the MSP: 5 Steps to Building a Great (and measurable) Marketing...
 
MSP Manager Launch Webinar
MSP Manager Launch WebinarMSP Manager Launch Webinar
MSP Manager Launch Webinar
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Social Media for the MSP
Social Media for the MSPSocial Media for the MSP
Social Media for the MSP
 
5 challenges infographic
5 challenges infographic5 challenges infographic
5 challenges infographic
 
N central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA IntegrationN central 10 - AutoTask PSA Integration
N central 10 - AutoTask PSA Integration
 
The how and why of patch management
The how and why of patch managementThe how and why of patch management
The how and why of patch management
 
Getting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-centralGetting the most out of your ConnectWise Integration with N-central
Getting the most out of your ConnectWise Integration with N-central
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Build recurring revenue from reactive customers 20140924

  • 1. Building Recurring Revenue from Reactive Customers © 2014 N-able Technologies, Inc.All rights reserved.
  • 2. Some thoughts on the market © 2014 N-able Technologies, Inc.All rights reserved.
  • 3. IT Service Maturity Model Reactive Managed
  • 4. 75% of the market is reactive •They aren’t interested in fixed-fee managed services •Your opportunity is selling a new service or replacing existing consumer software © 2014 N-able Technologies, Inc.All rights reserved.
  • 5. Show them a better way © 2014 N-able Technologies, Inc.All rights reserved. Current Products Revenue Opportunity Windows Update Managed patch ConsumerAntivirus Managed security Consumer Backup Managed backup Ad-hoc hardware upgrades PC refresh planning
  • 6. Building recurring revenue from reactive customers © 2014 N-able Technologies, Inc.All rights reserved.
  • 7. Step 2: Build Trust © 2014 N-able Technologies, Inc.All rights reserved. Step 1: Audit Step 3: Sell
  • 8. © 2014 N-able Technologies, Inc.All rights reserved. Step 1: Audit
  • 9. Step 1: Learn their network Patch Status Antivirus Status Backup Status Network security Hardware Inventory Warranty Information Agents © 2014 N-able Technologies, Inc.All rights reserved.
  • 10. Step 1: Learn their network N-central® Agents © 2014 N-able Technologies, Inc.All rights reserved. Patch Status Antivirus Status Backup Status Network security Hardware Inventory Warranty Information
  • 11. Step 1: Learn their network N-central Provide value and sell Keep your foot in the door Fast remote control Agents © 2014 N-able Technologies, Inc.All rights reserved. Patch Status Antivirus Status Backup Status Network security Hardware Inventory Warranty Information
  • 12. Step 2: Build Trust © 2014 N-able Technologies, Inc.All rights reserved. Step 1: Audit
  • 13. Provide value before you sell Show customers the current state of the network © 2014 N-able Technologies, Inc.All rights reserved.
  • 14. Free audit & assessment Warranty of critical equipment –Don’t want to have server out of warranty –Reduce chance of lengthy downtime Installed software report –Identify software for replacement –Identify custom software (had a custom application built, only works in Windows XP) License key inventory for Microsoft –Customer’s rarely on top of their licensing –Consolidate licenses (20 licenses of MS project but only 1 project manager) Open ports review –Security Audit –FTP ports, VNC or remote control ports open Network share inventory –Permissions audit –Have the info so you can restore properly
  • 15. Identify Revenue Opportunities Antivirus status –Identify unprotected nodes and the quality of their AV product Full patch status overview –Identify Security vulnerabilities and performance issues Capacity planning –Systems in need of upgrade Disk, RAM, etc Full asset & hardware inventory –PC refresh planning –Understanding what they have in their network
  • 16. Step 2: Build Trust © 2014 N-able Technologies, Inc.All rights reserved. Step 1: Audit Step 3: Sell
  • 17. A-la-carte Managed Services RMM agent Managed Security Managed Backup Managed Patch
  • 18. Sell Managed Security © 2014 N-able Technologies, Inc.All rights reserved. Consumer AV ManagedSecurity Range of protection Have to manually add new nodes Typically no centralizedalerting Antivirus and Anti-malware protection Auto-discovers new nodes Centralized alerting Comprehensive reporting
  • 19. Sell Managed Backup © 2014 N-able Technologies, Inc.All rights reserved. Consumer Antivirus ManagedBackup Many SMBs perform little/no backup No verificationof backups No alerting No reporting Secure their critical systems and data Reliablebackup Fasterrestores lead to lessdowntime Off-site replication Monitoring backup processes Centralized alerting Comprehensivereporting
  • 20. Sell Managed Patch © 2014 N-able Technologies, Inc.All rights reserved. Windows Update ManagedPatch Users ignore updates Users miss updates dueto travel Nobaseline across applications Ensure all systems are patched regardless of where they are Uniform versionsdecreases problems Require authorization for patches
  • 21. Sell Additional Services © 2014 N-able Technologies, Inc.All rights reserved. Additional Services Hardwarerefresh Warranty management License management Project services
  • 22. © 2014 N-able Technologies, Inc.All rights reserved. Conclusion Step 1: Audit Learn as much as you can about theirnetwork and environment Step2: Build Trust Provide valuewith free assessments and reports Step 3: Sell Fillin their gaps and replace their consumer IT products that aren’t delivering the value that you can
  • 23. Provide GreatService Automation Manager Help Desk Manager Report Manager Remote Control Manager Build Recurring Revenue Security Manager Backup Manager Patch Manager Audit Manager Mobile Manager N-central RMMAn MSP’s complete toolkit © 2014 N-able Technologies, Inc.All rights reserved.
  • 24. Download now: http://bit.ly/Nablepricing2014 © 2014 N-able Technologies, Inc.All rights reserved.
  • 25. Legal Information The N-able Technologies and N-central trademarks are the exclusive property of N-able Technologies, Inc. and its affiliates, are registered with the U.S. Patent and Trademark Office and the Canadian Intellectual Property Office, and may be registered or pending registration in other countries. All other N-able trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States, Canada, or in other countries.All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 N-able Technologies, Inc.All rights reserved. © 2014 N-able Technologies, Inc.All rights reserved.