SlideShare a Scribd company logo
The
New MSP
Service Level
Agreement
SLA Playbook
How MSPs are
customizing SLAs.
Prefabricated SLA
templates can no longer be
plucked from a hard drive
and e-mailed to clients.
MSPs must collaborate
with customers to create an
SLA that balances business
Hybrid cloud
deployments
and the era
of always-on.demands with the cost
expectations of the service.
Steve Groom, CEO of MSP
Vissensa, offers insights on
what MSPs should consider
in creating custom SLAs.
Be specific
about uptime.
“When it comes to the rate
disinfectants kill bacteria,
99.9% might be sufficient—
but that doesn’t work
with promised uptime.
99.999% is 5.26 minutes
per year, but go to 99.95%,
and it’s 4.3 hours a year,”
Groom says. “That’s a
huge difference, especially
when there’s mandatory
downtime for patching.”
The
inthe details.
devil’s
Set client
expectations.
Groom: “The education
process is closer to
collaboration than
explanation. Customers
need to understand
exactly what they should
Collaborate
and
educate.be expecting from an
SLA, and MSPs need to
know what the objective
of the SLA is in a business
context.Identifying the
critical services, such as
data recovery or network
connectivity is key, so
we can consider how to
include these in an SLA.”
Cut the service
credits.
“As we get more and more
into the expectation of
always-on, there’s no point
in offering a service credit if
you fail to match the SLA,”
Groom says. “The damage
to a business of not
being on, even for a brief
moment, is exponential to
what a service credit can
make up for.”
Making
is
hard
to do.
up
SLAs need to
work together.
“If a disk fails, we’ll
respond and inform the
customer, who might have
a standing instruction
implied in a service SLA,”
Groom says. “But that
has to be intertwined with
Keep your
eye on
the
big picture.the hardware SLA, which
considers the infrastructure.
We have to be diligent in
keeping them informed
of our actions within the
parameters of all
our agreements.”
You might underdeliver.
“The most important
thing is not to overextend
your SLAs beyond the
SLAs that your upstream
providers are able to
commit to,” Groom says.
Don’t
overpromise.“That’s really key. If you
skimp on a data center
resource, overpromising
on uptime is a guarantee
you might not be able
to match.”
Learn more.
Read more about
customized SLAs and
the hybrid cloud from
Pivot Point.

More Related Content

Similar to SLA Playbook: The New MSP Service Level Agreement

The career advancement playbook - Cloud edition
The career advancement playbook - Cloud editionThe career advancement playbook - Cloud edition
The career advancement playbook - Cloud edition
IBM Software India
 
The Career-Advancement Playbook: Cloud Edition
The Career-Advancement Playbook: Cloud EditionThe Career-Advancement Playbook: Cloud Edition
The Career-Advancement Playbook: Cloud Edition
Jyothi Satyanathan
 
Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contract
WGroup
 
A Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAsA Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAs
TechExcel
 
LicencesAren'tAssets
LicencesAren'tAssetsLicencesAren'tAssets
LicencesAren'tAssetsBen Jarvis
 
Contract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive BriefContract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive Brief
sealsoftwaredept
 
Is cloud computing right for your business
Is cloud computing right for your businessIs cloud computing right for your business
Is cloud computing right for your business
Tyrone Systems
 
Ins and Outs of Cloud Contact Centers
Ins and Outs of Cloud Contact CentersIns and Outs of Cloud Contact Centers
Ins and Outs of Cloud Contact Centers
Dave Howard
 
Therefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to pTherefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to p
GrazynaBroyles24
 
Contract Management In the Cloud
Contract Management In the CloudContract Management In the Cloud
Contract Management In the CloudVivastream
 
Ebook
EbookEbook
CCW Feb 2015 CRM CLOUD ARTICLE
CCW Feb 2015 CRM CLOUD ARTICLECCW Feb 2015 CRM CLOUD ARTICLE
CCW Feb 2015 CRM CLOUD ARTICLEIan Moyse ☁
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopSherry Jones
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopSherry Jones
 
How Much Downtime is Too Much?
How Much Downtime is Too Much?How Much Downtime is Too Much?
How Much Downtime is Too Much?
Davis J Martin
 
Contingent Workforce Solution
Contingent Workforce SolutionContingent Workforce Solution
Contingent Workforce SolutionMichael Wiley
 
How to avoid a cloud disaster
How to avoid a cloud disasterHow to avoid a cloud disaster
How to avoid a cloud disaster
PROACT IT
 
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
HostSailor
 
Supporting SMBs in their Journey to the Cloud with AppHelp
Supporting SMBs in their Journey to the Cloud with AppHelpSupporting SMBs in their Journey to the Cloud with AppHelp
Supporting SMBs in their Journey to the Cloud with AppHelp
Madeline Titcomb
 

Similar to SLA Playbook: The New MSP Service Level Agreement (20)

The career advancement playbook - Cloud edition
The career advancement playbook - Cloud editionThe career advancement playbook - Cloud edition
The career advancement playbook - Cloud edition
 
The Career-Advancement Playbook: Cloud Edition
The Career-Advancement Playbook: Cloud EditionThe Career-Advancement Playbook: Cloud Edition
The Career-Advancement Playbook: Cloud Edition
 
Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contract
 
A Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAsA Practical Guide to Implementing SLAs
A Practical Guide to Implementing SLAs
 
LicencesAren'tAssets
LicencesAren'tAssetsLicencesAren'tAssets
LicencesAren'tAssets
 
Contract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive BriefContract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive Brief
 
Is cloud computing right for your business
Is cloud computing right for your businessIs cloud computing right for your business
Is cloud computing right for your business
 
GCI0906_S_Challenge Outsourcing
GCI0906_S_Challenge OutsourcingGCI0906_S_Challenge Outsourcing
GCI0906_S_Challenge Outsourcing
 
Ins and Outs of Cloud Contact Centers
Ins and Outs of Cloud Contact CentersIns and Outs of Cloud Contact Centers
Ins and Outs of Cloud Contact Centers
 
Therefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to pTherefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to p
 
Contract Management In the Cloud
Contract Management In the CloudContract Management In the Cloud
Contract Management In the Cloud
 
Ebook
EbookEbook
Ebook
 
CCW Feb 2015 CRM CLOUD ARTICLE
CCW Feb 2015 CRM CLOUD ARTICLECCW Feb 2015 CRM CLOUD ARTICLE
CCW Feb 2015 CRM CLOUD ARTICLE
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
McClure FedRAMP for FedScoop
McClure FedRAMP for FedScoopMcClure FedRAMP for FedScoop
McClure FedRAMP for FedScoop
 
How Much Downtime is Too Much?
How Much Downtime is Too Much?How Much Downtime is Too Much?
How Much Downtime is Too Much?
 
Contingent Workforce Solution
Contingent Workforce SolutionContingent Workforce Solution
Contingent Workforce Solution
 
How to avoid a cloud disaster
How to avoid a cloud disasterHow to avoid a cloud disaster
How to avoid a cloud disaster
 
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
Tips To Find the Best Colocation Hosting Provider | Shared Hosting Providers ...
 
Supporting SMBs in their Journey to the Cloud with AppHelp
Supporting SMBs in their Journey to the Cloud with AppHelpSupporting SMBs in their Journey to the Cloud with AppHelp
Supporting SMBs in their Journey to the Cloud with AppHelp
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

SLA Playbook: The New MSP Service Level Agreement

  • 2. How MSPs are customizing SLAs. Prefabricated SLA templates can no longer be plucked from a hard drive and e-mailed to clients. MSPs must collaborate with customers to create an SLA that balances business Hybrid cloud deployments and the era of always-on.demands with the cost expectations of the service. Steve Groom, CEO of MSP Vissensa, offers insights on what MSPs should consider in creating custom SLAs.
  • 3. Be specific about uptime. “When it comes to the rate disinfectants kill bacteria, 99.9% might be sufficient— but that doesn’t work with promised uptime. 99.999% is 5.26 minutes per year, but go to 99.95%, and it’s 4.3 hours a year,” Groom says. “That’s a huge difference, especially when there’s mandatory downtime for patching.” The inthe details. devil’s
  • 4. Set client expectations. Groom: “The education process is closer to collaboration than explanation. Customers need to understand exactly what they should Collaborate and educate.be expecting from an SLA, and MSPs need to know what the objective of the SLA is in a business context.Identifying the critical services, such as data recovery or network connectivity is key, so we can consider how to include these in an SLA.”
  • 5. Cut the service credits. “As we get more and more into the expectation of always-on, there’s no point in offering a service credit if you fail to match the SLA,” Groom says. “The damage to a business of not being on, even for a brief moment, is exponential to what a service credit can make up for.” Making is hard to do. up
  • 6. SLAs need to work together. “If a disk fails, we’ll respond and inform the customer, who might have a standing instruction implied in a service SLA,” Groom says. “But that has to be intertwined with Keep your eye on the big picture.the hardware SLA, which considers the infrastructure. We have to be diligent in keeping them informed of our actions within the parameters of all our agreements.”
  • 7. You might underdeliver. “The most important thing is not to overextend your SLAs beyond the SLAs that your upstream providers are able to commit to,” Groom says. Don’t overpromise.“That’s really key. If you skimp on a data center resource, overpromising on uptime is a guarantee you might not be able to match.”
  • 8. Learn more. Read more about customized SLAs and the hybrid cloud from Pivot Point.