ScalePad is excited to announce that Lifecycle Insights Partners now have a way to help their clients reduce the possibilities of security breaches through integrating with Hook Security.
The integration enhances your team’s visibility into your clients’ security awareness training performance.
Now, MSPs can quickly highlight their clients’ riskiest users and create client reports directly in Lifecycle Insights, strengthening security training and compliance conversations during strategic conversations and QBRs.
Hook Security is a psychological and behavioral science software provider focused on solving two distinct issues in the security awareness training industry. They create effective training experiences based on the latest psychological research, and provide access to businesses of all sizes.
Hook believes fighting cybercrime starts with your people, so they aim to create security awareness training that employees actually love. They create personalized training experiences to effectively train employees on security awareness.
Hook Security provides the complete toolkit for any company to create a healthy security-aware culture. The platform includes everything MSPs need to train end-users to mitigate end-user risks including:
MSPs can use the platform to implement a comprehensive security awareness program to train clients quickly and easily, reduce phishing vulnerabilities, and effectively monitor ongoing risk in clients.
On a client level, MSPs can access the security awareness performance in More Reports or Report Builder to identify areas for client improvement. Partners can view overall phishing click-rate and overall training status for each end client.
Easily drill-down by individual user to see who is up-to-date on training and who may need a refresher based on phishing results.
Within the Lifecycle Insights, client security training information is synced in from Hook Security including the
MSPs can sort and filter the data to identify clients’ employees that may require more security training to keep their organizations secure. Constant follow-up to remove risk creates an overall stronger security posture for each client.
MSPs can also confirm users are enrolled in Hook Security and those who aren’t through a simple color coded table to ensure no end-users miss any required security training.
Getting the data is great, but transforming that into actionable steps is what makes the Hook Security integration with Lifecycle Insights so powerful. It provides actionable intel to vCIOs and Account Managers so they can have the necessary conversations with clients to identify where they are on their security journey and keep them secure.
Integrating both platforms helps MSPs provide a top-tier service to clients. This integration will help build a trusted and reliable relationship with your clients.
IT industry professionals understand the growing significance of effectively managing, sharing and storing sensitive data and information. Many highly regulated industries, from financial services to healthcare to government, have security compliance standards that are mandatory. The complexities of these standards can’t be overstated. With stringent guidelines and checklists, industry-specific frameworks are robust, time-consuming, and intimidating. Luckily, there are solutions for streamlining the compliance journey, helping MSPs and their clients navigate the complexities with ease.
The newest framework for the ControlMap platform, the Criminal Justice Information Services Security Policy (CJIS), is a set of security standards created by the FBI. This required framework ensures the protection of sensitive information within the criminal justice system in the United States, applying to federal, state, and local law enforcement agencies (police/fire/emergency responders) and their vendors.
To get the full scoop on CJIS, let’s go over the fundamentals of the framework and how ControlMap can modernize the approach to becoming compliant.
A framework detailing security requirements for the handling, storing, and dissemination of criminal justice information, the CJIS Security Policy establishes guidelines for information security, including access controls, data encryption, incident response, and auditing. It’s designed to safeguard various types of information, such as fingerprints, criminal records, personal information, and other sensitive data collected and used by law enforcement, criminal justice, and other authorized agencies.
Compliance with the CJIS Security Policy is mandatory for organizations that access, store, or transmit this type of sensitive information. This includes law enforcement agencies (police, fire, etc.), courts, correctional facilities, and any other third-party entities that have access to or handle this data. Adhering to these standards helps ensure the confidentiality, integrity, and availability of criminal justice information, reducing the risk of unauthorized access, data breaches, or misuse of sensitive data.
Being compliant with CJIS provides the structure that is necessary to handle sensitive criminal justice information. There are many reasons why compliance is beneficial, not to mention the fact that is required for all agencies of law enforcement. Here are some of the key benefits for implementing CJIS:
Legal Compliance: Adhering to CJIS regulations ensures that organizations comply with legal mandates and requirements, reducing the risk of penalties, fines, or legal actions resulting from non-compliance. Complying with CJIS can ultimately lead to cost savings.
Data Security: CJIS guidelines provide a comprehensive framework for securing sensitive information within law enforcement. Following these guidelines boosts data security and mitigates the risk of data breaches among these agencies.
Trust and Reputation: From clients to public opinion, compliance demonstrates a commitment to security. This can support the reputation of law enforcement and associated agencies, building a foundation that safeguards sensitive information.
Risk Management: By following CJIS guidelines, organizations can identify and mitigate potential security risks more effectively. This proactive approach helps in preventing security incidents or data breaches.
Interagency Collaboration: Compliance facilitates easier information sharing and collaboration among law enforcement agencies and authorized entities. It streamlines processes for sharing critical data while maintaining security protocols.
Improved Efficiency: Implementing standardized security measures per CJIS guidelines can streamline processes and improve operational efficiency within organizations and across key stakeholders.
For law enforcement agencies, courts, correctional facilities, and an array of third-party entities, CJIS is a requirement. With ControlMap, reaching compliance for this framework is even easier. For MSPs who support clients in the US criminal justice system, this framework enables them to offer compliance support for the large industry.
Ready to get started? Login to ControlMap or book a demo to talk with our compliance experts. We are here to support your journey into CJIS compliance and beyond.
Making informed IT investment decisions can be challenging for any business, so MSPs need to know their clients to help them make the right call.
That’s why Lifecycle Manager was built, to provide MSPs a centralized dashboard where they can see their clients’ entire IT environment.
The 1-click, client-friendly reports are one of the most valued features of Lifecycle Manager. They were designed to take all the asset information and share it with clients during strategic meetings. MSPs use them to drive hardware refreshes, project work, and extended warranty sales.
But because every client has different needs, Lifecycle Manager is evolving to help MSPs meet those needs. Lifecycle Manager is now introducing customizable hardware lifecycle reports.
As one of the most requested features, customizable hardware reports are now available in two different formats.
Partners can now customize the fields included in the hardware lifecycle report. For default reports which already contain asset name, user, make, serial, model, OS, age, purchase date, and warranty expiration date, Partners are now able to include the following fields:
The default settings can be updated at the client level or account level (which covers all clients), and also applied to scheduled reports.
The default format of the hardware lifecycle report is portrait. However, if the selected report fields will not fit on a portrait page, the format will automatically change to landscape.
For added flexibility, Partners can also create a fully customized report. On the hardware console, you can drill down further by filtering data, adding or removing columns, and sorting the data in columns.
Partners can create a fully customized report that is best suited for each of their clients’ needs. These reports can be downloaded directly or scheduled to be automatically sent to their clients.
For example, it’s now possible to create a report for workstations between 3 and 5 years old that do not have a warranty. This report will facilitate the replacement or warranty refresh conversation with clients as it puts the information they need to see in an easily digestible format they can understand to make an informed decision.
As with the default hardware lifecycle reports, custom reports can also be scheduled for automatic delivery to clients. The full-auto functionality means that after configuration, your clients will never miss a report. They will be sent the latest status of their assets so they can decide when and how to invest in their hardware.
Being able to create custom reports means it will be easier than ever to visually communicate each client’s unique asset situation, and discuss the best path forward whether it’s extending a server warranty, applying workstation assurance, or refreshing an asset.
Partners rave about the ability to purchase and sell-through extended warranties from ScalePad at more affordable prices than comparables from OEMs which allow them to add a healthy markup while still keeping costs down for clients.
After a refresh, the free IT Asset Disposal service makes securely disposing of retired assets a snap – just a few clicks to set a pick up and get a certificate of disposal.
Providing the best service to clients starts with strategic conversations about their current IT infrastructure. Let the customizable Lifecycle Manager hardware lifecycle reports do the talking for you and start moving clients off old, risky tech and onto the hardware to keep their business running.
Cybersecurity is one of the most important things MSPs need to consider in their service. With cyber threats more present than ever, making sure a client’s employees are secure can save businesses a lot of money and time.
With more cyber attacks focusing on less secure small-to-medium sized businesses, MSPs need to ensure clients are training their employees to security standards.
Training your client’s employees in security measures can be the difference between a data breach and secure operations.
That’s why Lifecycle Manager is integrating with Breach Secure Now, the channel leader in cybersecurity and HIPAA compliance training.
By integrating Lifecycle Manager with Breach Secure Now, MSPs can now monitor security training from a single location.
Breach Secure Now offers in-depth training and security monitoring features to MSPs. The training features make it easy for MSPs to manage, automate, and empower employees to bolster defense of their data.
Employees are encouraged to become cyber secure by seeing how they play a role in their businesses’ security.
Now, MSPs can manage their clients’ assets and people in one place.
All you need to do is sync data into Lifecycle Manager from Breach Secure Now and data will populate in the People tab of the Client Strategy dashboard.
On the new People tab, MSPs are able to see a list of clients’ employees that include:
*Note for partners that do note have Breach Secure Now integrated, only the Name, Email, and Role columns will be populated if they exist in an integrated system.
MSPs can sort and filter the data to identify clients’ employees that require more training to keep the business secure.
They can also view Security Insights on the Client Strategy Dashboard including:
Note for partners that do not have Breach Secure Now integrated, these Insights will not be populated.
The new integration saves MSPs time by automatically populating training results in Lifecycle Manager. This allows staff to prepare for client meetings with comprehensive information on a clients assets and the people that use them from one, easy to use, app.
Clients can maintain a better security posture and expand the visibility of their clients beyond assets, including people and security.
Get started today by signing into Lifecycle Manager and integrate Breach Secure Now.
Need complete visibility of your network assets and vulnerabilities? There are many tools and resources MSPs can leverage to scan their network environments. These tools provide MSPs with early insights into potential security threats and vulnerabilities.
With ControlMap, MSPs are well-prepared for creating effective compliance programs to decrease the risk of security breaches. Now, MSPs utilizing ControlMap can take their compliance operations to the next level with a new integration. Say “hello” to Nodeware.
Nodeware by IGI CyberLabs is a continuous vulnerability management solution that helps businesses reduce their cyber risk. Tailored for MSPs, Nodeware offers a multi-tenant dashboard, streamlined deployment (under 30 minutes), internal/external IP address scanning, a complete asset inventory, and detailed vulnerability data with actionable remediation guidance.
Nodeware has a proven track record of supporting businesses, including MSPs, by scanning their environments for vulnerabilities. Developed by cybersecurity practitioners, Nodeware combines new device recognition with continuous vulnerability scanning, enabling MSPs to easily discover all assets, monitor their networks, identify security gaps, and access detailed reports. This supports MSPs in their compliance journey and protects their networks.
Using Nodeware’s capabilities, MSPs can collect customer feedback to better measure their service level. Nodeware provides:
Moreover, Nodeware can help meet compliance requirements for NIST Data Gathering, CIS 18 Controls 1 and 7, and other security frameworks.
ControlMap connects Nodeware using public APIs. MSPs need to be current users of Nodeware to leverage this powerful integration. Upon connecting both technologies within ControlMap, MSPs can sync company, asset, and related vulnerability data to the platform. This creates a streamlined process for compliance operations. From keeping track of vulnerabilities to presenting evidence for audits, this integration provides users with the ability to elevate their compliance journey and boost their security posture.
Additional key benefits:
Ready to get started? Sign in to ControlMap and integrate with Nodeware today!
Curious to learn more about Nodeware? Let’s connect.
Backing up and managing your clients’ data is a must for every MSP. For many, Dropsuite is the go-to solution to keep email, Microsoft 365, QuickBooks, and Google Workspace backed up and accessible.
ScalePad is excited to announce that our Backup Radar integration with Dropsuite has expanded to include Google Workspaces. Now Dropsuite users can bring all their Dropsuite backups into one location for monitoring alongside any other workstation or server backups your MSP may have for clients.
With this integration, Backup Radar users can get a quick status look at their clients’ Google Workspace backups in Dropsuite.
By integrating Dropsuite, MSPs can monitor and report on all client backups in their environment. Dropsuite is one of our partner’s favorite tools thanks in no small part to their support for cloud-based backups for email, Microsoft 365 and 365 GovCloud, QuickBooks Online, and Google Workspace.
Backup Radar will surface all successful, failed, and no result status updates. This provides MSPs with the ability to spot trends, remediate, and report on client backup health. Backup Radar’s ability to surface backups that generate “no result” can be a life saver for MSPs who might not see that a backup generated no notification at all.
Backup Radar Partners using Dropsuite are able to monitor cloud-based backups of their clients’ Google Workspaces and rely on Backup Radar’s comprehensive monitoring as a key part of their efficient backup workflow.
This enhanced integration with Dropsuite helps MSPs reduce risk to clients while maintaining efficiency, freeing up time to deliver a top-class experience to clients, and strengthen their client relationships. With Dropsuite and Backup Radar, clients can trust that their MSP has their data backups safe and secure.
Get started by signing into Backup Radar and integrate Dropsuite today.
Achieving and maintaining compliance is critical for MSPs and their clients. With the rapid proliferation of security breaches, the need for comprehensive cybersecurity frameworks is critical.
For those located in Canada, there are many frameworks to consider when searching for the best operational fit, and ControlMap has over 35 frameworks built in to support this journey.
The latest framework addition to the platform, CyberSecure Canada, is a comprehensive standard designed to protect SMBs from the growing threat of cyberattacks, fostering trust and resilience in protecting data and information.
Let’s unpack the nuts and bolts of this framework and how ControlMap can help.
The CyberSecure Canada framework is a multi-faceted, government-led program aimed at enhancing cybersecurity measures across the country. Launched by the Canadian Centre for Cyber Security in 2018, the framework provides a systematic approach to address the complex and evolving challenges of cybersecurity.
CyberSecure Canada certification is divided into 5 Organizational Controls and 13 Baseline Controls to address various components of cybersecurity best practices. With a plethora eLearning resources, MSPs and clients can build their knowledge of the framework and best practices, complete with guides, templates, quizzes, and more.
The CyberSecure Canada framework brings several substantial benefits to the Canadian cybersecurity landscape, namely:
Enhanced Cyber Resilience: By following the framework’s guidelines and certification processes, MSPs and their clients can significantly enhance their ability to withstand and recover from cyberattacks. This increased resilience is vital for maintaining business continuity in the face of cyber threats.
Customer Trust: Cybersecurity certification through CyberSecure Canada is a powerful way for MSPs to demonstrate their commitment to protecting customer data. This can build trust among customers, assuring them that their information is in safe hands.
Global Competitiveness: As the world becomes more interconnected, cybersecurity plays a pivotal role in international business. CyberSecure Canada certification can enhance the competitiveness of Canadian MSPs in the global market, as it showcases their dedication to robust cybersecurity practices.
Educational Resources: The framework offers valuable educational resources accessible to anyone interested in bolstering their cybersecurity knowledge. This not only helps MSPs and their defense against cyber threats but also promotes a culture of cybersecurity awareness.
With ControlMap, MSPs are well ahead on their compliance journey. CyberSecure Canada is built into our robust security compliance platform, supporting the compliance journey with automation from start to certification and beyond.
Ready to get started? Login to ControlMap or book a demo to talk with our compliance experts. We are here to support your CyberSecure Canada voyage.
Asset management can be a huge challenge for MSPs of all sizes. That’s why so many use Lifecycle Manager as a way to automate the monitoring process and keep track of workstations, servers, and networking devices.
Automated asset monitoring saves your staff time and your business money, by keeping accurate records of everything in your clients’ IT environment.
Now, Lifecycle Manager is integrating with Fortinet’s FortiGate Cloud service to allow Partners to more effectively and efficiently track their Fortinet networking devices.
FortiGate Cloud is one of our Partners’ primary tools for tracking their clients’ network devices. With this new integration, Lifecycle Manager is expanding to give MSPs a more holistic view of their clients’ assets.
What can MSPs do with this integration?
Or better yet, what can MSPs stop doing with this integration?
Prior to this new integration, Lifecycle Manager Partners were required to manually add Fortinet FortiGate Cloud networking devices manually to their PSA. Once devices were added, we would bring this device information back into Lifecycle Manager. We understand that while the method worked, it wasn’t very scalable for MSPs managing several clients with dozens to thousands of assets, so we found a better way to do things.
This integration will also enhance MSPs’ ability to track warranty information and the ability to push this data back into their PSAs and RMMs via a two-way sync. This has been highly requested by Lifecycle Manager users.
By integrating both services, MSPs can see a comprehensive view of their clients’ assets all in one place and, of course, significantly faster and easier.
Devices tracked include:
Why did Lifecycle Manager integrate with FortiGate Cloud?
FortiGate Cloud is a premier provider of networking devices to MSPs and managing these devices is essential to delivering superior service to clients. The ScalePad Way is to automate as much mind-numbing work for our MSP Partners as possible, so they can focus on what’s important.
Also, FortiGate Cloud was a highly requested integration by Lifecycle Manager Partners. Our in-app “Feature Request” board received hundreds of requests to include network device warranty information and hardware details into Lifecycle Manager. You asked, we listened.
Get started by signing into Lifecycle Manager and integrate FortiGate Cloud today.
From asset data to compliance controls, MSPs are tasked with providing their customers with the best support for their operational information. To add to the complexity, MSPs already have too many systems and programs, and it takes manual work to integrate these unique applications.
So, how can MSPs harmonize asset and company data with security operations?
Enter: A ControlMap and Lifecycle Manager integration.
Within the ControlMap platform, users can connect to Lifecycle Manager (via their ScalePad account). This enables users to sync both asset data and company data to a robust compliance operations application, streamlining the process for applying cyber security controls to the applied data.
Upon successfully connecting ControlMap to Lifecycle Manager, customer data populates in a dashboard, showing all information in a single view.
This data can then be mapped to certain controls within the ContolMap platform. Moreover, compliance checks for antivirus, warranty, encryption, and patches will indicate whether assets pass or fail.
ScalePad’s Lifecycle Manager provides dozens of powerful integrations to RMMs, PSAs, and other tools that make MSP life easier. ControlMap now leverages these integrations to ingest company and asset data into the ControlMap platform and apply GRC workflows to this data.
By connecting Lifecycle to ControlMap, users will be able to sync company and asset data from PSA and RMM systems. Savvy MSPs want their unique systems to connect, saving time and modernizing operations. The integration between ControlMap and Lifecycle Manager allows users to leverage data from both systems, attributing assets and company data (within ControlMap) as evidence for their compliance program.
Additional benefits include:
Integrating both platforms helps MSPs provide a top-tier service to clients. This integration will help build a trusted and reliable relationship with your clients, boosting compliance operations an
Want to get started? Sign in to ControlMap to integrate Lifecycle Manager (via your ScalePad account). Not currently using Lifecycle Manager? Sign up for the Free Edition of Lifecycle Manager today.