Guide

MSP Guide to Selling Endpoint Management

By George Lattimore | Posted March 28, 2019
endpoint_management

This solution selling guide is for MSPs interested in providing endpoint management for their customers. With so much new technology emerging in the IT landscape over the last decade, endpoint management was the most popular managed service, used by 82% of service providers in 2018. Why? One survey found that more than half of SMBs feel helpless to defend themselves against new forms of cyber attacks, and 79% of SMBs are planning to invest more in cyber security in the next 12 months. MSPs are seeing this demand firsthand and are busy thinking through the best ways they can support their clients with endpoint management.

What Makes Endpoint Management Valuable to SMBs?

Generally speaking, an IT organization’s network has expanded to include platforms such as macOS®, Linux®, iOS, and Android. The wide range of endpoints has made it far more difficult for organizations to manage and control. Further, these systems are the conduits to critical applications, data, and servers. MSPs know that compromises of systems can be catastrophic to a client and damage their reputation as an MSP. Smaller businesses have become the primary target, filing 85% of the cyber insurance claims and averaging $195,000 in losses from lost or stolen devices when the legal and business interruption costs are included.

Endpoint management approaches can take various forms. Traditionally, the endpoint management world was focused on managing Windows® systems, but that has expanded to include macOS and Linux as well. Some organizations are interested in managing smartphones and tablets, and this category is generally called MDM (mobile device management). Some endpoint management solutions will include MDM and MAM (mobile application management) capabilities, but not all will have this category included. In 2019, one study found that 89% of SMBs would consider hiring a new MSP if they offered the right cybersecurity solution. Further, these SMBs that are planning to change providers are willing to pay nearly 24% more on average for the right cybersecurity offering.

Security Policies and Managing User Access

The concept of endpoint management can be broken down into two major areas of control: user access and the system itself. Endpoint management of Windows, macOS, and Linux systems generally focuses on security policies, controlling access to the system and its performance capabilities. Examples of these GPO-like functions include screen saver locking, full disk encryption (FDE) managementpassword complexity (2FA or MFA), and OS updates/patching. The best endpoint management systems will also enable MSPs to build their own commands and scripts to be executed on systems.

Another critical capability to consider when thinking of modern endpoint management is the ability to manage user access. Historically, this function has been segmented to the directory service, traditionally Microsoft® Active Directory®. Modern endpoint management solutions are integrating user management along with system management.

JumpCloud’s Directory-as-a-Service® platform is taking exactly this perspective with deep user and system management capabilities across all three major platforms (Windows, Mac, and Linux). With GPO-like policies for a wide range of security and system control functions, MSPs can manage the Macs in marketing as well as the production servers hosted in AWS—all from one console. Identity and access control to systems, including MFA for Mac and Linux systems, ensures that MSPs have full control of locking down the system.

Outline of Selling Guide

Use this outline to help create email campaigns, web pages, and other collateral needed for sales.

Overview

Service: Endpoint Management

Value Proposition

  • Central control over endpoints & their users
  • Secure endpoints to help protect digital assets
  • Comply with regulations and statutes

Key Messages

  • User management across Windows, Mac, and Linux systems
  • Cross-platform GPO-like functions
  • Ad hoc or scheduled script and command execution capabilities across all three OSs

Call-to-Action

Lock down systems and control user access with security policies such as FDE management, screen saver lock, password policies, and more.

Speak with Our Partner Support Team to Learn More

jumpcloudpartner_small_white

To learn more about how you can introduce your clients to the benefits of endpoint management, drop our Partner Account team a note..We’d be happy to work with you to create a marketing campaign for your clients, jointly set up calls, or even conduct a joint webinar. If you’re ready to see the product in action for yourself, sign up for a free account and apply to be a Partner today.

JumpCloud’s Partner Program empowers IT Service Providers with central identity management from the cloud. Fine-tuned for MSPs with cloud security offerings or clients transitioning to the cloud, Directory-as-a-Service can be easily bundled at the center of any product stack to make your business, and your clients’ businesses, as efficient and scalable as possible. Make Work Happen™ for your clients while improving the bottom line for your business.