{"id":30847,"date":"2019-03-28T09:00:50","date_gmt":"2019-03-28T15:00:50","guid":{"rendered":"https:\/\/jumpcloud.com\/?page_id=30847"},"modified":"2024-07-22T16:35:31","modified_gmt":"2024-07-22T20:35:31","slug":"msp-guide-selling-endpoint-mgmt","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/msp-guide-selling-endpoint-mgmt","title":{"rendered":"MSP Guide to Selling Endpoint Management"},"content":{"rendered":"\n

This solution selling guide is for MSPs interested in providing endpoint management for their customers. With so much new technology emerging in the IT landscape over the last decade, endpoint management was the most popular managed service, used by 82% of service providers in 2018. Why? One survey found that more than half of SMBs feel helpless to defend themselves against new forms of cyber attacks, and 79% of SMBs are planning to invest more in cyber security in the next 12 months. MSPs are seeing this demand firsthand and are busy thinking through the best ways they can support their clients with endpoint management.<\/p>\n\n\n\n

What Makes Endpoint Management Valuable to SMBs?<\/h2>\n\n\n\n

Generally speaking, an IT organization\u2019s network has expanded to include platforms such as macOS\u00ae<\/sup>, Linux\u00ae<\/sup>, iOS, and Android\u2122<\/sup>. The wide range of endpoints has made it far more difficult for organizations to manage and control. Further, these systems are the conduits to critical applications, data, and servers. MSPs know that compromises of systems can be catastrophic to a client and damage their reputation as an MSP. Smaller businesses have become the primary target, filing 85% of the cyber insurance claims<\/a> and averaging $195,000 in losses from lost or stolen devices when the legal and business interruption costs are included.<\/p>\n\n\n\n

Endpoint management approaches can take various forms. Traditionally, the endpoint management world was focused on managing Windows\u00ae<\/sup> systems, but that has expanded to include macOS and Linux as well. Some organizations are interested in managing smartphones and tablets, and this category is generally called MDM (mobile device management). Some endpoint management solutions will include MDM and MAM (mobile application management) capabilities, but not all will have this category included. In 2019, one study found that 89% of SMBs would consider hiring a new MSP if they offered the right cybersecurity solution. Further, these SMBs that are planning to change providers are willing to pay nearly 24% more<\/a> on average for the right cybersecurity offering.<\/p>\n\n\n\n

Security Policies and Managing User Access<\/h2>\n\n\n\n

The concept of endpoint management can be broken down into two major areas of control: user access and the system itself. Endpoint management of Windows, macOS, and Linux systems generally focuses on security policies, controlling access to the system and its performance capabilities. Examples of these GPO-like functions include screen saver locking, full disk encryption (FDE) management, password complexity (2FA or MFA), and OS updates\/patching. The best endpoint management systems will also enable MSPs to build their own commands and scripts to be executed on systems.<\/p>\n\n\n\n

Another critical capability to consider when thinking of modern endpoint management is the ability to manage user access. Historically, this function has been segmented to the directory service, traditionally Microsoft\u00ae<\/sup> Active Directory\u00ae<\/sup>. Modern endpoint management solutions are integrating user management along with system management.<\/p>\n\n\n\n

JumpCloud\u2019s Directory-as-a-Service\u00ae<\/sup>\u00a0platform is taking exactly this perspective with deep user and system management capabilities across all three major platforms (Windows, Mac, and Linux). With GPO-like policies for a wide range of security and system control functions, MSPs can manage the Macs in marketing as well as the production servers hosted in AWS\u2014all from one console. Identity and access control to systems, including\u00a0MFA for Mac<\/a> and Linux systems, ensures that MSPs have full control of locking down the system.<\/p>\n\n\n\n

Outline of Selling Guide<\/h2>\n\n\n\n

Use this outline to help create email campaigns, web pages, and other collateral needed for sales.<\/p>\n\n\n\n

Overview<\/h3>\n\n\n\n

Service: Endpoint Management<\/p>\n\n\n\n

Value Proposition<\/h3>\n\n\n\n