What Is Ransomware as a Service (RaaS)?
George Rouse
RaaS is a common acronym used to refer to ransomware as a service. Ransomware as a service (RaaS) is the offering of pay-for-use malware.
Read NowGeorge Rouse
RaaS is a common acronym used to refer to ransomware as a service. Ransomware as a service (RaaS) is the offering of pay-for-use malware.
Read NowOna Blanchette
An Integrated professional services automation (PSA) and remote monitoring and management (RMM) that helps MSP run their business efficiently and successfully.
Read NowDeepak Manoor
To provide access to data as fast as possible with maximum precision, we have built an integrated logging mechanism that will optimize context and elevate search capabilities.
Read NowRyan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released both a Datto RMM component for our partners and a community script for all MSPs.
Read NowJohn Maxwell
In this third and final installment of our series we look at how SaaS cloud-based solutions provide benefits of on-prem solutions but without the overhead.
Read NowCourtney Heinbach
There are countless tools available to managed service providers (MSPs) to help them mitigate the risk of ransomware for themselves and their small and medium business (SMB) clients. There’s no single solution that can completely prevent a business from an attack, but rather many that work together. MSPs should consider their RMM tools as a key component in their ransomware mitigations strategy.
Read NowRyan Weeks
The Datto Information Security Team is actively monitoring the Kaseya VSA security incident. As soon as there is more information available on the exploit being used and how to detect it, Datto will assess if scripts can be developed to aid partners.
Read NowRotem Shemesh
Here’s everything MSPs and their clients need to know about Ryuk ransomware.
Read NowJustin Weller
Remote monitoring and management (RMM) platforms play an important role in helping managed service providers (MSPs) reduce client downtime through real-time monitoring and proactively securing and protecting managed devices from known vulnerabilities.
Read Now