{"id":17235,"date":"2017-06-23T09:15:53","date_gmt":"2017-06-23T13:15:53","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=17235"},"modified":"2019-11-15T13:41:54","modified_gmt":"2019-11-15T11:41:54","slug":"var-or-msp","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/var-or-msp\/17235\/","title":{"rendered":"Whom to be: VAR or MSP"},"content":{"rendered":"<p>Small businesses that outsource information security face a variety of choices, starting with the type of infosec company they hire \u2014 options range from simple reseller to system integrator. The most common types for SMBs are value-added resellers (VARs) and managed service providers (MSPs). How will they choose an information security provider?<\/p>\n<h2>VAR and MSP from the customer\u2019s point of view<\/h2>\n<p>In the past, when MSP was a developing market, the natural choice was VAR. Value-added resellers not only supply software (and hardware in some cases), but also help with deployment, provide product support, and answer product questions that may arise. But their main goal was to provide a client with a new license, when the previous one expired. The client in this scenario owns a license for the software. And that is why VARs were always viewed only as a reseller. <\/p>\n<p>If a company chooses to work with a VAR, it needs to have an IT team on site. Even if a company owns just a dozen laptops, there should be an IT person in house (or, next-best, someone in a part-time IT role). Value-added resellers are ready to help that IT person with the product; they can help install it and probably provide training on how to use it, but they will not manage IT for the company. Moreover, this IT person will be in charge of security solution management as well. In other words, this should be an IT security expert. And here is the major drawback: IT security specialists are rather <a href=\"https:\/\/www.kaspersky.co.za\/blog\/security_risks_report_lack_of_security_talent\/\" target=\"_blank\" rel=\"noopener noreferrer\">expensive and in high demand<\/a>. When it comes to small and even medium-size businesses, it may be costly to have a dedicated person. <\/p>\n<p>MSPs take a different approach, not just selling licenses but providing full-fledged IT service. When a company delegates its IT responsibilities, including security, to an MSP, the MSP takes charge, making decisions about what would be best for the company. A managed service provider becomes a trusted advisor that takes care of all IT for the client. An MSP gets to know a client\u2019s needs, makes suggestions about best practices, and then comes to decisions with the client and sets everything up.  <\/p>\n<p>What does that mean for the client? It means always having qualified support, and that all IT is set up and functional, including security. When it comes to security, it means a qualified person is charged with protecting the business, and it means the client doesn\u2019t need to retain a security specialist, or any IT personnel, on staff. <\/p>\n<h3>Transforming from VAR to MSP<\/h3>\n<p>It may seem that an MSP achieves the same goal as a VAR but spends much more. That is not necessarily true. Both types of security solution providers have their own experts on security. The main difference is in their level of involvement. In fact, many VARs eventually expand their range of services and become MSPs. <\/p>\n<p>What do they gain? Mainly, a much higher client retention rate. A trusted IT advisor \u2014 someone who understands a company\u2019s needs and helps with any IT security issue, who already knows the infrastructure and can predict what problems may arise \u2014 is an invaluable asset. <\/p>\n<p>The potential difficulty with the transition from VAR to MSP is the need to administer solutions in the infrastructures of a wide range of clients. However, this difficulty can be circumvented by means of automation and usage of security solutions designed specifically with MSPs in mind. One such solution is <a href=\"http:\/\/cloud.kaspersky.com\/?utm_medium=blg&amp;utm_source=ww_kb_b_170623\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Endpoint Security Cloud<\/a>, which enables remote security management for multiple endpoints, mobile devices, and file servers without any investment in infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managed service providers and value-added resellers are the common types of information security suppliers for SMBs. Whom will they choose?<\/p>\n","protected":false},"author":2419,"featured_media":17236,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[816,2443,97,2540],"class_list":{"0":"post-17235","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cloud","10":"tag-msp","11":"tag-security-2","12":"tag-var"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/var-or-msp\/17235\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/var-or-msp\/10717\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/var-or-msp\/13567\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/var-or-msp\/13624\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/var-or-msp\/17235\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/var-or-msp\/9219\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/var-or-msp\/6941\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/var-or-msp\/13750\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/var-or-msp\/17235\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/msp\/","name":"MSP"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2419"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=17235"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17235\/revisions"}],"predecessor-version":[{"id":24076,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/17235\/revisions\/24076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/17236"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=17235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=17235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=17235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}