Your first and last lines of cyber defense
Keeping cybersecurity endpoints secure has become a critical responsibility for businesses of all sizes. The cybersecurity landscape is constantly evolving, and threat actors are becoming increasingly sophisticated.If you’re not already on the train, you are late to the game
The whole concept of e-commerce and sales enablement is neither a conservative play nor a risk/reward scenario—rather, it is a way of diversifying your organization and making it more nimble.Looking at our audio series in advance of the worldwide celebration of the format
September 30 is International Podcast Day. Come February, it will be 20 years since the word “podcast” was born. The medium keeps evolving and remains as powerful as ever.Inaugural blog in a series with emphasis on a solid cybersecurity posture
In the first blog of our series, Keypoint Intelligence and ACS investigate the many facets of cybersecurity to deliver insight and strategy in anticipation of Cybersecurity Awareness Month. We discuss some top-level cybersecurity initiatives businesses can take to protect their data.Hardware, software, and services are at the heart of the dealer and customer event
For the first time since before the pandemic, Toshiba America Business Solutions’ Electronic Imaging Division gathered dealers, customers, and key business partners to showcase offerings and impart guidance on its direction and initiatives.Which large-scale technology service providers made the cut this year?
While the mega dealers comprise just a fraction of the roughly 1,800 outfits in the United States, a heck of a lot of attention and focus is put on this group of 18.Keypoint Intelligence’s coverage of IT continues, along with RPA and the Pitt-WVU rivalry
Like the countries that make up Europe, the dealer landscape on that continent is also just different than in the United States—and (oftentimes) more intriguing.Industry leaders in South Africa share valuable insights
On August 24, Women in Print’s third and final event was held at the exquisite Cassia Restaurant located at Nitida Wine Farm in the Cape.What teachers think about digitalization in education
Of the educators I had the chance to talk to, it goes without saying that most of them credit the COVID-19 pandemic with the decreased turn to printed documents since everyone had to get used to online learning.Our Office Group leader has plenty to offer to this compelling print services organization
Deborah Hawkins knows the market for workplace technology and has helped build Office Group practice areas at Keypoint (and its predecessors) for 20 years.How have things been going since the company’s dealer meeting?
Hard to believe it’s been three months since the Sharp National Dealer Meeting 2023, which carried “Opportunity Meets Execution” as its theme.What’s been on the minds of dealers and what are they thinking about moving forward?
It’s true that Keypoint Intelligence focuses a lot of time and energy on the vendor side of the print industry, but that does not mean we shy away from the channel.How to figure out what solution best fits your cybersecurity needs
Cybersecurity has become a key aspect of all parts of our lives. We discuss here the key aspects of adapting endpoint detection and response (EDR) solutions as well as their importance in a business infrastructure.There’s always M&A activity, but how active has it been?
Acquisitions come in all shapes and sizes. Consolidation will continue like clockwork—basically no different than the sun rising and setting.Donnellon McCarthy Enterprises continues its growth in IT and everywhere else, too
IT is like one of those monsters that absorbs everything in its path and just keeps growing. Luke Ubelhor of Donnellon McCarthy Enterprises is the kind of guy who likes to help make sense of the IT beast.Industry has much to consider following a US DHS ban on Ninestar Corporation
When the US Department of Homeland Security takes steps to ban products from a large manufacturer in your industry from entering the US market, your ears tend to perk up.Safeguarding the digital frontier
The necessity for effective cybersecurity measures has never been more vital in today's quickly evolving digital landscape. We discuss here some of the major online threats as well as some options to overcome them.What dealers can learn from recent developments in the IT and cloud space
Anne Valaitis (Principal Analyst in Keypoint Intelligence’s Office Group) and Carl Schell teamed up once again to discuss IT happenings and provide some color commentary on the news.You can’t do IT without cybersecurity and compliance services
At IT Nation Secure 2023, ConnectWise CEO James Magee and Greystone Technology CEO Peter Melby had a clear message: It’s time for IT providers to close the SMB cybersecurity gap.Dealer-focused webinar looks at all things IT, with an assist from Pulse Technology’s Chip Miceli
They used to say that “The sun never sets on the British empire,” and the same is true of IT development. It is constant, at times progressive, and typically rapid.The newly discovered vulnerability has a fix, but customers must take action
Versions of PaperCut Software’s popular PaperCut MF and PaperCut NG output management platforms have two newly discovered security vulnerabilities that have allowed a ransomware gang to target education customers.Homegrown tech, power of partnerships resulting in an even more well-rounded company
Building on a successful run of roadshows last year, Sharp’s US outfit parlayed that momentum with ever-increasing positivity as well as strategic creativity to deliver an engaging experience.How Canon uniFLOW Online helps users step up their zero-trust approach
What organization doesn’t worry about securing their digital environments? While a lot of technology has advanced to better protect its users, bad actors will always be present trying to cause havocOur “green” content drive for Earth Day week starts here!
In the print industry specifically, sustainability has stepped up to the mic like the front man in your favorite band. The amount of marketing and messaging and promotion around sustainability has for sure seen an uptick in the United States, but even in other regions where eco-responsibility had already made significant gains.Industry pro fills newly created role of Managed IT Services Principal Analyst
The path forward for dealers lies, in large part, in managed IT services. The space offers so many options—too many options, some might say. But because many of them fit snugly under the as-a-Service/recurring revenue umbrella, the channel has been, and will continue to be, more active with IT in today’s evolving hybrid business ecosystem.Further education from Keypoint Intelligence’s 2022 Channel Survey
The Keypoint Intelligence 2022 Channel Survey sure does have some important, strategic research and data. What you see here is an infinitesimal sliver of the pie. Have a look and let your brain wander!Keypoint Intelligence delivers prime UVERCE® education to dealers, for dealers
The question isn’t “if,” it’s “when.” Could be about sanding and staining your deck or the timing of a fantasy football trade, but when it comes to e-commerce and sales enablement for dealers—when is now.Keypoint Intelligence series returns with insight on software, strategic alliances
Even if you just want to reference Ringdale the company, it’s nearly impossible to say “Ringdale” without immediately adding “FollowMe”. I mean, everyone in the print industry knows the solution is synonymous with secure pull printing, right?What are we thinking about with office print, managed IT, and smart technology?
The Keypoint Intelligence Office Group dissects subject matter related to print (devices, supplies, service), managed IT (cybersecurity, most notably), or smart workplace technology and translates it into plain English for strategic implementation.Technology Assurance Group leader discusses 2022 IT trends and looks ahead at 2023
Check out the Keypoint Intelligence Channel on YouTube for interviews and other insightful videos!
US operation discusses performance and strategy at virtual briefing
Konica Minolta Business Solutions U.S.A. held a virtual analyst and press briefing on December 13, 2022, during which several company execs provided an update on all things Konica Minolta.An audio tour through the year in print and associated technologies
There was so much good that happened in 2022, and a lot of that good in our space is captured in the 36 interviews we produced as part of Season 4 of The Key Point Podcast. When I look at our favorites, I very much see a microcosm of this year in the industry.Keypoint Intelligence continues to publish content on print and beyond
Whether it’s about office or production; vendors, dealers, or print service providers (PSPs); or company news, product news, event coverage, or otherwise, we deliver all of this to help you understand what you need to know to grow your business.Thoughts on the industry from Staff Product Manager at Qualcomm
Print might be down, but it is certainly not dead. There are still plenty of good stories to tell about it, too—from how some companies evolved during the pandemic to become an even stronger presence to case studies that detail the impact a particular product had on an organization’s health and bottom line. This is precisely why I was excited to sit down with Qualcomm’s Philip Mazzilli, who is also a member of the Mopria Alliance, to discuss several aspects of the print industry.Stay safe out there while getting those online deals
This time of year, cyber security and risk assessment is key to online purchasing.Company leader details recent acquisition, recent partnership, and things beyond print
One of Keypoint Intelligence’s goals for 2022 was to strengthen our portfolio. Yeah, I know, it sounds super generic because that could easily be a goal of companies in any industry around the world, but the reality is that we are evolving in concert with the voice of the customer.Yet another excellent example of blending print and managed IT services to great success
While the mega dealers have plenty of great tales to tell, the stories from smaller dealers have always felt more relatable to me. The cold hard truth is that dealers with annual revenue of up to $20 million obviously have less capital and fewer resources than the megas to turn ideas into reality. For these outfits, there’s just more at stake with each decision, and the challenges are oftentimes more difficult to overcome, but their successes wind up resonating—and educating—more.How to keep your data secure in hybrid environments
Keypoint Intelligence has been tracking how things have changed since the pandemic, first in our Future Office study and now in the Future of Work survey. We take a look at cybersecurity measures companies are investing in for their new environments as well as some key points regarding data security in this infographic.Is your business protected from cyberattacks?
The conveniences that Internet-connected devices add to the lives of tech-savvy individuals and business professionals is welcome across the board, but having such interconnectivity comes with cybersecurity risks.Revealing the final eight large-scale technology providers on the list
It’s a products and services world, and the mega dealers are acing the test. Sure, they have the human resources and the capital to make things happen on a grand scale—or to make new revenue streams happen. Because whether it was through more print (production and wide format, not just office) or beyond print (managed IT and smart office, to name two areas), the bottom line is that they are not afraid to take risks.Which large-scale technology providers are on the list?
The mega dealers are “mega” because they are a well-diversified bunch. Sure, success is evident simply by studying financials for a few minutes, yet each company has its own story on how they surpassed $100M in annual revenue—and then some. Even if the mega dealers started life as traditional copier dealers, they have all embraced technology beyond print with solutions such as security cameras and EV charging stations. Many are striving for that holy grail-like 50/50 split between print and managed IT, with a strong desire for the latter to exceed the former shortly after achieving that even goal.More join the elite group of OEMs that have passed our rigorous penetration testing
Keypoint Intelligence is happy to announce that several more OEMs have passed the evaluation and earned our BLI Security Validation Testing seal for Device Penetration.Impact Networking’s educational event on managed IT services and how work gets done today
Impact Networking and IT have gone hand in hand for a while now, through a labor-intensive break/fix phase to its current, more efficient managed model. The show aims to address how best to fill the gap between business and technology as well as how to educate existing Impact Networking customers and its potential clients on the benefits, trends, and the future of IT. “Innovate to Evolve” is an apropos tagline.Introducing new parental security measures to protect teens online
Social media may feel like it's been a part of our lives for forever, but we are still working out how everyone can use it safely. We discuss here how certain social media apps are enacting safety controls for teens as well as the dangers that younger users can face.Reinforcing the trust in remote voting is paramount
While the use of mail-in ballots exploded during the COVID-19 pandemic, the politicization of absentee voting caused a lot of distrust in the process. We discuss here some of the history of mail-in voting as well as the results of our recent LinkedIn poll.Looking the latest cyber threats and how to combat them
Sponsored by ConnectWise, the leading vendor focused on managed IT services providers, the IT Nation Secure event focused on cybersecurity for several audiences. We discuss here the highlights of the event as well as some of the challenges facing cybersecurity professionals today.Company continues transformation through products, services, positive energy, and honesty
The company presented its eight-pronged strategy that encompasses hardware and software (office and production), professional services and managed IT, as well as e-commerce and subscriptions. It should go without saying that “pandemic,” “supply chain,” and “inflation” were oft-used words. But, at the end of the day, Kyocera representatives made no excuses and promoted change as a very good thing.A look into the newer, shinier hacker of our digital landscape
Cybersecurity is an ever-growing issue in our highly digital world, one that is becoming far more refined than the days of suspicious looking e-mail links.Production print and digital transformation central to company’s new Client Engagement Center
Making the Client Engagement Center the centerpiece of this week’s Konica Minolta 2022 Dealer Summit was clearly the right move. Located at the company’s US headquarters in Ramsey, New Jersey, the CEC houses devices Konica Minolta offers in production print, wide format, labels and packaging, as well as digital embellishment. These represent growth areas (industrial print is up 151% year-over-year) and are, obviously, critical for the company as it shifts into high gear with its dealers.And you can, too!
After Russia's invasion of the Ukraine, Anonymous decided to support the Ukrainian people by sending anti-war messages to printers around the Russian Federation. We discuss here how security exploits can be located and used.Massachusetts proposes new data security bill to protect residents
Cybersecurity legislation is growing in use across the US, with Massachusetts becoming the latest state to craft a bill concerned with data use. This blog explores some of the key details and what this could mean for data privacy.It’s 2022: Do you know where your data’s been?
This blog discusses the National Cybersecurity Alliance’s Data Privacy Week and provides general ideas on how businesses can better utilize client data ethically.Keypoint Intelligence’s public-facing content educates readers, expands in scope
We entered this year still in the thick of battling COVID, encouraged by the hope of what vaccines could bring. Now, as we prepare to flip the calendar to 2022, the print industry and the entire world continue to face a chip shortage and a slow supply chain that are becoming more debilitating by the day. In between all that was a gluttony of compelling news such as announcements on products and services, updates from vendors and dealers, and, of course, anything and everything related to digital transformation.Keypoint Intelligence lab technicians share their expertise
Keypoint Intelligence has recently looked at and reviewed 10 home security cameras in our lab. This blog explores the top six aspects to keep in mind when purchasing a security camera.Customers and resellers need to check with their software developers to see what’s impacted
The Log4j software vulnerability has sent the IT world into a panic. This blog explores the implications and some solutions that a select number of OEMs have offered.Longtime product manager steps up to the mic in our 4 Questions series
He worked in product planning at Brother prior to joining Minolta and has been at the combined Konica Minolta ever since. For the past couple of years, not to mention throughout the pandemic, Hall has served as product manager for the company’s entire line of bizhub A3 and A4 hardware.They’re all the rage, but is there a more secure method?
We’ve talked previously about Zero Trust network architectures and how they can keep endpoints and the network secure. This blog explores the benefits and challenges concerning such measures.Understanding the active role of cybersecurity protection
This blog explores the main points of threat detection and response to help focus on a clear topic during Cybersecurity Awareness Month. We provide insight into how to form a threat detection team and the benefits for businesses and the print industry specifically.Easy-to-deploy firewalls could be the answer to sketchy home network security
Cybersecurity for home networks has recently become a top priority for IT personnel as employees found themselves working remotely. This blog explores some options available to help protect remote knowledge workers.It’s time to secure the goldmine of sensitive information at devices
MFPs are often overlooked when it comes to security measures. This blog explores how the MyQ solution can help to overcome this loophole in many companies' cybersecurity plans.Release also streamlines user interface interaction for cloud-based printing
Cloud services and technology provider Pharos recently released updates to its Beacon print management software platform. This blog explores these updates and their impact on the market and for Beacon users.Keypoint Intelligence to educate on the office and dealers of the future
Keypoint Intelligence and ITEX have teamed up to help paint a path forward for our industry. We may not be able to predict the entire future, but we can help with what we’ve learned from the past, our newest research findings, and involving industry leaders that can all help you see a clearer future for the office and dealers.Make sure you understand the top risks and follow best practices
Information security is a top priority in many companies, reinforced by the COVID-19 crisis and expansion of work into home environments. This infographic blog presents key data from a recent Keypoint Intelligence report.Industry veteran discusses his vision for product testing and market research organization
Anthony Sci is a New Yorker, plain and simple. He’s direct, highly educated, and, perhaps more than anything else, passionate. These traits—and many more, rest assured—will no doubt serve him well as he heads up Keypoint Intelligence, which in 2021 is celebrating its 60th anniversary.For OE dealers, partnering is a great way to launch a cybersecurity practice
In an increasingly digital world, businesses need to be able to protect themselves from becoming the next cybercrime victim, and customers are increasingly interested in their cyber safety.Product suite combines secure PCs and printers with an “expansive set” of software and services
The thinking behind HP Wolf Security is to integrate an array of HP’s class-leading security technologies and offerings to relieve some of the burden currently falling on customers’ IT personnel.Directions in managed IT and the cloud
Fact: The pandemic has had a dramatic, everlasting effect on the cloud and the remote workforce. For IT vendors, MSPs, and, yes, those office equipment dealers that have an IT practice, there has been no downtime in developing as well as selling products and services to help customers thrive during the pandemic.New data indicates attacks by state-sponsored hackers have doubled in the last three years
We all know that cybercrime has been a growing issue, and research released by HP shows just how bad the situation has become. In conjunction with the results of this study, HP also released its latest, downloadable Quarterly Threat Insights Report, which highlights new techniques being used by cybercriminals to breach vulnerable endpoints such as servers, computers, MFPs/printers, and IoT devices.Understanding the security threat printers pose and recommendations on how to mitigate vulnerabilities
Followers have heard us mention time and again the security threats that Internet-connected printers and MFPs can pose to a home or corporate network. This blog explores some of the solutions Keypoint Intelligence has found to combat these threats.This week’s theme: “The Future of Connected Devices”
In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.This week’s theme: “Securing Internet-Connected Devices in Healthcare”
The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.This week’s theme: “Securing Devices at Home and Work”
Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.This week’s theme: “If You Connect It, Protect It”
For the first week of NCSAM, this blog explores the unknown dangers of smart devices and provides the National Cybersecurity Alliance's "commonsense checklist" of solutions to overcome common weak points.Expands successful “bug bounty” program to office-class HP Original Ink and Toner cartridges
HP is expanding its "bug bounty" program to ink and toner cartridges. The company is challenging four professional ethical hackers to identify security vulnerabilities and risks that might be lurking in the firmware found in office-class HP Original Ink and Toner cartridges.The 2020 theme: “Do Your Part. #BeCyberSmart”
In its 17th year, the CISA National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity in the US. This blog kicks off our series on the topics covered during this year's NCSAM.Traditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive
Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.The Controversy Surrounding TikTok and WeChat
Technology can help us to grow our businesses, educate our children, increase the speed of gathering information, and facilitating important research, but it also puts our personal information at risk. This blog explores these dangers using TikTok and WeChat as examples.People Can Be Your Weakest Link or Your Best Defense
Security is a combination of people, processes, and technology. While they work in concert to protect an organization’s intellectual property or sensitive information, the people component has proven to be one of the weakest links in an organization’s security posture.What Print Service Providers Need to Know in Today’s Regulated Business Environment
Worldwide, legislation is being established to protect people's personally identifiable information. This blog explores the attestations and accreditation that PSPs can pursue to protect themselves.Threat Grows as Employees Work from Home for the Foreseeable Future
There is a newly uncovered security vulnerability possibly lurking in hundreds of millions of Internet-capable devices sold over the past 20-some-odd years that includes printers and other IoT devices home-based employees rely on.On-Premises Servers, Devices, and Data Are Useless When No One Is There
Businesses are still far too reliant on the traditional on-premises architecture. While many companies have migrated some functions to the cloud, the COVID-19 pandemic saw plenty of IT folks scrambling to set up VPNs to allow remote access to critical applications and files that reside on-site.Mega Dealer Exec Discusses Making an Impact in Managed IT Services
I’ve had the pleasure of working with Impact Networking twice before, both times on articles with company President Dan Meyer. For this third adventure, I wanted to move beyond typical dealer profile material and hardware talk—enter Patrick Layton, Vice President of Managed IT Services at Impact Networking.Your Home Printer and Network Equipment Could Be Putting Corporate Data at Risk
The challenges of finding sufficient work space, blocking out the noise from TVs blaring, children playing, dogs barking, online meetings crashing due to the lack of home bandwidth, and other distractions are already becoming all too commonplace. However, there is another, invisible and silent challenge that employers should be very conscious of: data security.Testing Security from Three Vectors
There’s been no shortage of conversation around MFP and printer device security, with competing claims—and sometimes outright sniping—among major OEMs about who has which features and whose devices are more vulnerable to hackers. So, we here at Keypoint Intelligence - Buyers Lab said to ourselves, “Someone should do something to clarify all this,” a thought soon followed by the realization that, “and that someone should be us!”Company Founder Discusses BTA and TAG Memberships, Managed IT
We provide unbiased insights and build responsive tools that are customized for you so that you can focus less on data and more on your customers.Are You Touched by CCPA?
In the eyes of the State of California that data is now subject to the California Consumer Privacy Act (CCPA) and it poses some challenges companies doing business in California, but also companies who do business with constituents in California.On the Verge of 2020, TAG Helps Members Prepare for Further Growth
“Hindsight is 2020” and “2020 vision” are the most oft-used puns about next year. Fortunately, at the Technology Assurance Group’s two-day MTSP meeting in Austin, Texas, neither was said. And that’s just one reason—a very small reason, granted—why “Planning Your Success in 2020” in early November was, well, a success.Security, Production, and uniFLOW Also Highlighted at Atlanta Event
We provide unbiased insights and build responsive tools that are customized for you so that you can focus less on data and more on your customers.New Partnerships Help Further Address a Major Customer Concern
We provide unbiased insights and build responsive tools that are customized for you so that you can focus less on data and more on your customers.