Category Archives for "Managed Services News"

Mar 12

MSP Worry-Free XDR Playbook

By | Managed Services News

Once upon a time, strong cybersecurity could be achieved with a few simple actions. Unfortunately, threats actors did not take the hint and just give up – they adapted, became more sophisticated and more dangerous in their quest to steal data and gain monetary rewards. Despite advancements in cybersecurity, data breaches are getting worse. But that doesn’t mean the bad guys have won…

This eBook covers how to be worry-free with the latest and most advanced security available. You’ll learn why you need to evolve past endpoint detection and response (EDR) to a more sophisticated tool that allows you to increase revenue while ensuring your customers have the best protection possible against today’s and tomorrow’s threats.

Mar 12

Connected Tech Helps Cities Conserve Resources and Reduce Costs

By | Managed Services News

With Avnet’s IoT partnership, businesses can quickly build solutions and leverage proven software and hardware building blocks that are already compatible with the Avnet IoTConnect platform. These solutions can then help the organization meet their customers’ needs.

This whitepaper investigates a case of a small company looking to scale their differentiated product; Avnet was able to help the company stay ahead of their competition and transform it from an original equipment manufacturer to a systems integrator with multiple revenue streams.

Mar 12

Teradici Launches New Partner Program to Enable Customized DaaS Solutions

By | Managed Services News

Avid and Tehama are the first TAPP partners integrating PCoIP into DaaS services.

Teradici is broadening its reach to partners with the launch of a program that will enable managed service providers (MSPs), ISVs, systems integrators and OEMs to offer customized remote desktop and application solutions.

The new Teradici Advantage Partner Program (TAPP), rolling out this month, lets partners integrate the company’s PC-over-IP (PCoIP) remote access protocol and cloud-access software into their solutions. The program allows existing partners to offer specialized solutions and is designed to attract new partners who want to deliver their solutions through cloud-based desktop-as-a-service (DaaS) — as an alternative to native clients.

Partners inTAPP gain a more extensible way to build PCoIP into their apps with access to APIs and SDKs. The program also offers support and resources to help partners embed customized virtual cloud workspaces with PCoIP, Teradici’s compression, encryption and transmission protocol for remote endpoints.

“It’s targeted at MSPs, ISVs, SIs and OEMs who are looking at providing a more differentiated solution,” said Teradici VP of product management Ziad Lammam. “It might be a solution focused on a service in a particular region or servicing a particular vertical market or a use case. ISVs, MSPs and OEMs can essentially build on top of our solution and offer their solution either as a service or an integrated offering to their customers.”

Teradici has lined up five partners for TAPP, including Avid and Tehama.

Avid, whose video production and editing platform is used by individual producers, broadcasters and studios, joined TAPP and has integrated PCoIP for a new subscription-based Edit on Demand offering, set for imminent release. Edit on Demand will provide remote video editing and postproduction service hosted in the Microsoft Azure cloud and accessible to any Teradici VDI or remote client using its cloud-access software.

Avid's Ray Thompson

Avid’s Ray Thompson

“The benefit is we can offer it as a turnkey solution that auto provisions everything for everybody,” said Ray Thompson, Avid’s director of market solutions, broadcast and media. “There’s little to no setup on the part of the user, meaning they don’t have to go in and configure the cloud components themselves. More or less, they buy a plan and then it auto-configures according to the plan they purchase.

Avid will include compute, storage and bandwidth components with the edit-on-demand service, Thompson added.

“Once it’s all staged, then they can start pushing content to the environment, where it is then accepted,” he said. “When they’re done, they just download all the metadata, the project bin and the media, and they can kick it out.”

Thompson said Avid will offer various tiers of service using Azure GPU virtual machine instances.

When Avid was building the architecture for Edit on Demand, Thompson said various virtual application protocols were considered including Citrix HDX and VMware Blast Extreme.

“We did a pretty comprehensive test of all the ones that were available at the time,” he said. “Teradici provided the best experience given the demands for what we knew our customers would want.”

Tehama, a startup provider of secure workspaces based on various compliance standards such as SOC 2Type II, FIPS and HIPAA, runs the server-side implementation of its service via Amazon WorkSpaces, the DaaS offering from AWS. Because Amazon WorkSpaces uses Teradici’s PCoIP as its DaaS optimization and security protocol, Tehama needed to also integrate it into its solution.

Through TAPP, Tehama provisioned a customized Teradici connection access broker (CAB) based and client to provide a customized user experience.

Tehama's Paul Vallée

Tehama’s Paul Vallée

“None of this would be possible if we didn’t have access to the Teradici underlying technology and the partnership,” said Tehama CEO Paul Vallée.

Tehama is in the late stages of its beta test program with the new DaaS offering. Vallée said the TAPP program was a key enabler to simplifying the delivery of its solution.

“What I like about it the most is the amount of flexibility that it gives us in terms of customizing and collaborating to innovate together with a combination of our team and their team doing the work and the combination of access to the software,” Vallée said. “But just as important, it gave us access to expertise through the professional services that they make available as part of this partner program.”

Mar 11

To Pay or Not to Pay Ransom Poses Big Dilemma for Governments

By | Managed Services News

Refusing to pay ransom demands may be more expensive for state and local governments.

Cybercriminals increasingly are targeting state and local governments with ransomware attacks, and asking for more money.

That’s according to “Ransoming Government: What State and Local Government Can Do to Break Free From Ransomware Attacks,” a new report by Deloitte’s Center for Government Insights.

In 2019 alone, governments reported 163 ransomware attacks, with more than $1.8 million paid and tens of millions spent on recovery costs, a nearly 150% increase in reported attacks from 2018.

Srini Subramanian, principal at Deloitte & Touche, and cyber state and higher education sector leader, tells us MSSPs and other cybersecurity providers can be doing more to help state and local governments. Examples include cyberattack surface vulnerability assessments, cyber supply chain or third-party vendor risk assessments, identity and privileged access management, firewall management, and user-and behavioral-based analytics to promptly detect and protect against malicious cyber behavior, cyber war games and cyber resiliency exercises.

Deloitte's Srini Subramanian

Deloitte’s Srini Subramanian

“State and local governments should live and plan with the reality that their critical systems and data will be attacked,” he said. “Even with cyber insurance and preventive measures in place, the growing frequency and sophistication of attacks calls for government entities to perform cyber health checks and revisit resilience strategies. The effort more than pays off. Governments can be better positioned to defend against catastrophic events that are expensive to recover from and could impact public safety and trust.”

According to the report, refusing to pay ransom demands may be the principled option, but it also may be far more expensive. For example, the city of Baltimore refused a $76,000 ransom demand, only to suffer over $18 million in recovery costs and lost revenue.

Sensing the vulnerability of state and local governments, criminal enterprises are demanding nearly 10 times what they demand from commercial entities, according to the report.

“The government agencies resorting to paying ransom to restore critical services quickly, with the assistance of cyber insurance, may be creating incentives for more attacks and escalating ransom amount demanded,” Subramanian said. “There is an urgent need to break away from that cycle and resolve not to pay ransom, but restore services quickly. That requires a proactive strategy to assure and test resilience.”

Government agencies should collaborate across jurisdictions, and set up and subscribe to cyber services like cyber awareness training, around-the-clock security operations center (SOC) monitoring, and incident response in a shared services model, as opposed to each city, municipal and county governments setting these up in silos, he said.

One encouraging sign is that associations like the National Association of State Chief Information Officers (NASCIO) and the National Geospatial-Intelligence Agency (NGA) are promoting collaborating across jurisdictions and laying foundations for state governments and large cities providing services for smaller municipal and county governments as well, Subramanian said.

To combat this growing risk, the report outlines several key considerations for organizations to move forward in this new reality: smarter systems architecture; a more prepared workforce; better cyber hygiene; cyber insurance usage scenarios; and practiced response.

“Connected devices, digital systems and integrated data mean governments have the opportunity to serve people and communities like never before,” said Deborah Golden, principal at Deloitte & Touche, and cyber risk services leader. “It also means there is a large surface for cybercriminals to attack local governments and hold sensitive citizen data hostage. Government officials need to understand the risk involved if their systems and data were suddenly gone or rendered useless.”

Mar 11

Scaleway Unveils All-Cloud Underground Bunker Data Cold Storage, New CEO

By | Managed Services News

The underground bunker storage previously didn’t have a cloud option and wasn’t available on a pay-per-use basis.

European cloud services vendor Scaleway has bolstered its object storage offerings with the first 100% cloud version of its C14 cold storage for important long-term data security – in an underground concrete bunker below Paris – while also announcing the appointment of Yann Lechelle as the company’s new CEO.

The cloud version of C14 cold storage, which follows the company’s original C14 Classic storage that was based on a monthly fee, will now feature a pay-per-use model and include a redesigned software layer on the same physical hardware server infrastructure, according to the company. The C14 Classic Scaleway object storage continues to be offered for now, but will eventually be replaced by the cloud version.

The Scaleway C14 cold storage is compatible with standard APIs such as Amazon S3 and Glacier, and includes the long-term security of being in a data center bunker 82 feet under the streets of Paris. Deep underground storage has been available from other vendors over the last 20 years, but this offering is designed for critical use cases that require enhanced protection with 6+3 error encoding, a 99.99999999999% durability guarantee and around-the-clock customer support in multiple languages, according to the company.

Scaleway’s underground bunker in Paris is a former fallout shelter. The C14 storage gets its name from the Carbon-14 isotope, which allows for dating very old objects. The C14 moniker for the data storage is an allusion to the ability of the C14 cloud service that makes it possible for users to keep data for hundreds of years.

Steven Hill, an analyst with 451 Research, told Channel Futures that Scaleway’s underground bunker data cold storage can be a good fit for specific companies that require extra protection from many risks of nature, including cosmic rays and hurricanes.

451 Research's Steven Hill

451 Research’s Steven Hill

“But physical location is only one aspect of data survivability,” said Hill. “Like any other site, there are pros and cons regarding underground facilities, but none of that matters if the infrastructure itself isn’t designed to be equally fault-tolerant to the physical location.”

Competitors like Iron Mountain and others have established the security of underground storage for physical artifacts including documents, tapes and data; but most of their data centers are actually above ground, said Hill.

“Simply put, data is highly ephemeral when compared to physical documents, and there are few technical options for maintaining data for centuries; much less multiple decades,” he said. “Today the real focus lies in building fault-tolerant data systems and insuring that archival data is regularly scrubbed for bit rot and migrated every two to three decades, regardless of where it’s physically located. But if that location is a limestone cave 100 feet below ground, it at least eliminates some of the risk of dealing with nature.”

The underground bunker data storage can be the right fit for some businesses, he said.

“A lot depends on the nature of the data in question, and the laws in that part of the world,” said Hill. “Some customers only need to think in basic two-to-seven-year data life cycles for financial information, but others may need to meet longer data-retention requirements for programs like HIPAA, SOX, FedRAMP, PCI DSS and FISMA, as well as GDPR and CCPA.”

Interestingly, when it comes to long-term information archiving, the most reliable media is still microfilm, according to Hill.

Scaleway's Yann Lechelle

Scaleway’s Yann Lechelle

“Its combination of stable polyester film stock with solid silver images can last around 500 years. And even though it may be the slowest and most difficult way possible to find information, all you need to view microfilm is a magnifying glass and daylight.”

New CEO Takes Over for Scaleway’s Founder

Scaleway’s new CEO, Yann Lechelle, comes to the company France-based AI voice platform company, Snips, which Sonos acquired in November. At Snips, Lechelle was chief operating officer. Arnaud de Bermingham, the founder and former CEO of Scaleway, will take the role of president with the company. Scaleway, which has about 250 employees, is a subsidiary of Iliad Group, a cloud infrastructure company.

Lechelle, an entrepreneur and digital innovator, also is  a co-founding member of the France Digitale association, and a co-founding member of the board of directors of HUB France IA.

A Scaleway spokesman didn’t respond to inquiries seeking comment about the new services and the executive appointment.

Mar 11

Avant Analytics Study Finds Ransomware, DDoS Attacks, Phishing Top of Mind

By | Managed Services News

A new report augments channel partners’ sales discussions with analysis of Avant’s sales data.

Avant is making strides in markedly increasing its support of channel leaders.

Last year it was the announcement of its new market research arm, Avant Analytics. This year, Ken Presti, vice president and former IDC analyst, says the master agent is increasing its support of channel leaders and IT stakeholders through its 6-12 reports. The company just unveiled its second 6-12 Report, an analysis of the state of cybersecurity preparedness across industries.

Avant Analytics' Ken Presti

Avant Analytics’ Ken Presti

“The 6-12 Reports can be used by enterprise decision-makers to fully assess a specific technology’s ability to impact their business over the next six to 12 months,” said Presti, in an interview with Channel Futures’ MSSP Insider.

Presti explained that the reports provide a third-party view of the technology and its market impact, supported by market research derived from Avant’s sales data and a variety of other sources, including customer surveys, external data, and extensive interviews with subject-matter experts.

He said the reports augment sales discussions, help decision-makers form more targeted and informed questions, and reinforce the credibility of the “trusted adviser.”

The payoff for channel partners in using the reports’ analyses is “more knowledgeable technology decisions which translates to strengthened business relationships, increased customer satisfaction, and a more profitable use of technology for both the trusted adviser and the customer.”

Key findings from the current report include:

  • Ransomware, DDoS attacks, intrusion and email phishing attacks are the threats that concern customers the most (69%).
  • Customers’ primary issues with their current security posture focus primarily on their fears regarding emerging threats (45%), combined with staffing (38%) and resource limitations (36%).
  • Preparedness for attacks varies somewhat by vertical market, with the highest levels of risk perceived by respondents in the business services (80%) and medical (68%) sectors.
  • The focus has shifted from minimizing the IT security budget to proactively embedding security into every facet of the infrastructure
  • With the growth of things like toolkits and ransomware as a service, extremely unsophisticated attackers can now purchase targeted exploits, enabling them to do significant damage.
  • Companies across the broad market are moving to third-party managed security service providers at an annual rate of 5% RDI.
  • The industry is still suffering from a talent shortage. As many as 2 million jobs are unfilled due to the lack of qualified people. This phenomenon is increasing the use of third-party contractors who specialize in security, as opposed to in-house teams, which have become dramatically more expensive.

Among the many challenges in security is the “moving target” aspect that makes it difficult to permanently close down any given threat.

“Security is such a rapidly moving space that it’s difficult to know what the criminal element will be able to penetrate. And, if they can’t gain access today, perhaps they will learn how to gain access tomorrow,” said Presti.

“Since no guarantees can be made, enterprise decision-makers need to work with their trusted advisers to maximize the odds while at the same time developing effective contingency plans in the event that something bad does occur,” he said.

Mar 11

HPE Expands Small Business Solutions, Targets SMBs

By | Managed Services News

HPE announced on Wednesday the HPE ProLiant MicroServer Gen10 Plus designed for the small office or the remote-location branch office using the device as part of an edge platform. HPE calculates an employee count of 25 or fewer employees at these locations.

Calling the latest addition to the company’s Proliant Gen 10 portfolio “distraction-free IT,” HP’s new server is a configured, tested and validated solution that offers automated deployment, and a monthly subscription starting at less than $20 per month.

HPE's Tim Peters

HPE’s Tim Peters

“Our mission at HPE is to be the vendor of choice for these sets of customers, especially as they graduate and move into their next chapter of growth and innovation,” Tim Peters, vice president and general manager, global SMB and midmarket at HPE, told Channel Futures.

The 10-pound unit is about the size of a typical hardcover book, offers a choice of Intel Xeon and Pentium processors, and up to 32GB RAM and 16TB internal storage that’s able to support virtualized and database workloads.

The ProLiant MicroServer Gen 10 Plus also offers HPE-exclusive silicon root of trust technology for data protection, and its ability to detect issues and recover from malicious firmware attacks.

That’s not the only first for this customer market segment. HPE InfoSight for Servers, the vendor’s cloud-based AI management, is also being offered to help customers monitor the health of their server and apply predictive analytics for proactive server management.

Additionally, HPE is offering options for users to run their applications. They can run them either on-premises or in the cloud, if their cloud services are supported by Microsoft Azure.

HPE outlines three business use cases to meet SMB needs: Office in a Box; scalable file and backup; and edge to cloud.

Office in a Box is tailored for up to 10 users in a variety of vertical markets.

“This solution is comprised of our Gen 10 Plus powered by Intel, our Aruba access points, a rugged local backup, and everything is wrapped around by our foundational care of services,” said Megan Zeigler, Manager, worldwide SMB and mid-market solutions and services team at HPE.

The entire box is priced at an entry point of less than $125/month.

“This also allows for unique capabilities and multiple functions for the server. So, you have virtualization, storage and backup in a single server. It’s great for remote and branch offices,” she said.

As a scalable file and backup solution, the device serves two purposes, one around file services and another back up. For file services, HPE is providing optimized configurations that allows for central access, faster performance and secure collaboration. Used for backup and recovery, the device protects data, offers fast data recovery and minimizes downtime.

The third use case is for powering the intelligent edge.

“With the MicroServer Gen 10 Plus, it provides the right amount of compute for remote and branch offices at the edge. With our optional cloud services from Microsoft Azure or MSPs, it can provide connectivity back to the home office,” said Zeigler. “It also allows for remote access and management to better enable the edge locations.”

The new servers are being sold only through partners.

“We’re very focused on trying to create these recipe-driven solutions which are focused on what [our partners] tell us are the hot spots they want to deploy,” he said.

Mar 10

BlackBerry Amps Up North America Partner Program

By | Managed Services News

Emerald partners now can earn 40% with deal registration.

BlackBerry on Tuesday unveiled improvements to the BlackBerry Cylance North America Partner Program focused on solution providers (VARs, national resellers and distributors), as well as MSSPs

The program offers prevention-first predictive security solutions and a spectrum of consulting services supported by field sales and marketing support, technical support, training and tools.

May Mitchell, vice president of global channel sales and field marketing at BlackBerry Cylance, tells us after launching the BlackBerry Cylance partner program more than three years ago, the goal is to “maintain partner mind share and stay competitive.”

BlackBerry's May Mitchell

BlackBerry’s May Mitchell

“We continue our commitment to enable partners with innovative solutions that help them build a predictable growth business,” she said. “We have an active partner advisory council, who are integral to our business and continually provide us with feedback on strategy, road map and programs. Additionally, we have identified a list of focus partners that are aligned with field sales, sales engineering, channel and marketing. There is a core set of regular activities we plan for and participate in with these partners to help grow their business.”

Solution-provider partners resell BlackBerry Cylance solutions and cybersecurity services driven by AI technology. There are three levels of solution provider partners: emerald, platinum and gold.

BlackBerry Cylance offers a full incumbency designation for renewals to all emerald and platinum members in good standing. Incumbent partners are not required to register renewal deals as renewals are processed at the same price and discount as the original order.

Emerald partners now can earn 40% with deal registration.

“We offer partners a proposal-based MDF program to help create demand for new business,” Mitchell said. “This allows us to provide protection for partners who are proactive and invest in our program. We also streamlined the deal-registration process so we can quickly work with our partners on a joint sales motion.”

“In the past few years, we have grown with the BlackBerry Cylance Partner Program to create a predictable and profitable recurring business model,” said Bill Strub, CEO of NaviLogic, a solution provider partner. “We receive tremendous support from the BlackBerry Cylance team with field marketing and technical training.”

With BlackBerry Cylance AI-driven endpoint protection, MSSPs can help customers reduce the time their support desk spends addressing malware issues and re-imaging machines. The MSSP program now offers simplified pricing and deal protection for deals with more than 500 seats.

Additional key program features include: billing within 30 days of joining the program; licensing products on a monthly or annual subscription basis; access to the BlackBerry Cylance partner portal, partner communications, field sales and marketing support; a multitenant console to create, manage and monitor multiple tenants from a centralized location in a single view; and no upfront fees for license and support.

MSSPs own the relationship with no direct communication from BlackBerry Cylance to customers.

“We are always looking to enhance the partner experience by improving the speed of transaction and enabling our partners with marketing resources and technical accreditations,” Mitchell said. “Improvements to our partner-focused content, including training and demand-generation kits, ensure our partners’ sales and technical resources are educated to sell, position and deliver AI-driven cybersecurity solutions. Our global channel sales engineering teams provide weekly product updates to our partners and also conduct face-to-face trainings globally.”

“Security has become a top priority for our customers and they are increasingly turning to us for solutions that help them stay steps ahead of the most advanced threats and attacks,” said Michael Crean, CEO of Solutions Granted, an MSSP partner. “BlackBerry Cylance’s endpoint protection identifies and stops threats before they penetrate networks, and is extremely easy to deploy and manage. We are looking forward to continuing to grow our business with BlackBerry Cylance.”

At last month’s 2020 RSA Conference, BlackBerry unveiled its new BlackBerry Spark platform with a new unified endpoint security (UES) layer which can work with BlackBerry unified endpoint management (UEM) to deliver zero-trust security. Using AI, ML and automation, Spark now offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.

Mar 10

Why Insight Chose Microsoft Azure Sentinel as Core SIEM Over Splunk

By | Managed Services News

Insight is readying customers for its new managed security service.

Insight Enterprises, the global systems integration division of Insight Technology Solutions, is among several managed security service providers in the early stages of provisioning customers using Azure Sentinel, Microsoft’s new cloud-native SIEM.

Microsoft introduced Azure Sentinel a year ago as an alternative to traditional on-premises AI-based, threat intelligence solutions such as ArcSight, RSA NetWitness and Splunk. When Azure Sentinel became generally available in late September, Insight Enterprises’ Cloud & Data Center Transformation (CDCD) organization was among the first 20 global partners trained by Microsoft in various stages of adding it to their managed security services.

In addition to Insight, Accenture and its Avanade business, Ascent, DXC Technology, EY Global, Infosys, KPMG, Optiv, PwC, Trustwave and Wipro have said they are building out modernized managed security operations centers (SOCs) hosted with Azure Sentinel.

Microsoft's Ann Johnson

Microsoft’s Ann Johnson

“We’re seeing more uptake on Azure Sentinel than we could possibly consume right now, which is a fantastic problem to have, which is why we’ve rushed and quickly trained a bunch of partners,” said Ann Johnson, corporate VP for Microsoft’s corporate cybersecurity solutions group, during an interview late last year.

While most of the launch partners offer multiple SIEM options for their SOCs, Insight has decided to base its revamped MSSP with Azure Sentinel as its primary SIEM, according to Richard Diver, a cloud security architect at Insight.

“We’re the only one that I am aware of that is only doing Sentinel; everyone else has something else and then looking to add Sentinel to their list, or they’ll migrate over to Sentinel over time,” Diver said.

Insight also is offering consulting services for customers seeking to migrate their current SOCs to Azure Sentinel.

Azure Sentinel is one of the first of a new class of cloud-native SIEMs that use machine learning at scale to continuously monitor billions of data are native cloud services. Another is Backstory, a security telemetry platform created by Chronicle, incubated from Google parent Alphabet, which last summer became part of Google Cloud.

Amazon launched AWS GuardDuty in 2017, a cloud-scale threat detection offering that monitors and analyzes data sources such as AWS CloudTrail, Amazon VPC Flow Logs and DNS logs. GuardDuty is primarily for AWS workloads, whereas Azure Sentinel can import AWS CloudTrail logs via a connector, Insight’s Diver said. At last month’s RSA Conference, Microsoft announced that customers can import AWS CloudTrail logs at no charge through June 30.

Insight had decided more than a year ago to sunset its ArcSight SIEM and initially was considering running the popular Splunk SIEM as virtual machine instances in AWS, according to Insight’s Diver.

“I stepped in and said that doesn’t make sense economically or technically,” Diver said. “Splunk on prem makes a lot of sense because you’ve got the hardware but trying to run it in AWS or Azure as VMs would cost a fortune. We noticed that a lot of companies that moved to the cloud with VMs in IaaS were coming back because the lift and shift was too expensive.”

Upon learning that Microsoft was developing Azure Sentinel, Diver made the case for it over Splunk, which Insight also sells to enterprises, underscoring the economics of moving Splunk VMs into cloud environments.

“You can’t take something that’s moving petabytes of data from an on-prem environment, and suddenly move to the cloud on a regular basis,” Diver said. “If you’re in the cloud, or going to the cloud, you also don’t want to build Splunk in a VM on Azure or AWS and you don’t want to pull that data back down. Azure Sentinel doesn’t require provisioning of servers, storage, networks, and all the engineering and licensing that goes with building a Splunk environment.”

Diver sees three core scenarios for Azure Sentinel: organizations without …

Mar 10

What Workers Told Us About Collaboration 

By | Managed Services News

Global study reveals universal conditions needed for successful collaboration.

No matter where you are in the world, new research tells us the conditions needed for successful collaboration are universal. The Steelcase Active Collaboration Study 2019* spoke to more than 3,000 executives, managers and individual contributors in different size organizations in Australia, France, Germany, Japan, the U.S. and the U.K.

Find out what the research revealed here

>