Search Results for "waas"

CenturyLink Cloud Marketplace Offers CloudJumper WaaS

CloudJumper’s workspace as a service (WaaS) solution surfaces in the CenturyLink Cloud Marketplace. CloudJumper appears to be gaining momentum with MSPs.

Premier BPO Acquires dinCloud, Gains Workspace as a Service (WaaS) Expertise

Premier BPO acquires dinCloud for Workspace as a Service (WaaS) and hosted desktop expertise. Is desktop as a service (DaaS) market shakeout coming?

Awingu, Barracuda Launch Secure WaaS on Microsoft Azure

Awingu and Barracuda introduce secure workspace as a service (WaaS) for Microsoft Azure or on-premises deployments. Is WaaS reaching a tipping point?

Cloud Computing Support

OS33 Launches Secure WaaS for Healthcare, Financial Services MSPs

OS33 launches workplace_Provider Program to give MSPs a secure, compliant WaaS (workplace as a service) platform for healthcare, financial services & more.

Cloud Services Acquisition: Evolve IP Buys WaaS Provider Azzaron

Evolve IP, the cloud services provider, acquires Azzaron for workspace as a service (WaaS) and vertical market IT services expertise.

CloudJumper Acquires WaaS IT Services Unit

CloudJumper has acquired an IT service provider business unit, vastly expanding its MSP and ISV ecosystem for Workspace as a Service (WaaS).

Itopia Funding: New Clues About WaaS Momentum

Itopia has raised $3.5 million in new funding, a potential clue that the company’s cloud-based Workspace as a Service (WaaS) for MSPs is catching on.

MSP Industry Pioneers Fund SaaS Alerts

SaaS Alerts, led by CEO Jim Lippie, raises $1.2 million in early stage funding from Gary Pica, David Bellini & additional MSP industry pioneers.

SaaS Alerts Hires Kaseya, Thrive Networks Veteran Jim Lippie as CEO

SaaS Alerts hires Kaseya & Thrive Networks veteran Jim Lippie as CEO. Startup empowers MSPs to monitor Microsoft Office 365 & other SaaS applications.

What Goes Into the Secure Access Service Edge (SASE) Solution

Cisco highlights the commonly accepted elements of a SASE solution and explains their approach to securing access and the network edge.