Skip to content

How to Make the Best MSP Sales Presentation: Examples + Templates

Are you tired of giving MSP sales presentations that don’t convert? You’re not alone. Too many pitches dive into technical jargon and service lists, resulting in you losing your audience before you ever reach the value.

If you want to win deals consistently, you need to shift the conversation. The best MSP sales presentations don’t just explain what you do, they show why your solutions matter to the client’s business. They speak directly to pain points, offer clear outcomes, and make your MSP the obvious choice.

This guide shows you exactly how to make the best MSP sales presentation using examples and templates. Whether you’re talking to time-strapped small business owners or skeptical enterprise executives, these strategies will help you lead with value, build trust fast, and close more deals.

Why Most MSP Sales Presentations Fail

Most MSP sales presentations fail because they don’t speak to what decision-makers truly care about. Instead of focusing on measurable business outcomes, many presentations get lost in technical details and service descriptions. This disconnect causes prospects, especially non-technical executives, to lose interest quickly.

CEOs, CFOs, and business owners are not concerned with how your tools work. They want to know how your services reduce downtime, improve productivity, control costs, and reduce cybersecurity risk. If your sales pitch doesn’t tie your solutions directly to these outcomes, it won’t resonate.

Below are some of the most common mistakes MSPs make during sales presentations—and how to avoid them.

Starting With “About Us” Slides

Too many presentations open by talking about the MSP itself, such as its team, history, or certifications. While credibility is important, your audience wants to hear about their problems first. Start with a business issue they care about. Only after establishing relevance should you introduce your MSP as the right solution.

Listing Services Without Context

A bullet list of services, such as monitoring, patching, backup, and endpoint detection, means nothing without context. Instead, connect each service to a clear business benefit. For example, rather than saying “we offer remote monitoring,” explain how it helps clients avoid costly outages and reduces IT support tickets.

Using Technical Jargon

Your client likely isn’t a tech expert. Using acronyms and product names without explanation confuses the audience and breaks engagement. Use plain language and real-world examples. Instead of saying “SIEM,” say “a security system that alerts you to threats before they cause damage.”

Sounding Like Every Other MSP

Generic pitches are forgettable. Many MSPs use the same slides, same service terms, and same pricing models. To stand out, tailor your presentation to the client’s industry, pain points, and business goals. Use client-specific data or challenges if available.

Weak or Vague Calls to Action

Finishing your presentation with “let us know if you have questions” is not a strong close. End with a clear next step. Offer a free risk assessment, suggest a follow-up strategy session, or propose a service trial. Make it easy for the client to say yes.

Creating a Winning MSP Sales Presentation

A successful MSP sales presentation follows a clear, structured path that guides your prospect from identifying their biggest challenges to seeing your services as the obvious solution.

Each part of the presentation should build trust, clarify outcomes, and demonstrate business value. The best presentations persuade not by showing off technical capabilities, but by aligning your expertise with real business priorities.

Before building your slide deck, establish a specific value proposition. What business problems do you solve, for whom, and how? This central idea should shape your opening, your messaging, and your final call to action. Remember, this presentation is about helping your prospect achieve success, with your MSP as the supporting partner.

The sections below break down each component of a winning MSP presentation.

1. Open With the Prospect’s Biggest Problem

Start by addressing a challenge your prospect can immediately relate to. This grabs attention and positions your services in the context of their most pressing concerns.

For example:

  • Small Businesses: “Sixty percent of small businesses that experience a cyberattack shut down within six months. How secure is your business?”
  • Mid-Sized Companies: “The average business loses $5,600 for every minute of IT downtime. What is unreliable IT costing you?”

These openers show that you understand their risks and that you’re focused on solving real business problems.

2. Position Your MSP as the Guide, Not the Hero

Prospects are not looking for a company that talks about itself. They’re looking for someone who understands their problems and can help them succeed. Frame your messaging around their goals, not your capabilities.

For example:

  • Instead of: “We offer 24/7 monitoring”
    Say: “We prevent IT problems before they disrupt your business.”
  • Instead of: “We provide cybersecurity services”
    Say: “We help you avoid data breaches and the financial damage they cause.”

Make the client the hero of the story. Your role is to guide them toward better outcomes.

3. Simplify Complex Ideas into Clear Value Pillars

Organizing your offerings into three or four key value themes helps make your message more digestible. Each pillar should focus on business benefits, not technical terms.

For example:

  • Keep Your Business Running: Reliable systems, quick support, and zero unplanned downtime.
  • Keep Your Business Secure: Advanced cybersecurity that protects your operations and reputation.
  • Keep Your Team Connected: Flexible cloud and collaboration tools that support remote work.

This approach helps prospects understand the full value of what you offer without overwhelming them with technical detail.

4. Prove Your Value With Social Proof and ROI

Back up your claims with results. Use short, targeted case studies, testimonials, or metrics to reinforce trust and demonstrate your impact.

For instance:

  • “Before working with us, [Client Name] experienced five hours of IT downtime per month, costing over $15,000 in lost productivity. After partnering with us, downtime dropped to under 30 minutes per month, saving them thousands annually.”

Real examples reduce skepticism and build credibility.

5. Handle Pricing by Framing It as an Investment

When discussing price, focus on outcomes, not line items. Decision-makers want to know what kind of return they’re getting.

For example:

  • Instead of: “Our services cost $150 per user per month”
    Say: “For less than hiring a single IT technician, you get a dedicated team that prevents outages and keeps your systems secure.”

This shifts the conversation from cost to value, making pricing easier to accept.

6. Close With a Clear, Low-Commitment Next Step

End your presentation with a direct and simple call to action. Give your prospect a reason to continue the conversation without making a big commitment.

Examples:

  • “Let’s do a complimentary IT risk assessment. We’ll identify your most urgent vulnerabilities—no pressure, no obligation.”
  • “Let’s schedule a 15-minute strategy call to see if we’re a good fit.”

This approach gives prospects something valuable while keeping the process low-risk.

MSP Sales Presentation Examples and Templates

A well-structured presentation can dramatically improve your ability to connect with decision-makers.

The Problem-Solution Framework is one of the most effective formats for MSP sales because it focuses on the client’s business risks, desired outcomes, and the concrete ways your services address those needs.

Below is a detailed slide-by-slide template designed to move prospects from pain awareness to solution commitment.

The Problem-Solution Framework Template

This presentation format follows a logical, persuasive narrative arc. Each section builds on the last to maintain engagement and drive decision-making.

Slide 1: Attention-Grabbing Headline

Start with a bold question or statement that immediately frames a high-stakes issue.

  • Example: “Is Your Business One Cyberattack Away from Closing?”
  • Visual: Impactful image related to business risk

Slides 2 to 3: Problem Definition & Stakes

Identify specific pain points based on your audience’s industry or role. Include meaningful data to show the real cost of doing nothing.

Slides 4 to 5: Vision of Success

Create a clear contrast between the risk of inaction and the benefit of working with you. Focus on both tangible and emotional rewards.

  • Use concrete metrics and emotional benefits
  • Example: “Imagine managing your practice with confidence, knowing patient data is secure and your reputation protected.”

Slides 6 to 8: Solution Overview

Introduce your three main service pillars. Explain each in plain language that ties features to business results.

  • For each pillar, explain: What it is, What it does, Why it matters
  • Example: “Our multi-layered security approach protects your business at every access point. This prevents breaches before they happen, not just responding after damage occurs.”

Slides 9 to 10: Differentiation Points

List three to four specific differentiators that clearly separate your MSP from competitors.

  • Example: “Unlike other providers who offer generic packages, we customize security protocols based on your specific regulatory requirements.”

Slides 11 to 12: Proof & Validation

Provide evidence of success using case studies, KPIs, and third-party recognition.

  • Industry recognitions and partnerships
  • Example: “Since implementing our security solution, ABC Medical reduced security incidents by 94% and passed their compliance audit with zero findings.”

Slides 13 to 14: Implementation Process

Clarify how onboarding works. Show your process in simple phases, with clear responsibilities for both your team and the client.

  • What the client needs to do vs. what you handle
  • Example: 4-phase implementation roadmap with clear milestones

Slide 15: Investment & ROI

Position your pricing as a strategic investment that offsets risk and reduces long-term costs.

  • Example: “For less than the cost of one part-time security analyst, you get 24/7 protection and guaranteed response times.”

Slide 16: Clear Next Step

End with a specific, low-friction call to action that encourages immediate follow-up.

  • Example: “Let’s start with a complimentary security assessment to identify your specific vulnerabilities.”

Specialized Presentation Examples

For MSPs with a specific service focus, tailoring your presentation around a targeted business need is essential.

A cybersecurity-focused sales presentation is especially effective when selling to regulated industries or companies that have experienced or are concerned about data breaches.

Below is a refined example presentation structure specifically designed for MSPs that prioritize security services.

Cybersecurity-Focused MSP Presentation

This format helps you position cybersecurity not only as a protective measure but as a strategic business asset. Each section connects real-world risks with your specific capabilities, making your services more relevant and valuable to decision-makers.

Opening Section: Understanding the Cyber Risk

Begin by presenting current, relevant threats that affect companies in your prospect’s industry. This builds urgency and reinforces the importance of proactive cybersecurity.

  • Cite recent cyberattacks that impacted similar businesses. Use headlines or statistics from the past 12 months.
  • Present industry-specific data showing average breach recovery costs for businesses their size.
  • Introduce the “security debt” concept—explain how deferring investment in cybersecurity compounds risk and increases the eventual cost of recovery or legal consequences.

Example Talking Point
“The average ransomware payout for mid-sized businesses rose by 71 percent in the last year. The longer you postpone implementing a proper defense, the more expensive and disruptive an attack becomes.”

Middle Section: Security as a Business Growth Enabler

Next, shift the conversation from fear to opportunity. Position strong cybersecurity as a foundation for growth, operational stability, and customer confidence.

Explain how your cybersecurity services:

  • Support compliance with frameworks like HIPAA, PCI-DSS, and GDPR
  • Enable entry into new markets by meeting security requirements from clients, regulators, or partners
  • Protect the company’s reputation and customer loyalty by preventing data breaches
  • Make secure remote work possible, allowing for greater workforce flexibility
  • Contribute to lower cyber insurance premiums through demonstrable risk controls

Example Framing
“A proactive security strategy doesn’t just protect what you’ve built—it clears the path for you to expand confidently and securely.”

Solution Section: Your Layered Security Strategy

Now present your technical capabilities in a way that aligns with real business risk. Visuals work well here. Use a layered diagram to walk through each component of your security stack.

Each layer should include:

  • What It Is: (e.g., endpoint protection, DNS filtering, SIEM)
  • What It Defends Against: (e.g., phishing, data exfiltration, insider threats)
  • Why It Matters: (tie back to risk reduction, compliance, or productivity)

Include Guardz’s unified cybersecurity platform as the central hub that integrates and streamlines your security stack.

Highlight benefits such as:

  • Reduced alert fatigue through automation
  • Faster response to incidents
  • Centralized visibility across devices, users, and data points

Visual Tip: Show a real-world incident timeline that demonstrates how your system identifies, contains, and neutralizes threats in real time.

Closing Section: Partnership Built on Peace of Mind

Conclude by showing what ongoing protection looks like in practice. Reassure your prospect that you don’t just install tools, but rather that you stay actively involved in defending their business.

Key elements to cover:

  • 24/7 monitoring protocols and escalation paths
  • Real-time alerting and documented response procedures
  • Quarterly or monthly security reporting for accountability

Include a case study showing how your team prevented or contained a real attack. Focus on measurable results such as response time, data protected, or financial losses avoided.

Call to Action: Offer a complimentary cybersecurity risk assessment, clearly stating what they’ll get—such as a vulnerability summary, phishing risk score, or gap analysis.

Example CTA
“Let’s schedule a 30-minute security assessment. We’ll identify your top three vulnerabilities and give you a customized action plan—no obligation.”

Cloud Migration Specialist Presentation

For MSPs specializing in cloud transformation, this presentation format helps prospects understand both the cost of maintaining legacy systems and the long-term value of cloud adoption. The goal is to reframe cloud migration as a strategic decision that improves flexibility, resilience, and cost efficiency.

Opening Section: The Hidden Cost of Legacy Systems

Begin by highlighting the financial and operational burdens of outdated infrastructure.

  • Discuss the maintenance costs of aging hardware and unsupported software
  • Point out how rigid on-premises systems slow innovation and limit scalability
  • Emphasize missed opportunities such as remote work enablement, real-time collaboration, or faster deployment cycles

Example Framing
“Outdated systems don’t just cost more to maintain—they prevent you from adapting to new business demands.”

Middle Section: Your Cloud Transformation Roadmap

Present your migration strategy in simple, phased steps. Tie each phase to a clear business benefit.

  • Phase 1: Assessment and planning
  • Phase 2: Migration of non-critical workloads
  • Phase 3: Full platform transition and optimization

Include a visual cost comparison between current infrastructure spending and projected cloud costs. Reference successful client migrations with brief metrics or outcomes.

Solution Section: Migration Process and Tools

Explain your methodology with a focus on minimizing disruption.

  • Highlight business continuity measures
  • Show the tools you use for automation, data integrity, and testing
  • Explain how Guardz is integrated throughout to ensure security remains consistent during and after migration

Tip: Include visuals or timelines to make the process easier to understand.

Closing Section: What Day One Looks Like in the Cloud

End by painting a picture of operations post-migration.

  • Faster system performance
  • Predictable IT costs
  • Increased agility for growth and innovation
  • Improved support for hybrid or remote teams

Call to Action: Offer a no-cost cloud readiness assessment, with a deliverable such as a migration feasibility report or cost analysis.

Example CTA
“Let’s schedule a readiness assessment. We’ll evaluate your current setup and provide a roadmap to the cloud with projected cost savings.”

Presentation Delivery Best Practices

Delivering your MSP sales presentation effectively is just as important as building it. Strong delivery turns a static presentation into a dynamic, two-way conversation that builds trust and drives engagement.

The best presentations are interactive, tailored, and focused entirely on the prospect’s priorities, not just your service offerings.

Below are best practices for delivering presentations both in person and virtually, along with tips for handling objections as they arise.

Pre-Meeting Discovery

A successful presentation begins before the first slide appears. Conducting discovery upfront ensures your message is relevant and personalized.

  • Schedule a discovery call before preparing your deck. Use this time to understand the prospect’s business model, pain points, existing IT environment, and decision-making process.
  • Ask about their short-term IT priorities and long-term growth plans.
  • Use the information gathered to customize your presentation with specific challenges, industry context, and business goals.
  • Reference actual systems or configurations they currently use, if known. This builds credibility and shows preparation.

Tip: Follow up your discovery call with a short summary email confirming the key issues discussed. Use this as a checklist while preparing your deck.

In-Person Presentation Dynamics

In-person meetings allow for stronger rapport, but they require a more flexible, conversational approach.

  • Start by asking open-ended questions to confirm the client’s top concerns. Avoid jumping into slides immediately.
  • Use the 80/20 rule: allow the prospect to speak 80 percent of the time while you guide the conversation and respond meaningfully.
  • Only present slides that directly address confirmed challenges. Skip sections that aren’t relevant.
  • Be ready to jump between topics and reorder your deck based on where the conversation goes. Flexibility demonstrates professionalism and attentiveness.

Tip: Bring printed handouts with key diagrams or service overviews in case the conversation moves away from the screen or you need to draw comparisons visually.

Virtual Presentation Techniques

Virtual presentations require tighter visuals and a more engaging format to overcome digital fatigue.

  • Keep slides clean, with one idea per slide and minimal text. Replace long paragraphs with icons, metrics, or short phrases.
  • Use annotation tools or a digital pointer to draw attention to specific areas on-screen.
  • Include simple interactive elements like polls, yes/no questions, or on-the-spot assessments to encourage participation.
  • Maintain eye contact with the camera and avoid reading from the slides.
  • Send follow-up materials, such as the presentation PDF, case studies, or technical spec sheets within one hour of the meeting to maintain momentum.

Tip: Record the meeting (with permission) and offer to send the playback link, especially if decision-makers were unable to attend.

Handling Objections During Presentations

Objections during a presentation are not setbacks but rather opportunities to clarify value and build trust.

  • Identify the most common objections in advance, such as pricing concerns, doubts about switching providers, or skepticism about ROI. Prepare specific talking points or slides that address each one.
  • When an objection arises, listen fully, acknowledge the concern, and respond with a relevant solution or case study.
  • Include a slide or visual that proactively addresses the top three objections you typically encounter. This shows transparency and builds confidence.

Tip: Use objection-handling moments to pivot the discussion. For example, if cost is raised, use it as an opportunity to explain your value-based pricing and show ROI from similar clients.

Key Strategies for Delivery

The most effective sales presentations are about creating meaningful conversations that address prospect needs. Your delivery approach can make or break even the most perfectly crafted presentation.

These strategies help transform your presentation from a monologue into a productive dialogue that moves prospects closer to becoming clients.

Listen More Than You Talk

Successful MSP sales meetings involve more listening than talking. Begin each meeting by asking open-ended questions about the prospect’s business challenges. Listen carefully to their responses and take notes.

This accomplishes two critical goals: it demonstrates genuine interest in their needs and provides valuable intelligence for customizing your presentation on the spot.

Many MSPs make the mistake of launching directly into their pitch without confirming the prospect’s actual pain points. When you listen first, you can focus your presentation on exactly what matters to them, dramatically increasing your chance of connecting.

Focus on Relevance, Not Comprehensiveness

Rather than covering your entire service catalog, highlight only what directly addresses the prospect’s specific challenges. Select two to three key services that solve their most pressing problems and focus your presentation there.

This targeted approach demonstrates your understanding of their priorities and prevents information overload.

Prospects don’t need to know everything you do. They need to understand how you solve their specific problems. Keep technical details in reserve and only share them if explicitly asked. Remember that decision-makers care more about outcomes than the technical methods you use to achieve them.

Leave Materials Behind

Create high-quality leave-behind materials that reinforce your key messages and provide additional information the prospect may want to review later. These materials should include your contact information, key differentiators, relevant case studies, and a clear next step.

Physical materials create a tangible reminder of your meeting and allow prospects to share information with other stakeholders who weren’t present. Digital materials should be well-designed and easily shareable. Follow up within 24 hours with a personalized email referencing specific points from your conversation to keep momentum going.

How Guardz Integration Enhances Your MSP Sales Presentation

Integrating Guardz’s unified cybersecurity platform into your MSP sales presentation transforms your security offering from a complex technical discussion into a compelling business advantage.

This section of your presentation should highlight how partnering with Guardz allows you to deliver enterprise-grade protection without the enterprise complexity and cost.

  1. Start by explaining the problem with traditional security approaches: multiple disconnected tools create gaps, complexity, and false alerts.
  2. Then showcase how Guardz provides comprehensive protection across the entire digital surface with a single unified dashboard.
  3. Emphasize the platform’s AI-powered capabilities that continuously monitor for threats across identities, endpoints, email, cloud services, and data stores.
  4. For prospects concerned about implementation and management, highlight Guardz’s streamlined deployment process and intuitive interface. Explain how its automation reduces alert fatigue and speeds response times.
  5. For cost-conscious clients, demonstrate the ROI through reduced security tool costs, minimized management overhead, and enhanced protection against costly breaches.
  6. The cyber insurance option provides another powerful differentiator. Show prospects how Guardz not only protects their business but also helps secure financial coverage if an incident does occur. This additional layer of protection creates peace of mind that competitors without Guardz cannot offer.
  7. Finally, use real client examples to illustrate how Guardz has simplified security management while strengthening protection. Concrete examples of threat prevention success stories make the benefits tangible and demonstrate your team’s expertise with the platform.

Ready to Transform Your MSP Sales Process?

Your sales presentation represents more than just slides and talking points. It’s often the first substantial impression prospects have of your MSP’s approach to solving business problems. The strategies outlined in this guide help you create presentations that connect with decision-makers by focusing on outcomes rather than technologies.

The right sales presentation can dramatically shorten your sales cycle and improve close rates by addressing prospect concerns directly and positioning your MSP as the obvious solution partner.

By integrating Guardz’s unified cybersecurity platform into your offering, you gain a powerful differentiator that resonates with businesses concerned about security threats.

Take the next step in elevating your sales approach by implementing these strategies and exploring how Guardz can strengthen your security offering.

See firsthand how our platform simplifies complex security challenges through our unified dashboard, AI-powered monitoring, and comprehensive protection across the entire digital surface. Book a demo today and discover why leading MSPs are partnering with Guardz to enhance both their security capabilities and their sales effectiveness.

Frequently Asked Questions

How Long Should My MSP Presentation Be?

Keep it under 30 minutes, with extra time for discussion. Focus on value over volume.

What Makes Guardz a Strong Sales Differentiator?

Guardz combines protection, automation, and cyber insurance support in one platform, thus simplifying security for clients.

Should I Use the Same Slides for Every Client?

No. Tailor each presentation based on discovery calls and industry-specific risks.

What’s the Best Way to Handle Pricing Questions?

Frame pricing around outcomes, not line items. Emphasize risk reduction and cost savings.

Do I Need a Separate Deck for Cybersecurity?

Yes. A focused cybersecurity presentation helps address specific concerns and shows deeper expertise.

 

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Making Cyber Moves That Matter – Guardz Monthly Update

Explore the latest Guardz updates, fresh product enhancements, & more.

What’s New in the Platform

We’re excited to bring you new feature updates and improvements
to our existing product.

ITDR (Coming Soon)

Beta is ongoing, and general availability is planned for mid-June. Identity Threat Detection & Response (ITDR) allows for the discovery of identity threats through behavioral analytics, anomaly detection, and continuous monitoring by automating actions such as suspending accounts.

Those on the Ultimate Plan will benefit from the 24/7 MDR analysis of these detections.


A cybersecurity dashboard displays an alert for Potential Account Compromise and detailed info on a Suspicious Mailbox Rule, highlighting auto-forwarding and possible ransomware activity—crucial moves in boosting online security.

Transparent MFA Detection

We’ve enhanced our MFA detection engine to provide better visibility into misconfigurations. Each alert now includes a clear reason for why it was flagged, making it easier for MSPs to troubleshoot and act.

What’s new:

1. Every MFA detection now shows the specific reason it was triggered

2. Helps MSPs quickly pinpoint and resolve configuration issues

3. Reduces alert confusion and shortens time to remediation


This update brings clarity to MFA enforcement and gives MSPs greater control over identity security at scale.


A notification window shows “1 user is missing MFA in Microsoft 365” with a medium priority. Tabs for “Issue overview” and “Remediation options” help you start making cyber moves for stronger cybersecurity through multi-factor authentication (MFA).

Compliance Mapping

If you didn’t spot the in-product announcement or stumble on it yourself, we’re pleased to announce that Compliance Mapping is live.

You can find the icon at the top right of the platform and see how easy it is to extract CSV reports mapped to some of the most common compliance and regulation frameworks.


A dashboard screen for cyber security displays risk analysis and management details for a specific IP, listing security controls and risk statuses in colored labels. A search bar and help icon are visible at the top left, making cyber moves easier to manage.

External Scan Just Got Smarter and Faster

We’ve upgraded the Guardz External Scan engine to improve response times and expand vulnerability coverage. These updates help MSPs validate remediations sooner and identify more external risks across client environments.

What’s improved:

  • Follow-up scans now trigger approximately 1 hour after remediation instead of 12
  • Unresolved issues reopen after 1 day rather than 4
  • New vulnerability checks added for HTTP-based technologies such as Apache, Microsoft IIS, and PHP

Faster scans mean quicker confirmation that issues are fixed, so you can close tickets and reduce open risk sooner. The expanded checks give you deeper visibility into client infrastructure, allowing for more accurate and comprehensive external security assessments.

🗞 In the News


Guardz is now live on the Pax8 Marketplace!


Two puzzle pieces, one with the Pax8 logo and one with a green logo, connect against a dark background with glowing arcs linking boxes labeled MSP. Sparkles indicate connection, integration, and enhanced cybersecurity for seamless solutions.

With Guardz available through Pax8, MSPs can streamline the onboarding, provisioning, and managed cybersecurity for their clients.

The integration is designed to reduce friction, simplify billing, save time, and deliver immediate value directly from the marketplace.

Read more about this partnership >

Legacy Auth is the backdoor that attackers are counting on


A glowing chain breaks with shattered links, set against a dark world map background with warning icons—a nod to evolving cyber strategy. A label reads Research Insights in green text on a gray rectangle.

Between March 18 and April 7, Guardz Research, led by Elli Shlomo (SR), Head of Security Research at Guardz, tracked a global campaign that abused BAV2ROPC in Microsoft Entra ID, bypassed MFA, dodged Conditional Access, and flew under the radar.

  • 90% + of attacks hit Exchange Online
  • 10K + brute-force attempts on admin accounts
  • Origins: Eastern Europe & APAC

If you’re still allowing legacy authentication, you’re a sitting target.

Get the full breakdown >

🚀 Where to Find Guardz This June


IT Nation event details with flame logo; June 2-4, 2025 in Orlando, Florida; Booth #504, on a dark tech-themed background featuring cutting-edge Cyber Solutions.

We’re excited to join MSPs and security leaders at IT Nation Secure to talk about what’s next for SMB protection. Meet Dor Eisner, Royi Barnea, Sasha Milan, and William Barr and see how Guardz is making security simpler, smarter, and built for the real world.


Event graphic for pax8 Beyond, featuring dates June 8–10, 2025, in Aurora, CO at Booth #328. The design highlights digital-style green accents on a dark background with hints of Cybersecurity innovation and cyber moves.

We’re bringing the energy to Pax8 Beyond. Join us in Aurora to explore how Guardz helps MSPs drive impact with a unified approach to cybersecurity, minus the complexity. We’re ready to connect, learn, and build stronger partnerships.


Dark banner for ASCII Edge event. Text reads: ASCII Edge. June 25–26, 2025. Chicago, IL. Features calendar and location icons with circuit-like graphics highlighting Cyber Security strategies.

Royi Barnea and Jonathan Boulos will be in Chicago for ASCII Edge, joining forces with MSPs focused on growth, community, and practical security solutions. Come chat with us about what you’re seeing in the field, and how Guardz can help you stay ahead of it.

We’re looking forward to connecting with the MSP community.

🤝 Build the MSP Community and Get Rewarded


Have you heard about our Referral Program and how it can boost your earnings? If you, as an MSP, refer another MSP to our platform, you can earn a $1,000 gift card for every qualified MSP you refer who attends a demo and an additional $2,000 for a signed deal.

Refer an MSP >

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion announces Day Zero Support for Android 16: Enterprise-ready from day one

At Scalefusion, we’ve spent over a decade helping IT teams manage Android devices with confidence and clarity. With Android 16 now officially rolling out, you can rest assured that both new and existing deployments of devices running Android 16 will continue to operate smoothly, providing your IT team with peace of mind and uninterrupted productivity.

Android 16 - Scalefusion

Android 16 introduces a new wave of updates across security, user experience, productivity, and device management. Scalefusion is aligned and prepared to support every key feature right from launch.

What’s new in Android 16?

Android 16 delivers refinements that improve performance, accessibility, and overall usability. 
Here’s a closer look at what’s included:

Visual and UI enhancements

Material You Expressive (coming in 16.1) introduces lively animations, glass-like blurs, and richer system colors that give Android a polished, dynamic feel. Quick Settings are now more compact with neatly grouped toggles for faster access, while the lock screen and notifications feel smarter too, think real-time updates for rides and deliveries, bundled alerts, and gentle cooldowns that help cut the clutter.

Privacy and security

  • Advanced protection mode: Adds extra layers of defense for high-risk users with hardened settings and restricted access.
  • AI scam detection: Smarter fraud warnings in calls and messages.
  • Private space: A secure profile to hide sensitive apps and data.

Smarter features

  • Predictive back with preview: Gives users a visual of the previous screen before completing the back gesture.
  • Contextual long-press menus: Quick access to functions like copy and screenshot.
  • Enhanced accessibility: Improved support for hearing aids, magnification, and interaction modes.

Productivity and large screen improvements

  • Desktop mode (beta): Allows windowed multitasking on tablets and external displays.
  • Improved taskbar and keyboard shortcuts: Especially useful for tablets and foldables.
  • Better split-screen: Smoother resizing and more intuitive drag-and-drop experience.

Camera and audio updates

  • Ultra HDR and Pro camera APIs: Unlock sharper visuals and enhanced image quality.
  • Auracast audio sharing: Broadcast audio to multiple Bluetooth devices at once.
  • AV1 Codec support: Delivers high-quality video with lower bandwidth usage.

Android 16 for enterprise and IT teams

Android 16 also brings targeted improvements for enterprise environments, making Android device management more secure and efficient.
Here’s what’s up for enterprise IT teams with the shiny new Android OS: 

Security and policy controls

With Scalefusion, IT teams can take full advantage of Android 16’s Advanced Protection Mode, enabling phishing-resistant authentication, blocking USB access, and locking down apps for those who need extra safeguards. 

LAPS for Android simplifies password management on shared and kiosk devices by rotating local admin credentials automatically, reducing the risk of misuse. Plus, AI Scam Detection Enforcement empowers organizations to stop suspicious messages and calls before they reach their teams, applying policy-driven protection that keeps devices and data safer.

Deployment and management features

Scalefusion simplifies every part of the experience. IT teams can manage Private Space with full control over access and visibility, so sensitive data stays securely isolated. Kiosk Mode enhancements allow smoother multi-app management and more refined screen pinning for devices that need to serve a dedicated purpose. And with zero-touch enrollment upgrades, setup is quicker and more flexible, including a backup QR code option that keeps deployments on track.

Work and personal use improvements

  • App-level profile separation: Employees can use apps like WhatsApp in both work and personal profiles without data crossover.
  • Work profile widgets and alarms: IT teams can separate scheduling and interface elements for better personal and work-life balance for employees.
  • Credential manager support: Simplifies login with support for passkeys and device-based authentication, faster access, fewer roadblocks!

Ready for Android 16 with Scalefusion

With Android 16 rolling out, Scalefusion is already equipped to support the new OS version. Whether your teams are managing shared devices, deploying in large numbers, or enforcing strict security controls, Scalefusion ensures that your Android 16 experience is reliable, secure, and optimized from day one.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to find Trimble Cityworks on your network

Latest Trimble Cityworks vulnerability #

vulnerability has been disclosed in Trimble Cityworks versions prior to 23.10. Cityworks is a popular GIS and asset management system for local governments. This vulnerability would allow a remote, authenticated attacker who could upload malicious files to execute arbitrary code on the vulnerable system.

This vulnerability has been designated CVE-2025-0994 and has a CVSS score of 8.6 (high).

Note that there is evidence that this vulnerability is being actively exploited in the wild.

What is the impact? #

Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system, potentially leading to complete system compromise.

Are any updates or workarounds available? #

Trimble has released updates to mitigate this issue. Users are encouraged to update to version 23.10 or later as quickly as possible. Additionally, as this vulnerability appears to be under active exploitation, users are advised to examine their systems for any unexpected files or network services. 

How do I find Trimble Cityworks installations with runZero? #

From the Service Inventory, use the following query to locate potentially impacted assets:

_asset.protocol:http and protocol:http and favicon.ico.image.md5:="b26ada00a06ee050e56160ea5308bc9f"

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Sigma Specification 2.0: What You Need to Know

Sigma rules have become the security team equivalent of LEGO bricks and systems. With LEGO, people can build whatever they can imagine by connecting different types of bricks. With Sigma Specification 2.0 rules, security teams can create vendor-agnostic detections without being limited by proprietary log formats.

 

In response to the Sigma rules’ popularity, the team that built them updated them in August 2024, giving security teams new capabilities. With Sigma rules 2.0, security teams now have:

  • New fields and modifiers that improve how security teams use the rules
  • Correlation specifications to extend rules to more sophisticated detections
  • Filters that reduce false positives
  • JSON schema to allow automation

 

The Sigma rule v. 2.0 updates enable you to expand your usage of the rules and improve your threat detection and response capabilities.

 

Why were the Sigma rules updated?

According to the team responsible for the Sigma rules, security teams embraced the rules and clamored for additional capabilities. In response, the team started by creating pySigma, introducing enhancements that led to evolving the specification itself and the release of v 2.0.

 

What are the key changes in Sigma v.2.0?

To improve security teams’ use of the rules, the team made three critical updates.

New Metadata Fields and Modifiers

 

The original Sigma rules offered 11 fields. In v2.0, the team added the following new fields:

 

  • Taxonomy: optional attribute that can define field names, field values, logsource names so that organizations can create a custom taxonomy or transform the taxonomy to the default model
  • Scope: ability to define whether a rule should trigger on a specific set of machine types with a specific software installed

 

Further, the update incorporates new Detection categories that include:

  • Field Existence: in case a field is optional in an event
  • Placeholders: values that get their final meaning at conversion or rule usage time, like replacing placeholders with a single, multiple or-linked value or pattern, replacing placeholders with a query expression, or conducting lookups in tables or API while matching the Sigma rule that contains the placeholder
  • Standard Placeholders: defined values for administrative user accounts, server systems used as jump servers, workstation systems, server systems, and domain controller systems
  • Keywords search: a list under search-identifiers that looks for keywords across an entire event

 

Finally, Sigma v2.0 now includes a modifiers appendix that includes the following modifier types:

  • Generic: list of modifiers that can apply to all field types, like all, startswith, endswith, contains, exists, cased, cidr and base64
  • String: regular expression (Regex) and Encoding modifiers that only apply to string
  • Numeric: list of modifiers that only apply to numeric values, like lt, lte, gt, gte
  • Time: modifiers to extract a numeric value from a date, like minute, hour, day, week, month, and year
  • IP (Internet Protocol): modifiers that can only apply to IP valudes, like cidr
  • Specific: modifiers to expand value placeholders or to modify a plain string into a field reference

 

Rule Correlation

The new rule correlation specification may be the most exciting update for v2.0. Although the security teams could aggregate rules, the expression was limited. The new rule correlation specification enables security teams to link several events together to create more complex detections.

 

For example, security teams can build Sigma rules that identify:

  • Invalid logins meet or exceed a set threshold
  • Invalid login alerts on a host that come from an unknown location
  • Alerts generated in the same timespan

 

Sigma v2.0 defines the following correlation types:

  • Event count (event_count): condition that counts events happening over a time frame based on a defined threshold, like more than 50 failed login attempts in 3 minutes
  • Value count (value_count): counts the values in a specified field based on a threshold, like failed login attempts with more than 50 different user accounts against a specific source and from a specific destination in a day
  • Temporal proximity (temporal): group of rules that all occur during the same timespan, grouped by the same value, like three Sigma rules impacted within 5 minutes by the same user
  • Ordered Temporal Proximity (temporal_ordered): group of rules that occur in a specified order within the same timespan, like 5 failed logins followed by a successful login from the same user account within 10 minutes.

 

Sigma Filters

Instead of writing the same exclusions across different individual rules, the Sigma Filter enables security teams to write one exclusion in one location and apply it across the entire environment.

 

Sigma’s creators noted two reasons for implementing these new exclusions that apply the “not” condition:

  • Applying the condition to the initial detection can be less effective because they fail to consider the organization’s unique environment.
  • Attackers may attempt to use these file paths, patterns, and behaviors to evade detection.

 

Sigma Filters are separate from an organization’s individual Sigma rules, enabling the detections to remain as globally applicable as possible. By applying Sigma Filters to multiple Sigma rules, security teams can manage their detections more effectively.

 

Graylog Security: Supporting Sigma v2.0 Mapped to MITRE ATT&CK Framework

Using Graylog Security, you can rapidly mature your TDIR capabilities without the complexity and cost of traditional Security Information and Event Management (SIEM) technology. Graylog Security’s Illuminate bundles include subsets of SOC Prime and Trukno rulesets so you have content that includes Sigma detections, enabling you to uplevel your TDIR with threat-hunting capabilities and correlations to ATT&CK TTPs.

By leveraging our cloud-native capabilities and out-of-the-box content, you gain immediate value from your logs. Our anomaly detection ML improves over time without manual tuning, adapting rapidly to new data sets, organizational priorities, and custom use cases so that you can automate key user and entity access monitoring.

With our intuitive user interface, you can rapidly investigate alerts. Our lightning-fast search capabilities enable you to search terabytes of data in milliseconds, reducing dwell times and shrinking investigations by hours, days, and weeks.

To learn how Graylog Security can help you implement robust threat detection and response, contact us today.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

Keepit continues its commitment to growth in the UK and Ireland with new VP hire

New senior executive shares ambitious goals for regional Keepit expansion  

Copenhagen, Denmark, June 2, 2025 Keepit, the global leader in SaaS data protection, today announced that Dan Middleton, former VP at Veeam, has been appointed as its new VP for the UK and Ireland. Middleton will grow Keepit’s UKI sales team, accelerate pipeline generation, and drive the expansion of Keepit’s local partner ecosystem with the regional partner management team. Additionally, Middleton is responsible for Eastern Europe, Middle East and South Africa.

With over 20 years’ experience in IT sales leadership, Middleton brings a wealth of proven go-to-market expertise and leadership to Keepit. His appointment follows an 11-year tenure at Veeam UKI, where he played a key role in strengthening the company’s market presence to #1 in the region. 

“Keepit is solving one of the most urgent challenges organizations face today: protecting and controlling their data in a complex, fast-moving, and highly regulated landscape. With data sovereignty continuing to rise up the boardroom agenda, businesses need practical, proven solutions. My priority now is to build on momentum in the UK and Ireland, working closely with our channel partners to drive growth and help more organizations take control of their data, wherever it resides,” said Middleton. 

“We’re incredibly excited to have Dan on board,” said Keepit Chief Revenue Officer, Craig Bumpus. “He’ll be leading an already strong and experienced team dedicated to helping organizations protect their data. This role is critical to our continued growth in the region and with Dan’s expertise, we’re set to meet some bold growth objectives that will take us into strategic accounts and help expand our customer base even further. Following our recent alliance with Ingram Micro in the UK we are well positioned to expand our UK footprint” 

Middleton joins Keepit at a time when organizations are under significant pressure to protect their data and metadata generated by their SaaS applications. However, SaaS providers have no obligation to offer data protection services alongside their tools.  

 

Thanks to datacenters located in the UK and complete independence from global hyperscalers, Keepit’s backup and recovery solution ensures that organizations retain complete access to their data at all times. With Keepit, organizations have the confidence that data remains under their control, even if the original SaaS system is unavailable, or a third party takes unauthorized control of data stored within a public cloud. This is a critical contribution to data resilience in the context of UK digital sovereignty. 

 

A wave of cyberattacks – including recent high-profile attacks against major UK retailers – has pushed data protection back into the spotlight. And with both the UK and EU tightening data sovereignty laws, organizations must take a more strategic approach to managing their data: classifying, prioritizing and understanding its value.  

Keepit supports this by offering secure, compliant cloud backup and data management services that ensure data is protected, easily accessible and stored according to local sovereignty requirements. This enables organizations to maintain control, meet regulatory demands, and recover quickly from cyber incidents. 

Based at Keepit’s continuously growing UK headquarters in London, Middleton will accelerate adoption of Keepit’s solutions by targeting industries facing some of the toughest data governance challenges, where organizations are subject to numerous regulations, including aligning their data policies with UK and EU legislation. 

For more information on Keepit’s data protection solutions and upcoming developments, visit www.keepit.com 

About Dan Middleton
Dan Middleton is Keepit’s VP, UK and Ireland. He has over two decades of experience working in IT sales management, including 11 years with Veeam Software in roles that included Commercial Sales Director and VP, UK & Ireland. 

Find Dan Middleton on LinkedIn 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.