IT Brief Asia logo
Technology news for Asia's largest enterprises
Story image

How to achieve your monthly recurring revenue goals

By Contributor
Wed 29 Jun 2022

Article by BitTitan Asia Pacific director Brad Rosairo.

Monthly recurring revenue (MRR) is the ultimate goal, the most important issue on which anyone in the IT channel should focus.

As the developer of a comprehensive migration toolset for the complete MSP, my company aids the service provider who goes far beyond monitoring and actioning alerts to complete administration and proactive management of customer networks.

We only succeed when MSPs make money.

Thousands have expanded their businesses dramatically by offering their customers certainty that their data, email, documents and all other migrations are complete and accurate when moving from on-premises to

Microsoft Office 365 environments. Beyond this, they provide the training and ongoing support required to keep users productive.

So let’s examine how MRR works, then explore the services customers need in assessing their network’s current state, data assets, user communities, and steps for determining their future state.

They will need help selecting their preferred Office 365 plan and the cloud subscriptions that support it, configuring those options, planning and designing their new cloud-based environments, and developing an initial project plan. All of these are fee-based, revenue-generating activities.

Executing the project plan will require various services, including ordering subscriptions, provisioning and configuring the services, upgrading client devices, migrating data and applications, integrating cloud providers’ services, and more.

Then address users, ensuring they are trained in using Office 365 and related applications effectively. Ensure they are comfortable with self-service portals and support options.

Fee-Paid Planning Services

It shouldn’t be so common to add value at no charge, yet resellers, cloud sellers, systems integrators and others still give away value-added services. These include initial system design, upfront consulting, planning, and order management.

My company’s most successful partners charge for these services. Their first offering to a new client provides the planning and design required before Office 365 or any other cloud service can be ordered.

Other fee-paying examples include initial consulting, application inventory and evaluation, solution architecture and cloud service selection, information architecture and capacity planning, security with cloud integration design, and application and environment transition planning.

Ultimately, customers want to enter their first day with their new services ready to produce.

Today’s cloud integrators combine hardware, software and services from various cloud providers. They are responsible for ensuring that services from multiple cloud providers interact well.

The integrator must provide customers with complete, superior solutions. Data must be backed up. The network and data must be secure and protected. Access must be secure and reliable. User collaboration must be facilitated, and applications must achieve desired functions and results.

An MSP’s value depends on awareness of shifts in the cloud services market, its impact on customers, and recommendations for their business.

Growing Revenue on Migration and Deployment

Most channel partners have had customers seek help after trying to deploy Office 365 themselves. Some find many cloud services challenging to implement. They need expert help since many find provisioning and deployment challenging to configure IP addresses, DNS servers and other internet services.

Data migration is even more challenging. A project might be a simple cutover with a migration app or require tons of conversion, re-mapping and account manipulations. Again, a customer should be completely ready to use the new services on day one.

MSPs can’t remain reactive. This requires confirming the functionality of every user device, plus the preparedness of every user. Training on the applications, the platform, best security practices, and self-service portals should be completed before rollout.

Services that should be incorporated into a complete program during the transition include user transition training, cloud service provisioning, email system migration, email archiving, data migration, and user deployment and rollout.

Initiating MRR

MRR is generated from Office 365 licences, data backup services, online security services, and all other cloud services that pay commissions.

Some of these services are familiar, such as help desk and field support. Most MSPs already offer network monitoring, including alerting and actioning of anomalies, monthly performance reporting, regular reviews, improvement recommendations, and more.

Every cloud-delivered service requires monitoring. We can almost guarantee that an SLA performance report from the provider will always match their invoice. Customers need an objective third party to keep those providers honest.

In the cloud, add capacity management. A significant value of cloud computing is that users pay only for what they use. But someone must keep an eye on the storage, memory, and processor services that users request to determine when they’ve finished using them and left them idle instead of releasing them.

Customers save unbelievable amounts of money when MSPs keep them from paying for services they never use. When MRR is generated from support services, an MSP keeps 100% of the profit but needs to calculate the fully loaded burden to compute a total cost. Even so, income will far exceed the subscription commissions. This is the MRR on which most want to focus: customer fees for ongoing support services.

After the launch of the subscription, these services include day zero transition support, user support program, network and cloud service QoS monitoring and management program, and capacity management.

Improve the Process

There is a danger in remaining completely reactive in executing a support agreement. The system alerts you, you determine a course of action, and then resolve the problem. But what if there are no problems?

There is danger in remaining reactive in the execution. The problem with having no service events is that the customer never sees the MSP in action. The issue emerges at renewal time when a customer asks why they should bother renewing.

So MSPs must be proactive and predictive, anticipating problems and working on them before they occur. When reporting on activities to a customer, the MSP becomes highly visible.

Go further. Offer new ideas, as requirements, projects, initiatives, users and applications require the system to adapt. Talk with users to understand their experiences with the systems in place and surface fresh ideas to better serve each customer.

The ability to renew support agreements and drive continuing MRR depends on remaining highly visible. Do more frequent reports, hold review meetings, or convert these from phone to video.

Construct a plan for managing each account more productively. Maintain a ‘keep-in-touch’ culture and discipline by requiring every account team to report regularly on their latest contacts.

Keep improving their environment, and the MSP will enjoy more MRR for many years to come.

Related stories
Top stories
Story image
Low-code
Video: 10 Minute IT Jams - An update from Mendix
Mendix is a low-code platform used by businesses to develop mobile and web apps at scale, and Jornt joins us today to discuss how these offerings work, and what benefit they have in the development process.
Story image
Artificial Intelligence
Appier achieves historically high growth rate of 56% YoY
"Our strong momentum over the past two quarters underscores Appier's significant growth alongside our customers."
Story image
Lucid Software
Lucid Software expands enterprise offerings with enhanced slack apps
Lucid Software has expanded its enterprise offerings with enhanced slack apps for its Lucidspark and Lucidchart technology.
Story image
Malware
Kaspersky uncovers new attacks by advanced persistent threat group
The attacks involved modifications of the well-known malware, DTrack, as well as the use of a brand-new Maui ransomware.
Story image
JLL
Investment in APAC cold storage to reach $5 in next decade
Investment in Asia Pacific’s cold storage market is expected to grow fivefold in the next decade, according to JLL.
Story image
Data
Talend announces support for Amazon Redshift Serverless
Talend has announced its support for Amazon Redshift Serverless, with the company saying the integration reinforces its commitment and leadership in supporting businesses.
Story image
SaaS
Why is MACH architecture a new big thing in the tech world?
More and more global enterprises are considering replacing the monolithic tech stack with the best-of-breed composable stack that enables greater business agility.
Story image
Cloud
TBC Bank decreases time to market for new offerings by 40%
TBC Bank has reduced time to market for new and enhanced products and services by 40% since implementing Kong Enterprise, the cloud native API platform. 
Story image
Gartner Magic Quadrant
Gartner names Lookout a Visionary in 2022 Magic Quadrant
Gartner has recognised Lookout as a Visionary in the 2022 Magic Quadrant for Security Service Edge (SSE) and one of the top three offerings in the 2022 Gartner Critical Capabilities for SSE report.
Story image
eCommerce
Southeast Asia eCommerce market projected to grow 18% in 2022
According to a new study published by Ascential Digital Commerce, eCommerce sales in Southeast Asia are projected to grow 18% in 2022, reaching up to USD$38.2 billion.
AWS Marketplace
Watch this webinar to gain building blocks for data mesh, and how AWS customers today are successfully enabling domain driven data.
Link image
Story image
VMware
Latest VMware threat report reveals truth about deepfakes
"Cyber criminals have evolved. Their new goal is to use deepfake technology to compromise organisations and gain access to their environment."
Story image
Data Protection
VMware introduces advanced workload protection for AWS
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
scam
Classiscam threat expands to target leading platforms in Singapore
Researchers at Group-IB have uncovered that Classiscam, a sophisticated scam-as-a-service operation, has expanded to Singapore.
Story image
Infrastructure
IBM expands Power10 server line for business modernisation
IBM has recently announced a significant expansion of its Power10 server line with the introduction of mid-range and scale-out systems.
Story image
Cloud Security
Tenable makes additions to Cloud Security portfolio
Tenable has announced additions to Tenable Cloud Security that represent the next step in assessing threats related to cloud vulnerabilities.
Story image
Dark web
Beware the darkverse and its cyber-physical threats
A darkverse of criminality hidden from law enforcement could quickly evolve to fuel a new industry of metaverse-related cybercrime.
Story image
Digital Transformation
Top tips for making your finance transformation program a resounding success
Planning to make 2023 the year you embark on a wholesale finance transformation program? It’s a move that will stand your enterprise in excellent stead as you navigate the complexities of the post-Covid business landscape.
Story image
Microsoft
Avast reveals zero-day exploits targeting Chrome and Microsoft
Avast, released its Q2/2022 Threat Report today, revealing a significant increase in global ransomware attacks, up 24% from Q1/2022.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Data Protection
Advancing genomic sequencing and public health with digital infrastructures
Right before our eyes, we've witnessed the development of the COVID-19 vaccine in record time. An enormous achievement in an otherwise lengthy task that previously took, on average, 10-15 years.
Story image
Data analytics
Pressure on orgs to up their data analytics game - study
A recent report from Sisense highlights data transmission, analysis, and risk management remain top concerns for data professionals in APAC.
Story image
Cybersecurity
Education sector seeing highest volumes of cyber attacks
When breaking down the numbers to education attacks by region in July 2022, A/NZ was the most heavily attacked.
Story image
DevOps
Dynatrace extends application security capabilities for runtime environments
Dynatrace has announced that it has extended its Application Security Module to detect and protect against vulnerabilities in runtime environments.
Story image
Cyber attacks
Dramatic uptick in threat activity with exploits growing nearly 150%
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
Story image
Privileged Access Management / PAM
The importance of stopping identity sprawl for cybersecurity
The 2021 Data Breach Investigations Report (DBIR) shows that 61% of all breaches involve malicious actors gaining unauthorised, privileged access to data by using a compromised credential. Unfortunately, it is often too late when the misuse of a credential is detected.
Story image
Sustainability
Empyrion DC announces 40MW green data center in South Korea
Empyrion DC has announced it is developing a 40MW green data center in Gangnam, Seoul, South Korea (GDC).
Story image
Malware
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Story image
Tech job moves
Tech job moves - Fastly, INX, Kinly, SmartBear & Vectra AI
We round up all job appointments from July 29 - August 12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
IDC
High level of Customer Identity & Access Management adoption
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.
Story image
SaaS
Exclusive: The Access Group shares the benefits of embracing SaaS
In today's rapidly changing working environments, efficiency and productivity are surefire ways to create business growth and success.
Story image
ExtraHop
Organisations exposing highly sensitive protocols to public internet
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.
AWS Marketplace
Whitepaper: A practical guide for mitigating risk in today’s modern applications
Link image
Story image
Artificial Intelligence
Is your chatbot bringing down the customer satisfaction score?
The top 10 reasons why chatbots are failing to meet customer expectations and what you must do to avoid that.
Story image
Cybersecurity
Palo Alto Networks responds to rise in threats with MDR service
Unit 42 Managed Detection and Response is a new service that can offer continuous 24/7 threat detection, investigation and response.
Story image
Developers
Snyk announces plans to expand partner network in APJ
Recognising that partnerships are critical for growth, Snyk is building an entire partner ecosystem that will drive its expansion across APJ.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Application Performance Monitoring / APM
New Relic integrates offering with Atlassian’s Jira Software
New Relic has integrated errors inbox with Jira Software to allow developers to easily access and set up complete stack error tracking and software performance monitoring from within the tool.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
Artificial Intelligence
Gartner unveils key emerging tech to watch in 2022
"Such technologies present greater risks for deployment, but potentially greater benefits for early adopters," says Gartner.
Story image
Red Hat
Red Hat announces 2022 awards winners for A/NZ region
Red Hat recently acknowledged Australia and New Zealand partners with its annual awards, highlighting partners across various categories.
Story image
Augmented Reality
TeamViewer remote access software integrated into RealWear Cloud
TeamViewer has announced a major expansion of its partnership with RealWear, a leading provider of assisted reality wearable solutions for frontline industrial workers.