IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

How to achieve your monthly recurring revenue goals

By Contributor
Wed 29 Jun 2022

Article by BitTitan Asia Pacific director Brad Rosairo.

Monthly recurring revenue (MRR) is the ultimate goal, the most important issue on which anyone in the IT channel should focus.

As the developer of a comprehensive migration toolset for the complete MSP, my company aids the service provider who goes far beyond monitoring and actioning alerts to complete administration and proactive management of customer networks.

We only succeed when MSPs make money.

Thousands have expanded their businesses dramatically by offering their customers certainty that their data, email, documents and all other migrations are complete and accurate when moving from on-premises to

Microsoft Office 365 environments. Beyond this, they provide the training and ongoing support required to keep users productive.

So let’s examine how MRR works, then explore the services customers need in assessing their network’s current state, data assets, user communities, and steps for determining their future state.

They will need help selecting their preferred Office 365 plan and the cloud subscriptions that support it, configuring those options, planning and designing their new cloud-based environments, and developing an initial project plan. All of these are fee-based, revenue-generating activities.

Executing the project plan will require various services, including ordering subscriptions, provisioning and configuring the services, upgrading client devices, migrating data and applications, integrating cloud providers’ services, and more.

Then address users, ensuring they are trained in using Office 365 and related applications effectively. Ensure they are comfortable with self-service portals and support options.

Fee-Paid Planning Services

It shouldn’t be so common to add value at no charge, yet resellers, cloud sellers, systems integrators and others still give away value-added services. These include initial system design, upfront consulting, planning, and order management.

My company’s most successful partners charge for these services. Their first offering to a new client provides the planning and design required before Office 365 or any other cloud service can be ordered.

Other fee-paying examples include initial consulting, application inventory and evaluation, solution architecture and cloud service selection, information architecture and capacity planning, security with cloud integration design, and application and environment transition planning.

Ultimately, customers want to enter their first day with their new services ready to produce.

Today’s cloud integrators combine hardware, software and services from various cloud providers. They are responsible for ensuring that services from multiple cloud providers interact well.

The integrator must provide customers with complete, superior solutions. Data must be backed up. The network and data must be secure and protected. Access must be secure and reliable. User collaboration must be facilitated, and applications must achieve desired functions and results.

An MSP’s value depends on awareness of shifts in the cloud services market, its impact on customers, and recommendations for their business.

Growing Revenue on Migration and Deployment

Most channel partners have had customers seek help after trying to deploy Office 365 themselves. Some find many cloud services challenging to implement. They need expert help since many find provisioning and deployment challenging to configure IP addresses, DNS servers and other internet services.

Data migration is even more challenging. A project might be a simple cutover with a migration app or require tons of conversion, re-mapping and account manipulations. Again, a customer should be completely ready to use the new services on day one.

MSPs can’t remain reactive. This requires confirming the functionality of every user device, plus the preparedness of every user. Training on the applications, the platform, best security practices, and self-service portals should be completed before rollout.

Services that should be incorporated into a complete program during the transition include user transition training, cloud service provisioning, email system migration, email archiving, data migration, and user deployment and rollout.

Initiating MRR

MRR is generated from Office 365 licences, data backup services, online security services, and all other cloud services that pay commissions.

Some of these services are familiar, such as help desk and field support. Most MSPs already offer network monitoring, including alerting and actioning of anomalies, monthly performance reporting, regular reviews, improvement recommendations, and more.

Every cloud-delivered service requires monitoring. We can almost guarantee that an SLA performance report from the provider will always match their invoice. Customers need an objective third party to keep those providers honest.

In the cloud, add capacity management. A significant value of cloud computing is that users pay only for what they use. But someone must keep an eye on the storage, memory, and processor services that users request to determine when they’ve finished using them and left them idle instead of releasing them.

Customers save unbelievable amounts of money when MSPs keep them from paying for services they never use. When MRR is generated from support services, an MSP keeps 100% of the profit but needs to calculate the fully loaded burden to compute a total cost. Even so, income will far exceed the subscription commissions. This is the MRR on which most want to focus: customer fees for ongoing support services.

After the launch of the subscription, these services include day zero transition support, user support program, network and cloud service QoS monitoring and management program, and capacity management.

Improve the Process

There is a danger in remaining completely reactive in executing a support agreement. The system alerts you, you determine a course of action, and then resolve the problem. But what if there are no problems?

There is danger in remaining reactive in the execution. The problem with having no service events is that the customer never sees the MSP in action. The issue emerges at renewal time when a customer asks why they should bother renewing.

So MSPs must be proactive and predictive, anticipating problems and working on them before they occur. When reporting on activities to a customer, the MSP becomes highly visible.

Go further. Offer new ideas, as requirements, projects, initiatives, users and applications require the system to adapt. Talk with users to understand their experiences with the systems in place and surface fresh ideas to better serve each customer.

The ability to renew support agreements and drive continuing MRR depends on remaining highly visible. Do more frequent reports, hold review meetings, or convert these from phone to video.

Construct a plan for managing each account more productively. Maintain a ‘keep-in-touch’ culture and discipline by requiring every account team to report regularly on their latest contacts.

Keep improving their environment, and the MSP will enjoy more MRR for many years to come.

Related stories
Top stories
Story image
Artificial Intelligence
Is your chatbot bringing down the customer satisfaction score?
The top 10 reasons why chatbots are failing to meet customer expectations and what you must do to avoid that.
Story image
Tech job moves
Tech job moves - Fastly, INX, Kinly, SmartBear & Vectra AI
We round up all job appointments from July 29 - August 12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
InternetNZ
How well do rangatahi understand cyber safety in Aotearoa?
Do rangatahi in Aotearoa understand the importance of being safe online, or has lifelong exposure to the internet resulted in widespread complacency?
Story image
Data Protection
Advancing genomic sequencing and public health with digital infrastructures
Right before our eyes, we've witnessed the development of the COVID-19 vaccine in record time. An enormous achievement in an otherwise lengthy task that previously took, on average, 10-15 years.
Story image
Data analytics
Pressure on orgs to up their data analytics game - study
A recent report from Sisense highlights data transmission, analysis, and risk management remain top concerns for data professionals in APAC.
Story image
Artificial Intelligence
Gartner unveils key emerging tech to watch in 2022
"Such technologies present greater risks for deployment, but potentially greater benefits for early adopters," says Gartner.
Story image
Firewall
Why printing security plays a vital part in keeping Aotearoa safe
While internet printing, mobile printing and other similar technologies have no doubt made things easier to manage, it has also brought a whole new set of problems to the table.
Story image
Servers
New Zealand cloud provider challenges Google's claims on data control for region
A Wellington cloud services provider says Google's claim it will offer New Zealanders complete control over their own data is not true.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Surveillance
Ministry will no longer accept equipment from Chinese firm Hikvision
The Ministry of Business, Innovation and Employment (MBIE) says it will no longer accept equipment from a major Chinese surveillance camera maker.
Story image
Developers
Snyk announces plans to expand partner network in APJ
Recognising that partnerships are critical for growth, Snyk is building an entire partner ecosystem that will drive its expansion across APJ.
Story image
Dicker Data
Dicker Data brought on as Acronis partner for A/NZ
The news about the partnership comes in as cyber criminals continue to exploit gaps in traditional solutions and strategies in NZ and across the APAC region.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
IDC
High level of Customer Identity & Access Management adoption
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.
Story image
Ingram Micro
Ingram Micro NZ sees $74 million revenue growth in 2021
Ingram Micro New Zealand's latest financial report reveals that its revenue from contracts with customers increased by almost $74 million in 2021.
Story image
Enterprise Resource Planning / ERP
Why the right ERP (and partner) is crucial to an innovative and successful business
Enterprise Resource Planning (ERP) is a foundational step to ensuring a robust business model; here's why choosing the right one could be vital to ensuring long-term success and innovative results.
Story image
Cybersecurity
Education sector seeing highest volumes of cyber attacks
When breaking down the numbers to education attacks by region in July 2022, A/NZ was the most heavily attacked.
Story image
Malware
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Story image
Cybersecurity
Datacom research explores reality of zero trust in A/NZ
Zero trust is fast emerging as global best practice in cybersecurity and local leaders are on board, with 83% considering it essential to security.
Story image
Sustainability
NZ program recovers and recycles more than 177 tonnes of e-waste
The TechCollect NZ pilot program says its milestone of recovering and recycling more than 177 tonnes of ICT e-waste recognises the efforts of many.
Story image
Infrastructure
IBM expands Power10 server line for business modernisation
IBM has recently announced a significant expansion of its Power10 server line with the introduction of mid-range and scale-out systems.
Story image
VMware
Latest VMware threat report reveals truth about deepfakes
"Cyber criminals have evolved. Their new goal is to use deepfake technology to compromise organisations and gain access to their environment."
Story image
Cybersecurity
Palo Alto Networks responds to rise in threats with MDR service
Unit 42 Managed Detection and Response is a new service that can offer continuous 24/7 threat detection, investigation and response.
Story image
Charity
SnapLogic teams up with meetmagic for charity and children
SnapLogic has announced its partnership with meetmagic, an online Australian platform that combines business and philanthropy.
Story image
SaaS
Cloud and data protection big challenges for NZ businesses
"This surge towards a cloud-first approach meant security and safety became afterthoughts - there's no point being the fastest car on the racetrack if you crash.”
Story image
Distribution
Garmin expands NZ footprint with new Auckland distribution centre
The facility at Goodman’s Highbrook Business Park will be fully operational from October 2022 and features 3,586sqm of warehouse space.
Story image
Google Cloud
Google Cloud to open first cloud region in NZ - among others
Google Cloud has announced plans to bring three new cloud regions, one each in New Zealand, Malaysia and Thailand.
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
Application Performance Monitoring / APM
New Relic integrates offering with Atlassian’s Jira Software
New Relic has integrated errors inbox with Jira Software to allow developers to easily access and set up complete stack error tracking and software performance monitoring from within the tool.
Story image
Cyber attacks
Dramatic uptick in threat activity with exploits growing nearly 150%
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
Story image
Data Protection
VMware introduces advanced workload protection for AWS
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protection
DEFEND supports customers in 66 countries across the globe with a relentless focus on ensuring that every dollar spent on security provides a meaningful return on investment and reduces cyber risk.
Story image
SaaS
Exclusive: The Access Group shares the benefits of embracing SaaS
In today's rapidly changing working environments, efficiency and productivity are surefire ways to create business growth and success.
Story image
Dark web
Beware the darkverse and its cyber-physical threats
A darkverse of criminality hidden from law enforcement could quickly evolve to fuel a new industry of metaverse-related cybercrime.
Story image
Privileged Access Management / PAM
The importance of stopping identity sprawl for cybersecurity
The 2021 Data Breach Investigations Report (DBIR) shows that 61% of all breaches involve malicious actors gaining unauthorised, privileged access to data by using a compromised credential. Unfortunately, it is often too late when the misuse of a credential is detected.
Story image
Data analytics
Data analytics a struggle for A/NZ healthcare organisations
A study by InterSystems has found that most Australian and New Zealand healthcare organisations struggle to use data analytics to support their business objectives.
Story image
Red Hat
Red Hat announces 2022 awards winners for A/NZ region
Red Hat recently acknowledged Australia and New Zealand partners with its annual awards, highlighting partners across various categories.
Story image
Augmented Reality
TeamViewer remote access software integrated into RealWear Cloud
TeamViewer has announced a major expansion of its partnership with RealWear, a leading provider of assisted reality wearable solutions for frontline industrial workers. 
Story image
ExtraHop
Organisations exposing highly sensitive protocols to public internet
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.
Story image
Gartner Magic Quadrant
Gartner names Lookout a Visionary in 2022 Magic Quadrant
Gartner has recognised Lookout as a Visionary in the 2022 Magic Quadrant for Security Service Edge (SSE) and one of the top three offerings in the 2022 Gartner Critical Capabilities for SSE report.