Roadmap - Product Roadmap - xSP- 2010-11 by dfsiopmhy6

VIEWS: 12 PAGES: 17

									2010 – 2011 Roadmap
           for IT Service Providers
                June 2010 - July 2011




                       www.kaseya.com
	
  
Kaseya Product Roadmap for Service Providers............................................ 3	
  
Product Foundation Framework ............................................................................ 3	
  
Delivery Methods .......................................................................................................... 3	
  
Overview ........................................................................................................................... 3	
  
System Setup and Management ............................................................................ 4	
  
Directory Services ...............................................................................................................................................................4	
  
Import / Export Center ...................................................................................................................................................4	
  
IT	
  Asset	
  Management ............................................................................................................. 5	
  
Network Discovery..............................................................................................................................................................5	
  
Software Asset Management......................................................................................................................................6	
  
Hardware Asset Management ....................................................................................................................................7	
  
Platform and Operating System Support........................................................... 7	
  
Mac Agent ..................................................................................................................................................................................7	
  
Linux Agent...............................................................................................................................................................................8	
  
Mobile Device Management.........................................................................................................................................8	
  
Agent / Server Procedures ...........................................................................................................................................8	
  
Reporting .......................................................................................................................... 9	
  
User Interface .........................................................................................................................................................................9	
  
Scheduling .................................................................................................................................................................................9	
  
Composite Reports..............................................................................................................................................................9	
  
  User-Defined Reports.......................................................................................................................................................9	
  
Dashboards ...............................................................................................................................................................................9	
  
Security ........................................................................................................................... 10	
  
Anti-Virus powered by Kaspersky Labs...........................................................................................................10	
  
  Integration Protection ..................................................................................................................................................10	
  
  Optimized Performance...............................................................................................................................................10	
  
  Centralized Administration.......................................................................................................................................11	
  
Anti-Malware powered by Malwarebytes .......................................................................................................11	
  
Patch Management ..........................................................................................................................................................12	
  
Backup and Recovery................................................................................................ 12	
  
Online Backup with Continuous Data Protection .....................................................................................12	
  
Imaging and Deployment...........................................................................................................................................13	
  
Server Backup and Restore ......................................................................................................................................14	
  
Service Delivery, Tracking and Billing .............................................................. 14	
  
Service Delivery Templates ......................................................................................................................................14	
  
Business Center..................................................................................................................................................................15	
  
Monitoring ...................................................................................................................... 15	
  
Enterprise Monitoring ....................................................................................................................................................15	
  
Extensibility................................................................................................................... 16	
  
Third Party Integration Program ..........................................................................................................................16	
  




	
                                                                                                                                                                                           2	
  
	
  


Kaseya Product Roadmap for Service Providers
June 2010 - June 2011


Product Foundation Framework
Kaseya 2


Delivery Methods
       •     On-premises
       •     Cloud – On demand software as a service
       •     Hybrid


Overview
The Kaseya 2 framework provides a foundation for the next generation of
modules and features within a growing line of products. Enhancements and
new features will encompass the entire product family from the way IT
assets are discovered, inventoried, managed, secured and monitored to
overall visibility of services defined and delivered, the depth and breadth of
functionality is the focus.

The following functional categories of the system will either be added or
significantly enhanced:

       •   System Setup and Management
       •   IT Asset Management
       •   Backup and Recovery
       •   Monitoring
       •   Security
       •   Reporting
       •   Service Delivery, Tracking and Billing
       •   Platform and Operating System Support
       •   Extensibility




	
                                                                               3	
  
	
  

System Setup and Management
Directory Services
The Directory Services module will automate the process of syncing the
Kaseya directory (Orgs, Machine Groups, Users, etc.) with Active Directory
(OUs, Users, Computers, etc.). The AD hierarchy will be mapped to Kaseya,
via a one-way sync where Active directory is considered the master system
of record (i.e. directory changes must be made in AD, and will then flow to
Kaseya). The synchronization process will run on a scheduled basis, and will
NOT require a Kaseya Agent on the AD domain controller.

Features include:

        •      Automatic Discovery of Active Directory domains that can be synced
               with Kaseya
        •      Automatic creation Kaseya Security hierarchy modeled after an
               existing Active Directory hierarchy
        •      Synchronization of Kaseya with all Active Directory changes
        •      Users and Contacts in AD automatically become Users and Staff
               Members in Kaseya
        •      AD User and Contact information can be leveraged during end-user
               ticket entry in Service Desk and Ticketing
        •      Auto-Deployment of Agents to AD computers and automatically place
               Agent in the appropriate Machine Group relative to the AD hierarchy
        •      Nothing installed or required on the Domain Controller

Import / Export Center
Within the Kaseya system there are several items that are setup by the
administrators. These include:

        •      Monitor Sets
        •      SNMP Sets
        •      Agent Procedures
        •      Reports
        •      Filters
        •      Event Sets
        •      Report Definitions

These items make up a significant part of the system content. This content
is what makes the Kaseya tool a complete solution. To facilitate the
exchange of this content both from Kaseya and the global community of
users, a central Import / Export Center will be added to the system.
Features of the Import / Export Center include:

        •      Bulk or Single Import / Export
        •      Import / Export Log
        	
  

	
  
4	
  
	
  
	
  

IT	
  Asset	
  Management	
  
IT asset management (ITAM) is a key foundation of the systems
management lifecycle. It is defined as a set of business practices that join
financial, contractual and inventory functions to support strategic decision
making for the IT environment.

Kaseya 2 is in an ideal position to exploit the convergence of these two
disciplines with new Discovery, Inventory, Hardware and Software Asset
Management Modules.

Network Discovery
Network Discovery is an application within the system that everyone will
need. If you cannot find everything connected to the network, you cannot
manage it. The role of Network Discovery is to find all IP devices connected
and interconnected to a network or networks. Once these devices are
discovered, they need to be cataloged or inventoried within the system. The
discovery process will run periodically to discover new items or items that
are no longer visible within the network. A Network Diagram or Map will be
available based on what devices have been discovered.

Other applications within the system such as Asset Management, Monitoring,
Software License Tracking, Directory Services, Intel vPro Management, etc.
will be used to enrich the information and provide the visibility and
management functions for the devices.

IT Inventory	
  
Within the Kaseya system, there will be a central repository for all managed
and un-managed IT assets. Managed assets are those that either have an
agent installed or are being managed from within the Kaseya console. Un-
managed assets are those that are within the IT inventory but no agent is
installed and no activities occur within the Kaseya console.

Just like an ERP system, the IT Inventory is used for many purposes and
contains the basic details about the IT asset. IT inventory also gets
populated and enriched in many ways. The population of the inventory
items can either be automated through Network Discovery and other
applications within the system such as Monitoring, manual entry, or a
combination of the two methods.

Within the Kaseya 2 system, there is one IT Inventory repository providing
centralized access and reporting. Applications and functions such as
Hardware and Software Asset Management, Monitoring, Audit, Patch
Management will either utilize the IT Inventory information or enrich the
information with additional details such as warranty and license information.




	
  
5	
  
	
  
	
  


Software Asset Management
Software Asset Management (SAM) is a business practice that involves
managing and optimizing the purchase, deployment, maintenance,
utilization, and disposal of software applications within an organization.
According to the Information Technology Infrastructure Library (ITIL), SAM
is defined as the infrastructure and processes necessary for the effective
management, control and protection of the software assets throughout all
stages of their lifecycle.

Fundamentally intended to be part of an organization’s information
technology business strategy, the goals of SAM are to reduce information
technology (IT) costs and limit business and legal risk related to the
ownership and use of software, while maximizing IT responsiveness and
end-user productivity. SAM is one facet of a broader business discipline
known as IT asset management, which includes overseeing both software
and hardware that comprise an organization’s computers and network.

        •   Software inventory tools intelligently “discover” software installed
            across the computer network and collect software file information such
            as title, product ID, size, date, path, and version. Some inventory
            tools compare software inventory data with purchasing information to
            reveal license deficits and ensure that organizations remain compliant
            with their licensing agreements.
        •   Software metering tools monitor the utilization of software applications
            across a network. They can also provide real-time enforcement of
            compliance for applications that are licensed based on usage.
        •   Application control tools restrict what, and by whom, particular
            software can be run on a computer as a means of avoiding security
            and other risks.
        •   Software deployment tools automate and regulate the deployment of
            new software.

The Kaseya 2 platform will incorporate these fundamental requirements with
a comprehensive and tightly integrated Software Asset Management module
based on ITIL standards. The following is a list of core features:

        •   Asset Discovery
        •   Asset Identification and Assignment
        •   Service Contract Tracking
        •   TCO Tracking
        •   Service Desk Ticket Assignment
        •   Reporting, Inquiry and Dashboards
        •   License Management and Metering

	
  
6	
  
	
  
	
  
Hardware Asset Management
Hardware asset management entails the management of the physical
components of computers and computer networks, from acquisition through
disposal. Capturing financial information about the hardware life cycle aids
organizations in making business decisions based on meaningful and
measurable financial objectives and ultimately achieving an optimum ROI.

The new module will incorporate the core requirements and lifecycle
workflows of hardware asset management within the Kaseya 2 automated
systems Management platform based on ITIL v3 standards. The new
Hardware Asset Management module will also lay the foundation for future
releases as we extend the module with robust budgeting and procurement
capabilities.

The initial release of Hardware Asset Management will focus on asset
identification, cost tracking and contract management from purchase
through disposal. The following is a list of planed features:

        •   Asset Navigation
        •   Asset Discovery and Import
        •   Asset Identification and Assignment
        •   Service Contract Tracking
        •   Warranty Tracking
        •   Lease Tracking
        •   TCO Tracking
        •   Service Desk Ticket Assignment and History
        •   Reporting, Inquiry and Dashboards
        •   Asset Lifecycle Management


Platform and Operating System Support
Mac Agent
The Mac agent will continue to receive updates throughout the year to
provide rich system management capabilities. The following functions will
be added or enhanced:

        •   Deployment - Easier installation and deployment of the Mac agent;
            including installation from LAN Watch and Network Discovery.
        •   Inventory - Collection of installed software and system information.
        •   Live Connect - Support for Live Connect functionality accessing a Mac
            from a Mac or a Windows PC. This also includes browser support for
            Safari, Firefox or Chrome running on a Mac.
        •   Monitoring - Support for Log and Performance monitoring.
        •   Patch Management - Control of the Software Update function.




	
  
7	
  
	
  
	
  
Linux Agent
With both Windows and Mac agents already supported, it is only natural for
Kaseya to release a Linux agent. Linux is gaining popularity as an alternative
desktop operating system and it has been a very strong server platform.
Linux is chosen as the OS platform for a number of solutions ranging from
Virtualization Hypervisors to Network Routing/Firewall/VPN appliances to
Mail servers. Running an agent directly on such a platform should provide for
unparalleled management and monitoring capability. The following features
will be available with the Linux agent:

        •   Deployment - Easy installation and deployment of the Linux agent;
            including installation from LAN Watch and Network Discovery.
        •   Inventory - Full hardware and software inventory.
        •   Remote Access - Support for Remote Control and SSH access
        •   Agent Procedures - Full support for agent procedures
        •   Patch Management - Control of the Software Update function.

Mobile Device Management
With the mobile handheld market expanding there is a need for consistent
remote management of these devices. Kaseya will add support for the
following devices along with remote management capabilities from within
the Kaseya framework and interface. The following devices will be
supported:

        •   iPhone
        •   Android OS phones
        •   RIM Blackberry Phones
        •   Windows Mobile

The following features will be supported:

        •   Inventory
        •   Configuration Settings
        •   Backup
        •   Wipe
        •   Location Tracking

Agent / Server Procedures
Agent and Server side procedures are one of the main components for
automation and extensibility for service delivery. As we move forward, we
will continue to add to the functions that can be performed as well the
usability. The following enhancements are planned:

        •   Additional Embedded Functions
        •   User Defined Functions
        •   Procedure Editor Updates




	
  
8	
  
	
  
	
  
Reporting
Reports are a vital component of the system. They help to analyze trends,
evaluate statistics and provide a source for process refinement within your
service delivery strategy. They are also vital in the communication of
strategy with customers.

Over the next twelve months, the reports, underlying technology and
capabilities of the Kaseya Info Center will receive a complete overhaul.
From the user interface and report definition to scheduling and delivery, all
aspects will be greatly enhanced and expanded.

The following is a summary of the changes planned for the Info Center:

User Interface
        •   Streamlined and simplified
        •   Increased visibility for definition, schedules and viewing
        •   Report preview capability

Scheduling
        •   Additional options
        •   Reschedule
        •   History view
        •   Calendar view

Composite Reports
        •   Mix of various types of data and presentation
        •   Filters and parameters
        •   New Executive Summary

User-Defined Reports
  • Tabular, Matrix or Summary
  • Pre-defined data sources
  • Filter criteria, sorting and grouping

Dashboards
Dashboards provide a quick visual insight to what is happening within
functional areas of the system and service delivery. They help to quickly
spot exceptions and drill down into the details to identify the source and
assist with an action plan. Dashboards are key to not only efficient system
management but also provide the needed views into customers and
technical resources within the service provider organization.

The following dashboards will be added throughout the system:

        •   Inventory
        •   Patch Management
        •   Service Desk
        •   Agent Procedures
        •   System Scorecard


	
  
9	
  
	
  
	
  
Security
Anti-Virus powered by Kaspersky Labs
Kaseya Anti-Virus for Windows Workstations provides complete and
centralized protection on networks and beyond from all types of malware,
potentially dangerous programs, network attacks and unwanted mail.

Advantages:

         •   Integrated protection
         •   Centralized administration
         •   Proactive technologies - heuristic analyzer
         •   Upgradeable anti-virus engine
         •   Secure electronic communication
         •   Safety online
         •   Protection from Hacker Attacks
         •   Control over removable devices
         •   Protection from phishing

Integration Protection
Kaseya Anti-Virus uses the newest technologies to protect workstations on
corporate networks.

         •   Security for file systems
         •   All files are scanned (for malicious content) when created, launched or
             modified
         •   Any individual files, directories and disks (local and network) can also
             be scanned

Optimized Performance
  • Kaseya Anti-Virus utilizes a powerful anti-virus engine and a range of
     optimization technologies, ensuring the most efficient use of
     workstation resources and minimal impact on performance
  • Increased system scanning speed
  • Optimized use of system resources with minimal impact on other
     programs
  • iSwift and iChecker
  • The first time on-demand scanning is launched all objects are
     automatically scanned
  • For subsequent scans iSwift and iChecker technologies limit scanning
     to new and modified files only
  • Additionally, when a user requests a file from the server, it is scanned
     only once
  • Efficient Resource management
  • During periods of increased user activity, Kaseya Anti-Virus reduces its
     demand on system resources. Scanning continues in background
     mode, which does not impede the user's work with other applications



	
  
10	
  
	
  
	
  
         •   Compact updates. Smaller updates than ever before are achieved
             thanks to the powerful antivirus engine and dedicated technologies for
             incremental updating

Centralized Administration
  • Enabling installation, configuration and updating of all Lab solutions on
     the network
  • Configuration options
  • Use the security policies and tasks to configure protection parameters
     for groups of workstations or for individual workstation, launch
     antivirus scans, receive reports on events on the network, install
     license keys and update signature databases and program modules
  • Quarantine for infected and suspicious objects
  • Secure storage locations for infected and suspicious objects are
     contained in a centrally managed database. Objects and/or their
     copies stored in these local folders are not accessible to users, but the
     administrator can retrieve information from them
  • Notifications and reporting. A wide variety of reports are available,
     providing information on the program's status and performance. The
     system administrator receives notifications of certain types of events
     (such as the detection of a virus)
  • Automatic updating. Updates to antivirus databases and application
     modules are available on demand or automatically according to a
     schedule. Updates can either be downloaded directly from Lab servers
     on the Internet or from local servers on the network

Anti-Malware powered by Malwarebytes
Customer’s networks face a variety of threats day in and day out. Some of
those threats require a specialized tool to identify, analyze, and remediate.
Kaseya Anti-Malware is an easy-to-use, simple, and effective anti-malware
application with complete integration into the Kaseya framework. Kaseya
Anti-Malware utilizes a number of new technologies that are designed to
quickly detect, destroy, and prevent malware while leveraging the
automation capabilities of the Kaseya IT systems management framework.

Kaseya Anti-Malware monitors every process and stops malicious processes
before they even start. The real-time protection module uses an advanced
heuristic scanning technology that monitors your system to keep it safe and
secure. In addition, we have implemented a threats center that will allow
you to keep up to date with the latest malware threats.

Features include:
   • Centralized deployment, update and configuration
   • Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
   • Ability to perform full scans for all drives
   • Daily threat database updates
   • Quarantine to hold threats and restore them at your convenience
   • Ignore list for both the scanner and Protection Module

	
  
11	
  
	
  
	
  
Patch Management
Throughout the year Kaseya will continue to make enhancements and
updates to the Patch Management application. In addition to the normal
maintenance, the following functionality will become available:

         •   Third Party Application Patching
                o Adobe, Install Shield, Java
         •   Dashboard
                o Visual patch status
                o Scanned
                o Missing Patches
                o Fully Patched
                o Policy Compliance
                o Failures
         •   Support for Mac and Linux update control.


Backup and Recovery
Online Backup with Continuous Data Protection
Kaseya Online Backup is a multi-platform (Windows and OS X) online folder
and file backup service that will provide the service provider with the
opportunity to deliver backup services to their customers. Online Backup
provides the service provider with a recurring revenue market opportunity
for all storage saved to Kaseya's Cloud.

Managing and protecting customer data is an integral part of managed
services. Online backup (backup to the cloud) is a desirable service option,
which the current Kaseya backup offerings do not provide. This solution is
different from Kaseya Backup. Kaseya has developed this technology as an
in-house engineering effort therefore you can expect timely updates to the
software and for us to provide continued advanced technology and support.

         •   Deploy backup agent, select files for backup, via schedule
         •   Backup file sets allow reusable, policy based backup
         •   Efficient incremental backups reduce network traffic
         •   Integrated status, dashboard and reporting for low touch automation
             of backup operations
         •   Easy storage management for cleanup and maintenance
         •   Direct billing and account tracking through online accounting




	
  
12	
  
	
  
	
  


Imaging and Deployment
Kaseya will be offering a complete PC system deployment solution, using
disk-imaging technology. Many organizations (businesses, schools,
federal/state/local governments, etc.) face increasing challenges when
configuring and deploying new PCs and workstations in a distributed
environment. Having a deployment solution that enables them to use a
standard configuration for a new machine will significantly decrease support
expenses.

Kaseya Imaging and Deployment for PCs is a comprehensive deployment
solution that enables IT organizations to deploy or restore notebooks and
desktops quickly and easily.

With the use of disk imaging technology, Kaseya Imaging and Deployment
creates an exact disk image of the standard configuration, including the
operating system, configuration files and all applications. It then deploys
that image to multiple systems simultaneously, making it ideal for rapid
bare-metal installations. Features of Kaseya Imaging and Deployment
include:

         •      Deploy to different hardware
         •      Fully automated deployment
         •      Advanced media builder — Facilitate deployment by providing more
                options for creating bootable media. Create ISOs, Microsoft Remote
                Installation Service (RIS) packages, and place multiple configurations
                on one CD
         •      64-bit Windows support
         •      Standalone image deployment with customizable deployment options
         •      Enhanced Multi-cast server to easily create a distribution server by
                specifying default configurations and timeout parameters for reboot
         	
  




	
  
13	
  
	
  
	
  
Server Backup and Restore
Kaseya will provide integration and automation with App Assure’s Replay 4,
the world's fastest server-based backup and disaster recovery software, This
provides local and off-site backup and disaster recovery with built-in de-
duplication all in one solution.

Running Replay on Windows servers provides fast recovery of any object,
from a total bare metal restore of the entire server to an individual file
recovery in just minutes. Built-in de-duplication allows Replay backup
snapshots to be stored using 80% less backup storage space compared to
traditional backup solutions. With a centralized management console to
manage all protected servers from a single location, Replay backup and
disaster recovery software supports Windows Small Business Servers,
Domain Controllers, File servers, Web servers, and BlackBerry Enterprise
servers, as well as Windows application servers such as Exchange, SQL,
Sharepoint and Hyper-V.

Ideal for guest virtual machines and virtual hosts delivering accelerated
application backup and recovery, Replay significantly reduces the load on
production VMware ESX, VMware Server and Microsoft Hyper-V hosts.

Integration includes:

         •   Deployment
         •   Configuration
         •   Backup
         •   Monitoring


Service Delivery, Tracking and Billing
Service Delivery Templates
Service Delivery Templates allow for the definition of consistent sets of
services based upon the business model and service offerings of the
organization. All of the periodic task can be setup and managed in one
location quickly and efficiently. Utilizing Service Delivery Templates will
allow for fast and easy deployment of the service offering with consistent
and visual management of all managed servers, workstations and
notebooks.

Service Delivery Templates include:

         •   Create, edit and delete
         •   Apply templates and updates automatically
         •   Template Settings
             • Agent configuration
             • Remote Access configuration
             • Audit, Patch Management, Agent Procedures and Schedules
             • Monitor Set and Alerts
             • Visualization of which templates are assigned
	
  
14	
  
	
  
	
  
Business Center
Kaseya’s Business Center is where the technical work becomes revenue. It
is where you measure and grow your business. Business Center ties
together the people and accounting sides of the business with the proven
Kaseya IT Systems Management framework, creating a truly unified platform
for your IT business.

With Business Center, you now have the ability to manage not just systems,
but the entire business through a simple integrated web-based service
delivery automation module that includes:

         •   Accounting & Invoice Management
         •   Parts & Non-recurring Charges Management
         •   Customer Management CRM
         •   Sales Management
         •   Quotes
         •   Vendor Management
         •   Agent Management
         •   Administration / Management Features
         •   Contractor Management
         •   Employee Productivity
         •   Basic Project Management


Monitoring
Enterprise Monitoring
Kaseya Enterprise Monitoring (KEM) will monitor numerous parameters of a
network and the health and integrity of servers. KEM uses a flexible
notification mechanism that allows users to configure e-mail based alerts for
virtually any event. This allows a fast reaction to server problems. In
addition, there are excellent reporting and data visualization features based
on the stored data, which makes KEM ideal for capacity planning.

Enterprise Monitoring supports both polling and trapping. All reports and
statistics, as well as configuration parameters, are accessed through a web-
based front end. A web-based front end ensures that the status of network
and the health of servers can be assessed from any location. KEM will
include pre-defined configurations for the most popular IT infrastructure
components for easy deployment. This is equally true for small organizations
with a few servers and for large companies with a multitude of servers.




	
  
15	
  
	
  
	
  
KEM offers:

         •   Auto-discovery of servers and network devices
         •   Distributed monitoring with centralized WEB administration
         •   Support for both polling and trapping mechanisms
         •   Support for Syslog Monitoring
         •   High performance monitoring agents for Linux, Solaris, HP-UX, AIX,
             Free BSD, Open BSD, OS X, Tru64/OSF1, Windows NT4.0, Windows
             2000, Windows 2003, Windows XP, Windows Vista, Windows 7
         •   Agent-less monitoring
         •   Secure user authentication
         •   Flexible user permissions
         •   Flexible alerting of predefined events
         •   Business view of monitored resources
         •   Logs and Reports


Extensibility
Third Party Integration Program
The goal of the Third Party Integrator Program is to provide access for
Program Members to integrate their solutions to Kaseya, with the intent to
bring a synergistic solution to market. We want an open environment where
Members come to the table with solutions aimed at expanding the Kaseya
Platform, in a sense, a larger Kaseya Ecosystem.

This worldwide program welcomes organizations to integrate their solutions
with Kaseya. As part of this Free-of-Charge Program, they receive all of the
tools and resources necessary to ensure a smooth integration. Members may
receive access to our Third Party Integrator Kit, which includes Not-For-
Resale Licenses, Add-On Samples and all tools and documentation required.
Members also receive access to online training and e-customer support. We
have also created a special community for Program Members where they can
share ideas and experiences.

Integration capabilities include:

         •   Create a Module within the Primary Function List
         •   Run Own Code using IIS (API/ASPX/Javascript/etc)
         •   Interact and Leverage the Kaseya SQL Database and API
         •   Interact with Kaseya agents and scheduling system
         •   Follow Existing Kaseya Security Model and Access Rights




	
  
16	
  
	
  
	
  
Membership Benefits:

Key Program Benefits Members may receive:

         •   The opportunity to bring successful solutions to Kaseya to extend
             features and functionality
         •   Participation in early access programs
         •   Access to the Kaseya Third Party Member Community, Knowledge
             Base and Member Forums
         •   Training and Support
         •   Kaseya Member Page Placement
         •   Marketing Opportunities
         •   Regular Strategic Member Meetings




The sole purpose of this document is to provide general information about Kaseya’s current
intentions with respect to its product and services direction. Kaseya reserves the right to
make changes or take contrary actions in its sole discretion. Furthermore, the features and
functionality mentioned herein may not be developed, may be withdrawn, or may be
materially and substantially modified with or without notice. Based on the above and
because this document is provided for informational purposes only without any
representations or warranties, any reliance on any of the information contained herein is
taken at the reader’s sole risk and Kaseya cannot be held liable for the consequences of
such reliance or any damages.



	
  
17	
  
	
  

								
To top