Operations | Monitoring | ITSM | DevOps | Cloud

September 2023

NinjaOne's 5.4 Summer 2023 Update: Elevating Automation and Enhancing Visibility

Our Summer 2023 Release delivers over 30 major updates across the platform, including significant improvements to our core remote monitoring and endpoint management solution. Overall, this release is a major step forward for our remote monitoring and endpoint management solution. It includes a wide range of new features and enhancements that will help our customers improve the security, performance, and manageability of their endpoints. Here is a quick overview video.

The Keys to Adopting an Automation Mindset

In today's fast-paced digital world, automation stands as a beacon of efficiency and innovation. The adoption of an automation mindset is not merely a trend, but a paradigm shift in how we approach IT processes. This post provides insights into the critical role of IT automation, highlights potential challenges, offers preparation tips before embarking on the automation journey, presents a systematic plan and wraps up with key takeaways.

How to Configure a Linux Firewall: The Ultimate Guide

A firewall stands as a digital gatekeeper, meticulously sifting through network traffic and deciding what may pass. This protective shield, fundamental to cybersecurity, is integral in the Linux world. The Linux kernel itself is effectively a de facto packet switching firewall, crafted as it is around the principles of packet filtering at the most fundamental operating system level, thus exemplifying the pivotal role of firewalls in system security.

On-Premise vs Cloud Software: What's the Difference?

Since the early 2010s, software delivery methods have largely evolved. While on-premises tooling defined the first wave of customizable software, the market saturation of cloud-based counterparts offers new forms of software solutions. Navigating the complexities of on-prem, cloud, and hybrid setups demands a deep understanding of each offering’s efficiencies and requirements. Learn more about on-premise vs cloud software in our comparison below.

4 Ways Technology Supports a Remote Workforce

Employees have already staked a claim on the future of remote work. With 98% of millennial employees wanting to work from home at least some of the time, reported benefits range from lower stress to enhanced productivity and motivation. As a team leader, however, the complexities of managing a remote workforce can seem daunting. This is where technology can help your hybrid and remote teams unleash new forms of collaboration unrestrained by office walls.

IT Automation is a Force Multiplier for Businesses

IT automation is quickly becoming one of the most critical aspects of a modern IT operations environment as it reduces the cost of performing routine IT tasks while also increasing the productivity of individual team members. IT automation can be defined as the process of utilizing software and other systems to automate manual processes and easily repeatable tasks related to managing and supporting remote endpoints.

Building a Culture of Automation: Unleashing Efficiency and Innovation

In today's fast-paced digital landscape, businesses constantly seek ways to improve efficiency, reduce costs and stay competitive. Resourceful organizations find that automating repetitive tasks, streamlining processes and resolving issues without human intervention can revolutionize how organizations operate. This blog will delve into the benefits of automation and provide insights on fostering a culture of automation within your company, supported by relevant sources and examples.

Must-Know Ransomware Statistics, Trends, and Facts

Although IT teams and MSPs continue to ramp up their security efforts, ransomware attacks show no signs of slowing down. Statistica’s ransomware report shows that in 2022, there were approximately 493.3 million ransomware attacks, and while this is a decrease from the 625.3 million attacks that occurred in 2021, it’s still higher than all the other years in the last decade.

Unbeatable Excellence - NinjaOne RMM Tops G2's Fall 2023 Report

G2, a highly regarded authority in the field of software reviews and research, has recently unveiled its much-anticipated Fall 2023 Research Report. In a resounding display of dominance, NinjaOne has once again emerged as the unrivaled leader in the realm of Remote Monitoring and Management (RMM) software, maintaining this prestigious position for an impressive 18 consecutive quarters.

Linux Log Management: Advanced Techniques and Best Practices

Linux log management is critical to maintaining system health, troubleshooting issues, and ensuring security. This article explores advanced techniques and best practices for effectively managing Linux logs. Whether you're a seasoned Linux administrator or a newcomer, these insights will help you optimize your Linux log management processes.

What Is Storage Area Network (SAN)? Benefits & Implementation

In the ever-evolving landscape of technology, data has become the lifeblood of businesses. The exponential growth of data has spurred the development of intricate data storage systems to accommodate these volumes efficiently. One such vital player in the realm of data storage is the Storage Area Network (SAN). SANs are paramount in managing and processing large data volumes, ensuring seamless accessibility, scalability, and high availability.

NinjaOne's Summer 2023 Release Webinar (5.4 Platform Demo)

5.4 is one of NinjaOne’s most comprehensive releases in a long time. Version 5.4 includes revolutionary IT automation capabilities, advanced search capabilities, handy new policy conditions, Documentation module updates, and much much more – all based on customer feedback and designed for immediate implementation.

Detecting and Preventing Brute Force Attacks with PowerShell

While cyber threats are certainly continuously evolving, the fact is most intrusions still rely on basic, tried-and-true techniques. Who needs to burn a zero-day if guessing commonly used passwords or exploiting passwords used across multiple accounts can give you easy access? Brute force attacks continue to be an incredibly common threat that organizations face.

MDR vs XDR: What's the Difference?

If your IT team is struggling to accomplish its lengthy to-do list, implementing detection and response solutions may be one step you can take to improve efficiency and reduce workload. Endpoint security solutions like Managed Detection Response (MDR) and Extended Detection and Response (XDR) can help you maintain and monitor your endpoints and other parts of your infrastructure, a very necessary capability in modern cybersecurity.

Azure Active Directory vs Active Directory: What's the Difference?

There are many possible reasons why you may want to know the difference between Active Directory and Azure AD. Maybe you've just migrated from Microsoft Office to Office 365. You might be moving on-prem virtual machines into Azure. Or perhaps you're developing a greenfield cloud-native app that won't be connected to your on-prem resources at all.

How to Use PowerShell to Automate Office 365 Installations

In the fast-paced and demanding world of IT, every tool that saves time and simplifies tasks is worth its weight in gold. Today, we're going to explore how PowerShell scripts can be utilized to automate the installation of Office 365, a critical operation that can save you countless hours in the long run. In fact, with a well-written script, you can manage installations across an entire network from your desk.

How to Wipe a Mac Hard Drive Remotely with a Bash Script

As an IT professional or a Managed Service Provider (MSP), the task of managing user accounts on a network of Mac computers can be quite challenging. Imagine needing to repurpose a device, troubleshoot extensive issues, or ensure sensitive data is completely removed—these are daunting tasks that could require a significant amount of time and resources. This is where the 'Wipe a Mac Hard Drive Remotely' bash script comes into play.

PowerShell Script to Download Files from URLs: Automate and Verify File Integrity

In the fast-paced world of IT and managed services, efficiency and automation are key. A particularly useful tool that every IT professional or MSP should have in their toolkit is a PowerShell script capable of downloading files directly from a URL. In this blog post, we delve deeper into the workings of such a script, discuss real-world usage scenarios, and expound on the benefits of using PowerShell to download files from URLs.

How to Restart a Service with PowerShell: A Step-by-Step Guide

As IT professionals and Managed Service Providers (MSPs), the task of managing and optimizing system services is an integral part of our roles. PowerShell, a robust scripting language, provides an efficient way to perform these tasks. It enables task automation, simplifies complex operations with just a few lines of code, and facilitates services management on multiple machines simultaneously.

How to Securely Wipe a Windows Hard Drive with PowerShell

In today's era of data security, the proper disposal of data on hard drives is crucial. For IT professionals and Managed Service Providers (MSPs), having reliable tools for these tasks is essential. In this blog post, we're diving into the details of a versatile PowerShell script designed for secure and efficient disk wiping. We'll also provide essential tips to ensure its successful execution and data removal.