Operations | Monitoring | ITSM | DevOps | Cloud

October 2023

A Comprehensive Guide to Software Configuration Management

In the ever-evolving landscape of software development, the need for a structured and efficient management system is paramount. Software configuration management (SCM) serves as the backbone for managing changes and maintaining the integrity of software products. For managed service providers (MSPs) and their clients, SCM is not just a best practice - it's a necessity.

Choosing the Right Software Deployment Tool: Intune vs. NinjaOne - A User's Perspective

Software deployment is an essential yet sometimes complex process for IT administrators, aiming to ensure applications are installed, updated, and managed efficiently across a network. Simplifying this procedure, especially with varied file formats like MSI and EXE, becomes crucial to save time and reduce potential headaches. Two software deployment tools, Microsoft’s Intune and NinjaOne, provide options to manage this but offer different user experiences.

How Rdata saves 60 hours a month with NinjaOne RMM

Ulf Ringdahl and Christian Klauser at Swedish MSP Rdata, share how switching to NinjaOne RMM helped them improve the simplicity and speed of their remote management, monitoring, automation, patch management and scripting. Now, they have more time to meet with customers and focus on projects that drive growth.

What Is the True Cost of Downtime for Businesses?

The financial and operational ramifications of downtime have become increasingly pronounced over the past seven years. In 2014, Gartner predicted that downtime costs organizations an average of $300,000 per hour. However, recent statistics lie in sharp contrast to this 6-figure estimate, with 44% of organizations now counting their hourly downtime costs at over $1 million - exclusive of the ensuing penalties or legal fees.

In-Office vs. Remote Employees: What's the Right Choice for Businesses?

Once upon a time, employment dictated where you lived. This widespread understanding led to a networking effect that amplified the appeal of cities. Cities, in turn, attracted skilled individuals, providing companies with a compelling incentive to establish a presence there and thereby draw even more talent. Notable locales like New York, Los Angeles, and Silicon Valley emerged as epicenters for high-caliber talent and the organizations that employed them.

Infrastructure as a Service (IaaS): What It Is, And Why You Need to Know

In the ever-evolving landscape of cloud adoption, resource virtualization has emerged as a transformative force, revolutionizing the way businesses operate and offer services. At the heart of this revolution lies the concept of Infrastructure as a Service (IaaS), which offers a spectrum of service models designed to meet the diverse needs of every company.

Application Patching: How To Patch Third-Party Applications

The applications we rely on extend well beyond the core systems provided by our primary software vendors, as our technological infrastructure is often interlaced with third-party applications. While these tools bring immense functionality and convenience, they also come with their own set of vulnerabilities. Third-party application patching is the unsung hero that ensures our external software tools remain secure, up-to-date, and optimized.

Network Segmentation: Definition and Key Benefits

In the ever-evolving landscape of network security, the challenges faced by Managed Service Providers (MSPs) and technical managers are multifaceted, and the need for robust security measures becomes paramount. Amidst this backdrop, network segmentation remains a pivotal strategy. This article delves into the intricacies of network segmentation, its significance, and a roadmap to its successful implementation.

The Dynamic Evolution of Endpoint Management

The field of endpoint management has undergone a remarkable transformation over the years, driven by the rapid evolution of technology and changing work dynamics. IT professionals have always played a pivotal role in ensuring the security and functionality of their organization's network. However, as the number of endpoints has proliferated, so too has the complexity of their responsibilities.

Primal Beginnings: Introduction to Automation in NinjaOne

Learn how to master the general principles of automation in this accessible overview of NinjaOne. Senior Director of Product and Customer Marketing Peter Bretton covers best practices for setting up policies, monitoring and alerting, script scheduling and deployment, and more. Getting started with NinjaOne? Here are more resources that can help you leap ahead.

Cultivating Titans: Building an Automation Culture that Scales

Investing in automation goes beyond just adding shiny new tools. In this session, NinjaOne Product Lead Gavin Stone and Product Manager Dan Myers share how to enable the people and processes hard at work behind the curtain. Because, despite all the hype, the real magic isn’t in prompting AI to generate one-off scripts, it’s in building a culture of true automation thinking.

7 Cybersecurity Statistics You Needs to Know in 2023

Cybersecurity isn’t just at the top of the discussion queue within the IT channel. Businesses and governments worldwide have turned a sharp eye toward rising cyber threats and cybersecurity statistics. Many have learned the hard way that small businesses are frequent targets of cyberattacks. The idea of “targeting a victim” itself has come into question, and more realize that widespread, indiscriminate attacks are the status quo.