Operations | Monitoring | ITSM | DevOps | Cloud

MSP

The latest News and Information on Managed Service Providers and related technologies.

Using N-central for Server Hardware Monitoring

While it is fair to say that in recent years we’ve seen a shift to servers being deployed in the cloud through Microsoft Azure or AWS, I’m sure if you’re reading this today you still have a large percentage of physical servers under your management, including Hyper-V and ESXi hosts. N-central’s ESXi monitoring should automatically detect and monitor the hardware in these boxes, but what about the rest?

Cloud User Hub will help partners tame the Microsoft Cloud

We’re pleased to announced the launch of N-able Cloud User Hub, following the acquisition of Spinpanel in July of this year. N-able Cloud User Hub is a multi-tenant Microsoft 365 management and automation platform built for Microsoft Cloud Solution Providers and allows users to automate the management and security of all Microsoft tenants, users, and licenses.

Sustainable Technology: Can Clouds Save The Planet?

Sustainable technology has become a hot topic in the tech world over the past few years. From the escalating environmental impact of heat and water-intensive activities like crypto mining and chip production to carbon taxes to sustainability becoming a pillar in the AWS Well-Architected Framework, there’s plenty of issues to talk about, but conversations become marked quieter when you shift to discussing solutions.

What Are Managed IT Services?

If you're a business owner, then you know that technology is important. You need it to run your business, keep track of your finances, and communicate with your employees and customers. That's why it's so important to have a good IT department - or outsource your IT needs to a Managed Service Provider (MSP) like Computer Emergency.

The Key Principles of Data Protection (EU, and North America)

There’s no doubt that the typical modern enterprise generates large amounts of data that must be moved, analyzed, and safely stored. Because much of this data involves the privacy of users and customers, various laws and regulations have been created to drive strong protection practices. While these regulations vary a great deal from country to country, the underlying concept remains the same: keep data safe while making it available to authorized users when they need it.

Mobile Device Management (MDM) Overview

The use of mobile devices within organizations is steadily increasing, and it’s not slowing down anytime soon. Zippia reported that around 3 out of every 4 employees use their personal cell phones for work. Mobile devices in the workplace can provide many benefits, but can also bring more risks, which is why mobile device management is needed.

Three hidden RMM features that are underutilized

Over my time as a Sales Engineer and Partner Success Manager, I quickly learned that there are a few under-utilized features of N-sight RMM. While performing RMM dashboard audits, three of these features routinely came up in conversation with our partners. They include the Site Concentrator, Data Overdue Cross-Check, and Monitoring Templates. In this blog series, we will briefly cover uses in your day-to-day work and implementation of the features.