Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

How to differentiate your MSP like a ninja

In a crowded, commoditized market, being able to differentiate really boils down to how quickly & effectively you can earn trust. The best-performing companies are very intentional about the "trust signals" they're putting out there, and some of those signals may not be what you think they are. Let’s dive into concrete examples and place your business on an entirely different playing field than your competitors.

Proactively Protect: Automating and Strengthening Endpoint Security Measures

In an ever-evolving cybersecurity climate, safeguarding endpoints against threats has never been more paramount in today’s constantly evolving cybersecurity space. Endpoint management plays a key role in ensuring key security tools like antivirus and Endpoint Detection and Response (EDR) software are present and operational, while automating endpoint hardening that promotes a stronger security posture.

How Can Developer Happiness Transform Your Tech Team's Success? - Insights from Ramiro Berrelleza

Discover the transformative power of developer happiness in this talk from Navigate North America 24. Join Ramiro, founder and CEO of Okteto, as he delves into the crucial link between developer well-being and business value. Learn practical strategies for reducing friction, fostering a healthy work environment, and proving the ROI of investing in developer satisfaction.

Ask Me Anything: Solving the Top 10 WhatsUp Gold Support Issues

IT Infrastructure (ITIM) tools can take time to learn. That’s even true for WhatsUp Gold, which receives excellent reviews on third party sites for its ease of customization, ease of implementation and vendor support. Thankfully, with WhatsUp Gold, you have many resources at your disposal, including the knowledge base, online documentation, YouTube Channel and community forums.

Episode 3 | Ryan Cooke on CSPM, DSPM and Data Security in the Cloud

In this episode, the hosts and guest discuss the importance of data security posture management (DSPM) and its role in protecting sensitive data. They explore the evolution of the cybersecurity and data security market over the years, highlighting the challenges and advancements in securing data in cloud environments. The conversation also touches on the vendor landscape, the complexity of selecting security tools, and the need for organizations to invest in data security. The key takeaways include the overwhelming number of security tools available, the importance of aligning security goals with business risks, and the impact of regulations on data security.

How to test your systems for scalability and redundancy with Fault Injection

Part of the Gremlin Office Hours series: A monthly deep dive with Gremlin experts. Do you know if your services can tolerate losing a node? What about an entire availability zone? Or a region?‍ Large-scale outages aren’t unheard of. When you’re running critical services, it’s vital that those services can keep running even if an AZ or region fails. In addition to failing over, these services also need to scale quickly so traffic shifts don’t overwhelm your systems. How do you prove that a service is both scalable and redundant? The answer is with Fault Injection.

NinjaOne Speedrun: From zero to fully functional IT in 60 minutes

Does the thought of switching to a new endpoint management solution make you go, “ugh!”? Worried about the time, effort, and frustration that will go into migration and implementation? Fear not! NinjaOne is easy to setup, implement, and use — 92% of customers say it takes them less than a month to fully implement NinjaOne (and 58% say it takes less than a week). Join this NinjaOne Speedrun webinar and conquer IT setup in 60 minutes flat. Our Field CTO Jeff Hunter will be your guide in this fast-paced session, showing you exactly how to.