Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Bring Us Your Mobile! NinjaOne MDM Supports Android, iOS and iPadOS Devices

Thanks to the tireless dedication of our product team, a super-active beta program, and hundreds of early adopters seeking a better way to do mobile, we are thrilled to officially introduce NinjaOne Mobile Device Management (MDM) – an extension to our No. 1-rated endpoint management platform!

Mobile Device Management: 6 Features You Need in your MDM Solution

Mobile devices are the norm in the workplace today, allowing your teams around the world to communicate and work together more efficiently. Traditional network boundaries shifted significantly during the global pandemic and organizations had to quickly learn to support a newly remote workforce. With the remote and hybrid work model the new normal, IT departments now support more mobile devices than ever.

What Are the HIPAA Data Backup Requirements?

The Health Insurance Portability and Accountability Act (HIPAA) enforces how you must retain and protect sensitive user data in a healthcare setting. Compliance is mandatory, and knowingly breaching HIPAA rules (including disclosing health information of individuals) comes with hefty fines and even jail time. It is important that your data practices and infrastructure and the third parties you trust to store and protect sensitive information, recognize and comply with HIPAA regulations.

What Is Full Stack Observability & Why Is It Important?

Full stack observability is not merely about collecting data but about providing actionable insights. It empowers you to see beyond isolated metrics and logs, facilitating a deeper understanding of the interconnected nature of modern software systems. By implementing full stack observability, you can maintain operational integrity, swiftly address performance issues, and ensure a seamless user experience.

Complete Guide: Understanding and Preventing DCSync Attacks

Gaining insights into DCSync attacks is key to fortifying your Active Directory (AD) against these sophisticated threats. By exploiting legitimate AD replication protocols, attackers can discreetly extract sensitive information, such as password hashes and Kerberos tickets. Recognizing these attack vectors enables you to implement more effective monitoring and auditing tools, enhancing your overall security posture.

Ncentral: Calculating TCO and ROI in the On-Premise to Cloud Transition

A few weeks ago, I received a message over Teams from Laura White, one of our Partner Success Managers who works with many of our Super Elite partners. Laura was preparing for an important meeting with a partner to discuss migrating from an On-Premise N‑central server to a Cloud Hosted N‑central with N‑able, and she wanted my input. The move from on-premise infrastructure to the cloud has been a hot topic.

What is MDR and How Can it Benefit MSPs

Staying ahead of emerging threats is paramount for MSPs tasked with safeguarding their customers’ digital assets. However, amidst the broad range of technologies and buzzwords, distinguishing genuine solutions from marketing spin can sometimes be challenging. This blog draws on a recent podcast interview with N‑able Chief Security Officer, Dave MacKinnon, to give insights into Managed Detection and Response (MDR) and its implications for MSPs.

How eG Enterprise helps MSPs offering digital workspaces, add value-added services

In a fiercely competitive market, against a background of vendor licensing cost changes that are impacting profit margins, many MSPs offering digital workspaces are modernizing to remain relevant and futureproof. Many managed service providers have historically focused mostly on uptime/downtime, resource monitoring and so on. Automation tools are reducing the value of conventional managed services.

16 Most Common Network Protocols

Computer networks have become integral to our modern digital world. From browsing the web to sending emails and transferring files, network connectivity enables countless applications and services. However, this would not be possible without network protocols, which provide a common language for devices to exchange information reliably. This article will explore some of the most common network protocols that drive communication and connectivity in networks and the Internet.

Automation in MSPs: Streamlining Service Delivery and Boosting Profitability

In today’s complex IT environment, clients demand quick, reliable services. To accomplish this, businesses have begun leveraging automation solutions to reduce response times and increase reliability, enabling staff to focus on strategic initiatives that drive business growth. However, many MSPs struggle to build an effective automation strategy and need help, making it challenging to remain competitive in the modern marketplace.