Operations | Monitoring | ITSM | DevOps | Cloud

Identify Weaknesses like a Ninja

Most IT teams find themselves playing catch up when dealing with vulnerabilities within their IT environments. In this stream, Director of Community, Jonathan Crowe joined by Director of Product Management, Greg Thomas and Sr. Product Marketing Manager, Mark Bermingham, will discuss how to be proactive and build a vulnerability management process that reduces risks and costs. What you’ll learn.

NinjaOne Backup - Proven Recovery. Powerful Protection. One Platform.

Today’s IT environments are everywhere spanning endpoints, cloud applications, remote devices, and SaaS platforms. It lives on endpoints, servers, in cloud apps, across home offices, remote devices, and SaaS platforms. But your backup strategy? It’s still fragmented. A patchwork of legacy endpoint tools, bolt-on SaaS protectors, and disconnected consoles. This complexity isn’t just inefficient… it’s dangerous. Blind spots lead to ransomware payouts. Missed restores mean lost productivity.

Creating an Incident Response Plan

When it comes to emergencies, it's not if something will happen, it's when. Whether it's a natural disaster or a cyberattack, IT teams must always be at the ready to save as much data as possible and keep the organization safe. Prevention is an important step, but being prepared for when the worst happens could save valuable time, money, and information from being lost.

How to Integrate Microsoft Entra - Part 1

Our Field CTO, Jeff Hunter, demonstrates how to integrate Microsoft Entra into NinjaOne using SAML, which forces NinjaOne accounts to use Microsoft Entra as the authentication source for login. Next week in part 2, we'll discuss configuring SCIM, which allows you to use Entra to create and manage both technician and end user accounts in NinjaOne. Chapters.

Why Your System Keeps Producing the Wrong Behavior

When leadership breaks down, we tend to blame people, culture, execution, or even ourselves. But most organizations are behaving exactly as their systems allow. This presentation looks at leadership like a system to be debugged. Instead of focusing on intent or language, we’ll examine outcomes: what behaviors are rewarded, where friction appears, and how incentives and constraints shape decision-making inside IT teams.