Operations | Monitoring | ITSM | DevOps | Cloud

MSP

The latest News and Information on Managed Service Providers and related technologies.

20 Technology in the Workplace Statistics, Trends, and Predictions

Advanced technologies are reshaping how businesses operate, from facilitating remote work to enhancing employee productivity. By understanding today’s trends, businesses can better prepare for the future of work, optimize their operations, and stay competitive in an increasingly digital world.

Bring Us Your Mobile! NinjaOne MDM Supports Android, iOS and iPadOS Devices

Thanks to the tireless dedication of our product team, a super-active beta program, and hundreds of early adopters seeking a better way to do mobile, we are thrilled to officially introduce NinjaOne Mobile Device Management (MDM) – an extension to our No. 1-rated endpoint management platform!

What Are the HIPAA Data Backup Requirements?

The Health Insurance Portability and Accountability Act (HIPAA) enforces how you must retain and protect sensitive user data in a healthcare setting. Compliance is mandatory, and knowingly breaching HIPAA rules (including disclosing health information of individuals) comes with hefty fines and even jail time. It is important that your data practices and infrastructure and the third parties you trust to store and protect sensitive information, recognize and comply with HIPAA regulations.

What Is Full Stack Observability & Why Is It Important?

Full stack observability is not merely about collecting data but about providing actionable insights. It empowers you to see beyond isolated metrics and logs, facilitating a deeper understanding of the interconnected nature of modern software systems. By implementing full stack observability, you can maintain operational integrity, swiftly address performance issues, and ensure a seamless user experience.

Complete Guide: Understanding and Preventing DCSync Attacks

Gaining insights into DCSync attacks is key to fortifying your Active Directory (AD) against these sophisticated threats. By exploiting legitimate AD replication protocols, attackers can discreetly extract sensitive information, such as password hashes and Kerberos tickets. Recognizing these attack vectors enables you to implement more effective monitoring and auditing tools, enhancing your overall security posture.

Ncentral: Calculating TCO and ROI in the On-Premise to Cloud Transition

A few weeks ago, I received a message over Teams from Laura White, one of our Partner Success Managers who works with many of our Super Elite partners. Laura was preparing for an important meeting with a partner to discuss migrating from an On-Premise N‑central server to a Cloud Hosted N‑central with N‑able, and she wanted my input. The move from on-premise infrastructure to the cloud has been a hot topic.

What is MDR and How Can it Benefit MSPs

Staying ahead of emerging threats is paramount for MSPs tasked with safeguarding their customers’ digital assets. However, amidst the broad range of technologies and buzzwords, distinguishing genuine solutions from marketing spin can sometimes be challenging. This blog draws on a recent podcast interview with N‑able Chief Security Officer, Dave MacKinnon, to give insights into Managed Detection and Response (MDR) and its implications for MSPs.

Navigating AI Adoption in MSPs

Explore how AI is transforming the MSP industry, from strategic applications to regulatory concerns, with Nicole Reineke, AI Strategist at N-able. Join Pete Roythorne and Nicole Reineke, AI Strategist at N-able, as they dive into the evolving role of AI in the Managed Service Provider (MSP) industry. Discover how AI is being utilized beyond marketing and code creation, the current opportunities, regulatory challenges, and strategies for MSPs to integrate AI effectively.