Operations | Monitoring | ITSM | DevOps | Cloud

NinjaOne

NinjaOne Mobile Device Management Just Got Even Better

Even as we officially launched MDM in June, our product team continued burning the midnight oil, building and testing additional features that would expand NinjaOne MDM use cases and enable our MSP customers to better serve their clients. The result? New multiple Android and Apple MDM connections (multi-tenancy) is available today – roughly one month ahead of schedule! That’s right!

What is Apple Business Manager and how does it work?

Apple Business Manager (ABM) is a comprehensive web-based portal designed by Apple to empower organizations in managing their Apple devices, apps, and employee access. With features like Apple automated device enrollment, ABM streamlines device deployment and management, making it easier for IT administrators to configure and secure devices remotely. It serves as a centralized platform where IT administrators can efficiently oversee and control various aspects of their Apple ecosystem.

HIPAA Compliance: Everything You Need to Know

In this article, we will discuss in depth everything you need to know about HIPAA Compliance. HIPAA was introduced with two main objectives: to protect the individuals’ health information while allowing the flow of health information needed to provide high-quality health care and to protect the public’s health and well-being.

CDK Global: A Cold-Hearted Reminder of Why Patch Management Matters

A few weeks ago, CDK Global, a software provider with 15,000 North American car dealership customers, faced back-to-back cyberattacks, effectively taking down scheduling, records, and more for their thousands of customers for days. The CDK Global attack is also the latest cyber incident to spur larger industry-wide conversations around the supply chain risks posed by increasingly ruthless and aggressive bad actors.

What Is Remote Code Execution (RCE)?

Remote Code Execution (RCE) is when an attacker runs malicious code on your IT infrastructure. The purpose of RCE ranges from further infiltrating your network, stealing information, or otherwise damaging, extorting, or stealing from you or your business. Because of this, protecting your computers and network from RCE attacks is vital. This article explains what remote code execution is, and the impacts of RCE on your business.

Don't lose your data! Hear real-world backup strategies from NinjaOne pros

Data loss hurts. Ransomware attacks? Catastrophic. “Real-World Backup Strategies with NinjaOne: Hear from the Pros who use it!” explores the importance of a robust backup strategy and how to implement one in your business. In this webinar, you’ll hear a firsthand account from H.E.R.O.S. President and General Manager Raffi Kajberouni about their ransomware experience, its impact on their business, and how NinjaOne’s Backup solution saved them from downtime and financial disaster.

Complete Guide: What Is Microsoft CVE-2023-28310?

Common Vulnerabilities and Exposures (CVE) is a system that identifies and catalogs security vulnerabilities in software and hardware. It is an essential tool for cybersecurity professionals, providing a standardized identifier for each vulnerability, which helps in sharing data across different security tools and platforms. Understanding CVEs is crucial for maintaining secure systems and responding quickly to emerging threats.