Operations | Monitoring | ITSM | DevOps | Cloud

September 2023

NinjaOne's 5.4 Summer 2023 Update: Elevating Automation and Enhancing Visibility

Our Summer 2023 Release delivers over 30 major updates across the platform, including significant improvements to our core remote monitoring and endpoint management solution. Overall, this release is a major step forward for our remote monitoring and endpoint management solution. It includes a wide range of new features and enhancements that will help our customers improve the security, performance, and manageability of their endpoints. Here is a quick overview video.

Are You Struggling to Break Through the Growth Barrier With Your MSP?

The vast majority of MSPs in the world are under $2milion in revenue. Breaking through that barrier is not easy. As part of our business transformation program, we see a large number of MSPs that have been going for more than 10 years but can’t seem to push through to the next level. Often these MSP businesses are stuck in the $800k-$2M turnover range with around five to 15 techs working for them.

The Keys to Adopting an Automation Mindset

In today's fast-paced digital world, automation stands as a beacon of efficiency and innovation. The adoption of an automation mindset is not merely a trend, but a paradigm shift in how we approach IT processes. This post provides insights into the critical role of IT automation, highlights potential challenges, offers preparation tips before embarking on the automation journey, presents a systematic plan and wraps up with key takeaways.

7 Steps to Finding Time to Work on Growing Your MSP Business

We understand the relentless demands and challenges that come with running an MSP, particularly when you’re a relatively small business. The constant juggling of client needs, technical issues, and operational tasks can leave little room for strategic planning and growth. However, it’s essential to find the time to work on your business rather than just in it if you want to achieve sustainable growth and success.

How to Configure a Linux Firewall: The Ultimate Guide

A firewall stands as a digital gatekeeper, meticulously sifting through network traffic and deciding what may pass. This protective shield, fundamental to cybersecurity, is integral in the Linux world. The Linux kernel itself is effectively a de facto packet switching firewall, crafted as it is around the principles of packet filtering at the most fundamental operating system level, thus exemplifying the pivotal role of firewalls in system security.

On-Premise vs Cloud Software: What's the Difference?

Since the early 2010s, software delivery methods have largely evolved. While on-premises tooling defined the first wave of customizable software, the market saturation of cloud-based counterparts offers new forms of software solutions. Navigating the complexities of on-prem, cloud, and hybrid setups demands a deep understanding of each offering’s efficiencies and requirements. Learn more about on-premise vs cloud software in our comparison below.

4 Ways Technology Supports a Remote Workforce

Employees have already staked a claim on the future of remote work. With 98% of millennial employees wanting to work from home at least some of the time, reported benefits range from lower stress to enhanced productivity and motivation. As a team leader, however, the complexities of managing a remote workforce can seem daunting. This is where technology can help your hybrid and remote teams unleash new forms of collaboration unrestrained by office walls.

3 Tips to Help MSPs Thrive in a Saturated Market

One of the things we talk about a lot when discussing the current state of the MSP market is the concept of the Red/Blue Ocean. In this analogy the Blue Ocean represents a market where there are lots of opportunities to grow and do more business; while the Red Ocean represents a saturated market where opportunities are harder to find.

12 Things to Look for When Choosing an RMM Platform

As organizations become increasingly reliant on remote solutions, the choice of a robust remote monitoring and management (RMM) platform becomes paramount for MSPs. But it’s not that simple. With so many options on the market and the whole IT landscape changing rapidly. What should you be looking for when it comes to selecting and RMM. Here are 12 things you should be considering.

IT Automation is a Force Multiplier for Businesses

IT automation is quickly becoming one of the most critical aspects of a modern IT operations environment as it reduces the cost of performing routine IT tasks while also increasing the productivity of individual team members. IT automation can be defined as the process of utilizing software and other systems to automate manual processes and easily repeatable tasks related to managing and supporting remote endpoints.

Building a Culture of Automation: Unleashing Efficiency and Innovation

In today's fast-paced digital landscape, businesses constantly seek ways to improve efficiency, reduce costs and stay competitive. Resourceful organizations find that automating repetitive tasks, streamlining processes and resolving issues without human intervention can revolutionize how organizations operate. This blog will delve into the benefits of automation and provide insights on fostering a culture of automation within your company, supported by relevant sources and examples.

Must-Know Ransomware Statistics, Trends, and Facts

Although IT teams and MSPs continue to ramp up their security efforts, ransomware attacks show no signs of slowing down. Statistica’s ransomware report shows that in 2022, there were approximately 493.3 million ransomware attacks, and while this is a decrease from the 625.3 million attacks that occurred in 2021, it’s still higher than all the other years in the last decade.

How to Create a SaaS Spend Management Strategy

Wondering why you’re hearing about SaaS spend management more and more lately? These days, SaaS apps are everywhere, and adoption is still growing at an impressive rate. Gartner projects that SaaS spending will grow over 17% in 2024, with the market exceeding $232 billion. Unfortunately, much of that spend is wasted on zombie apps, overlapping software offerings, as well as under-utilized and over-provisioned licenses.

Unbeatable Excellence - NinjaOne RMM Tops G2's Fall 2023 Report

G2, a highly regarded authority in the field of software reviews and research, has recently unveiled its much-anticipated Fall 2023 Research Report. In a resounding display of dominance, NinjaOne has once again emerged as the unrivaled leader in the realm of Remote Monitoring and Management (RMM) software, maintaining this prestigious position for an impressive 18 consecutive quarters.

Are You Sure Your Devices Are Fully Encrypted with BitLocker?

BitLocker has long been the standard when it comes to disk encryption for your devices running Microsoft Windows operating systems—particularly on workstations and laptops. It’s designed to protect data by encrypting the entire disk drive on which the OS and user data are stored. This encryption ensures that even if someone physically steals or accesses your computer, they won’t be able to get to the data on the encrypted drive without the appropriate decryption key.

Linux Log Management: Advanced Techniques and Best Practices

Linux log management is critical to maintaining system health, troubleshooting issues, and ensuring security. This article explores advanced techniques and best practices for effectively managing Linux logs. Whether you're a seasoned Linux administrator or a newcomer, these insights will help you optimize your Linux log management processes.

What Is Storage Area Network (SAN)? Benefits & Implementation

In the ever-evolving landscape of technology, data has become the lifeblood of businesses. The exponential growth of data has spurred the development of intricate data storage systems to accommodate these volumes efficiently. One such vital player in the realm of data storage is the Storage Area Network (SAN). SANs are paramount in managing and processing large data volumes, ensuring seamless accessibility, scalability, and high availability.

Managing the Attack Surface: A Quick Guide for MSPs

As cyber threats get more sophisticated, cybersecurity becomes a top concern for organizations. In this context, MSPs face an unenviable task: they manage the IT infrastructure and services of multiple customers—often small and medium businesses, which tend to be cybercriminals’ preferred targets. This job is being made even more challenging due to the increased use of Internet of Things (IoT) devices and Bring Your Own Device (BYOD) policies in modern workplaces.

Detecting and Preventing Brute Force Attacks with PowerShell

While cyber threats are certainly continuously evolving, the fact is most intrusions still rely on basic, tried-and-true techniques. Who needs to burn a zero-day if guessing commonly used passwords or exploiting passwords used across multiple accounts can give you easy access? Brute force attacks continue to be an incredibly common threat that organizations face.

MDR vs XDR: What's the Difference?

If your IT team is struggling to accomplish its lengthy to-do list, implementing detection and response solutions may be one step you can take to improve efficiency and reduce workload. Endpoint security solutions like Managed Detection Response (MDR) and Extended Detection and Response (XDR) can help you maintain and monitor your endpoints and other parts of your infrastructure, a very necessary capability in modern cybersecurity.

Azure Active Directory vs Active Directory: What's the Difference?

There are many possible reasons why you may want to know the difference between Active Directory and Azure AD. Maybe you've just migrated from Microsoft Office to Office 365. You might be moving on-prem virtual machines into Azure. Or perhaps you're developing a greenfield cloud-native app that won't be connected to your on-prem resources at all.

How to Use PowerShell to Automate Office 365 Installations

In the fast-paced and demanding world of IT, every tool that saves time and simplifies tasks is worth its weight in gold. Today, we're going to explore how PowerShell scripts can be utilized to automate the installation of Office 365, a critical operation that can save you countless hours in the long run. In fact, with a well-written script, you can manage installations across an entire network from your desk.

PowerShell Script to Download Files from URLs: Automate and Verify File Integrity

In the fast-paced world of IT and managed services, efficiency and automation are key. A particularly useful tool that every IT professional or MSP should have in their toolkit is a PowerShell script capable of downloading files directly from a URL. In this blog post, we delve deeper into the workings of such a script, discuss real-world usage scenarios, and expound on the benefits of using PowerShell to download files from URLs.

How to Wipe a Mac Hard Drive Remotely with a Bash Script

As an IT professional or a Managed Service Provider (MSP), the task of managing user accounts on a network of Mac computers can be quite challenging. Imagine needing to repurpose a device, troubleshoot extensive issues, or ensure sensitive data is completely removed—these are daunting tasks that could require a significant amount of time and resources. This is where the 'Wipe a Mac Hard Drive Remotely' bash script comes into play.

How to Restart a Service with PowerShell: A Step-by-Step Guide

As IT professionals and Managed Service Providers (MSPs), the task of managing and optimizing system services is an integral part of our roles. PowerShell, a robust scripting language, provides an efficient way to perform these tasks. It enables task automation, simplifies complex operations with just a few lines of code, and facilitates services management on multiple machines simultaneously.

How to Securely Wipe a Windows Hard Drive with PowerShell

In today's era of data security, the proper disposal of data on hard drives is crucial. For IT professionals and Managed Service Providers (MSPs), having reliable tools for these tasks is essential. In this blog post, we're diving into the details of a versatile PowerShell script designed for secure and efficient disk wiping. We'll also provide essential tips to ensure its successful execution and data removal.