Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Asset Management, Device Management and related technologies.

Identify Weaknesses like a Ninja

Most IT teams find themselves playing catch up when dealing with vulnerabilities within their IT environments. In this stream, Director of Community, Jonathan Crowe joined by Director of Product Management, Greg Thomas and Sr. Product Marketing Manager, Mark Bermingham, will discuss how to be proactive and build a vulnerability management process that reduces risks and costs. What you’ll learn.

From Dashboards to Conversational AI: The Evolution of UI in IT Products

The way IT teams interact with technology has changed dramatically over the years. From early text-based interfaces to today’s dashboards and now conversational AI, each stage has reshaped how we monitor, diagnose, and understand complex IT environments. But while dashboards gave us visibility, they often led to more questions than answers. In this post, we briefly explore the evolution of UI in IT products and how conversational AI is bridging the gap between data and understanding.

How AI-Driven Automation Solves Patch Management Silos

"We see 10,000 critical vulnerabilities!" "We patched everything last week!" This conversation happens in enterprise IT departments every single day. Security teams present dashboards filled with red alerts. IT teams show deployment reports at 98% success. Both teams are looking at real data. Both are absolutely correct. And both are totally blind to what's actually happening across the endpoint environment. This isn't a people problem — your teams aren't incompetent.

NinjaOne Backup - Proven Recovery. Powerful Protection. One Platform.

Today’s IT environments are everywhere spanning endpoints, cloud applications, remote devices, and SaaS platforms. It lives on endpoints, servers, in cloud apps, across home offices, remote devices, and SaaS platforms. But your backup strategy? It’s still fragmented. A patchwork of legacy endpoint tools, bolt-on SaaS protectors, and disconnected consoles. This complexity isn’t just inefficient… it’s dangerous. Blind spots lead to ransomware payouts. Missed restores mean lost productivity.

Network Topology Explained: Types, Diagrams & Best Practices

Network topology determines how devices connect and communicate in your infrastructure. Learn the types, when to use each, and how to optimize for performance and reliability. What's covered: Network topology types: star, mesh, hybrid, ring, bus Comparison table with pros, cons, and use cases How to choose the right topology for your enterprise Common challenges and solutions Best network topology tools in 2026.

DEX in IT Routine: How Digital Experience-Driven Decisions Elevate Operational Quality and Results

In a scenario where IT teams face growing pressure to deliver positive business outcomes, relying solely on technical metrics is no longer enough. During the webinar held on March 26, 2026, Leandro Silva and Bob Kruger spoke about how Digital Employee Experience (DEX) — a tangible discipline supported by specialized tools — transforms IT decision-making, resource prioritization, and strategic value delivery for organizations.

InvGate Asset Management's Smart Tags: A Guide to Customizing Your ITAM Automations

Keeping an IT inventory organized is harder than it sounds. As environments grow, assets quickly multiply across locations, owners, statuses, and lifecycles. Manually grouping devices becomes time-consuming and error-prone, often leading to outdated inventories and teams spending valuable time building lists instead of taking action. That’s where InvGate Asset Management’s Smart Tags come in.