Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Managed Service Providers and related technologies.

Why is EDR Important? A Business Case for MSPs

The security industry may not have been making a lot of noise about Endpoint Detection and Response (EDR) for long, but it’s not actually a new technology. Despite having been around now for roughly 10 years, it’s only recently that EDR has really come to the fore. This has been driven by the fact that traditional antivirus struggles to cope with the increasing sophistication of modern malware, and is certainly unfit to handle new types of cyber threats.

The 2023 Network IT Management Report Part 4: Solutions for End-Users

This is the fourth in a four-part series focusing on the findings from our 2023 annual Field Report for IT Management. We surveyed 4500 IT professionals from internal IT teams and MSPs across North America to gauge where their organizations are heading from a network management perspective. In part four, we’ll discuss the needs of the end-user and how IT teams can contribute to their productivity. You can read the full 2023 field report and compare your own IT statistics here.

What Is Network Discovery?

There’s a reason why the network monitoring market reached about $2 billion in 2019 and is expected to reach $5 billion by 2026. In today’s tech-focused world, organizations require network monitoring to secure and manage their IT infrastructures. One of the crucial systems that every network monitoring and management operation needs to succeed is known as network discovery.

Intune vs SCCM: A Comparison of Microsoft Solutions

Figuring out which software solution will meet the needs of your organization’s IT environment can be a big challenge. There are many factors to consider before making a final decision, and one of those is to learn what software solutions are available. Intune and SCCM are two Microsoft solutions that help you manage the devices in your IT environment. Find out what each software solution does, how Intune vs SCCM compare to each other , and which one is right for you.

N-central Patch Monitoring Best Practices and Recommendations

The best part about patching in N-able N-central is the ability to fully automate the process, but even if that is accomplished correctly there is still a need to have the right amount of sensitivity of patch monitoring in place. I have always monitored patches in terms of age, I did so with WSUS v3 (15 years ago) and have always done so in N-central.

Outlook Zero-Day (CVE-2023-23397) Fix for N-central and N-sight

As you likely be all too aware, there is a Microsoft Outlook zero-day vulnerability listed under CVE-2023-23397. With the increased attacks on Outlook this month, Microsoft has pushed out fixes for about 80 Windows flaws. More information on some of those patches can be found in my colleague Lewis Pope’s March 2023 Patch Tuesday blog. Lewis was also kind enough to send over the remediation script for both N-able N-central and N-able N-sight.

Why You Should Utilize the SNMP Monitoring Tools in N-central

Network device monitoring is a crucial aspect of IT management and it helps organizations to ensure that their network infrastructure is running smoothly. Many people that use RMM solutions will often use an additional application to monitor their network devices. However, one of the huge benefits of using N-able N-central as your RMM solution is the way it allows you to monitor network devices through Simple Network Management Protocol (SNMP).

What is Penetration Testing?

Penetration Testing -- also known as “pentesting” -- are used by cybersecurity professionals and managed service providers to identify vulnerabilities present in a system before a cybersecurity incident takes place. You will often come across clients asking you to perform penetration testing, especially as emerging government regulations begin to make the practice mandatory.

What is SOAR (Security, Orchestration, Automation, and Response)?

As a managed service provider, you know that cyberthreats are increasing in frequency, sophistication, and impact. In recent years, we have seen a dramatic increase in the number of cyber-attacks targeting businesses, governments, and individuals. This explosion of cyberthreats highlights the need for businesses and individuals to take cybersecurity seriously and implement modernized security measures to protect themselves against these threats.

Weathering the IT Storm

The tech world has been on a rollercoaster since the COVID-19 pandemic. During the large-scale shift to remote work throughout 2020-21, big tech firms invested heavily in talent and infrastructure and there was plenty of growth in the IT space. Since the second half of 2022, however, high inflation, big tech layoffs, and the threat of an economic recession have organizations focused more on remaining cost-effective than investing in growth.