Operations | Monitoring | ITSM | DevOps | Cloud

Identify Weaknesses like a Ninja

Most IT teams find themselves playing catch up when dealing with vulnerabilities within their IT environments. In this stream, Director of Community, Jonathan Crowe joined by Director of Product Management, Greg Thomas and Sr. Product Marketing Manager, Mark Bermingham, will discuss how to be proactive and build a vulnerability management process that reduces risks and costs. What you’ll learn.

NinjaOne Backup - Proven Recovery. Powerful Protection. One Platform.

Today’s IT environments are everywhere spanning endpoints, cloud applications, remote devices, and SaaS platforms. It lives on endpoints, servers, in cloud apps, across home offices, remote devices, and SaaS platforms. But your backup strategy? It’s still fragmented. A patchwork of legacy endpoint tools, bolt-on SaaS protectors, and disconnected consoles. This complexity isn’t just inefficient… it’s dangerous. Blind spots lead to ransomware payouts. Missed restores mean lost productivity.

Creating an Incident Response Plan

When it comes to emergencies, it's not if something will happen, it's when. Whether it's a natural disaster or a cyberattack, IT teams must always be at the ready to save as much data as possible and keep the organization safe. Prevention is an important step, but being prepared for when the worst happens could save valuable time, money, and information from being lost.

How to Integrate Microsoft Entra - Part 1

Our Field CTO, Jeff Hunter, demonstrates how to integrate Microsoft Entra into NinjaOne using SAML, which forces NinjaOne accounts to use Microsoft Entra as the authentication source for login. Next week in part 2, we'll discuss configuring SCIM, which allows you to use Entra to create and manage both technician and end user accounts in NinjaOne. Chapters.

Why Your System Keeps Producing the Wrong Behavior

When leadership breaks down, we tend to blame people, culture, execution, or even ourselves. But most organizations are behaving exactly as their systems allow. This presentation looks at leadership like a system to be debugged. Instead of focusing on intent or language, we’ll examine outcomes: what behaviors are rewarded, where friction appears, and how incentives and constraints shape decision-making inside IT teams.

How to Find, Develop, and Retain Your A-Players

Most teams aren't full of A-players because most leaders are playing the wrong game. They're chasing expensive talent with perfect resumes instead of identifying people who can be A-players in their specific context. The best leaders know how to spot undervalued talent, develop them systematically, and create environments where top performers choose to stay. This session shows you how to build your own talent factory instead of competing for the same overpriced candidates as everyone else.