Andrew Rosenblum

At NinjaRMM, We Protect Customer Privacy. It’s Just Good Business.

When the GDPR became enforceable for any company with either European customers or employees on May 25, it became the source of intense consternation in some C-suites.

Within 24 hours, both Google and Facebook were slapped with lawsuits that threaten over $8 billion in damages.  In April 2018, Harvey Nash and KPMG found that 38% of tech execs worried that they would not be GDPR compliant by the May deadline, and a survey of attendees at Infosecurity Europe conference in August 2018 found that 28% of organizations still did not consider themselves fully compliant.

But for Andre Schindler, NinjaRMM’s General Manager for EMEA, fleshing out the company’s privacy and GDPR policies was an opportunity to be transparent with customers.

Read more

Andrew Rosenblum

PSA vs RMM? So What’s the Difference?

Roy Trenneman, from the BBC’s IT Crowd, became a viral symbol of white collar frustration by starting every single call by asking if the person had turned the computer off and turned it on again.

But the world of IT is changing, thanks to powerful cloud-based tools called remote monitoring and management (RMM) and professional services automation (PSA) platforms.  The RMM helps your friendly neighborhood IT guy remotely log in and troubleshoot the computers – and the PSA helps him handle business processes like time-tracking and turning support tickets into invoices.

Read more

Andrew Rosenblum
,

The Flail, Goldilocks, and the V.C.R.: Why MSPs need to look closely at the “software company life cycle” when deciding to buy a SaaS product

Where your software vendor is in the software life cycle will profoundly affect your user experience

Imagine you picked up the phone and heard the following pitch from a sales rep at a software-as-service company selling to your MSP…

Hi! Our brand-new product lacks 8 crucial features and crashes about twice a week.  And I’m not totally confident we’ll still be around in 6 months, and we only have one support guy.  But we’re cheap!  Can I offer you 3 months for free?”

Raises an eyebrow, right?  And he’s not kidding about going out of business: CB Insights found that 90% of startups fail within the first 4 years.
Read more

Lisa Harshman
,

NinjaRMM + Webroot: The Truth Behind Machine Learning

Over the past couple of years, the topic of Machine Learning has boomed in popularity. Now, many in the industry are using terms like Next Gen; AI; Machine Learning; Neural Nets and more.

In this recorded webinar, the NinjaRMM team and George Anderson, Webroot’s Director of Product Marketing, discuss how Webroot utilizes Machine Learning to better protect you and your customers.

Read more

Andrew Rosenblum
,

[Case Study] HIPAA Requires IT Managers to Run a Tight Ship – That’s Why Georgia Bone & Joint Surgeons Picked NinjaRMM

Why Georgia Bone & Joint Chose NinjaRMM

All IT managers face pressure to keep customers happy – but HIPAA regulations that require meticulous siloing of medical records add a whole new level of stress.

“If anything happens and patient information leaks out, it’s a huge fine,” says Nick Cappello, IT manager at Georgia Bone & Joint Surgeons, P.C.  “And if it’s something where I should’ve known better, I could actually see jail time.”

Read more

Lisa Harshman
,

NinjaRMM + Webroot: Protecting Your Clients Against Today’s Cybersecurity Threats

When it comes to cybersecurity, change is the only constant. Analysts, researchers, and security companies worked quickly to identify and block emerging threats throughout 2017, but attackers were just as quick in finding new ways to evade defenses.

In this recorded webinar, Tyler Moffitt (Sr. Threat Research Analyst at Webroot) discusses discoveries and solutions from the 2018 Webroot Threat Report.

Get a glimpse into modern cybercrime and the knowledge you need to better protect your clients. Then, grab a copy of the Threat Report (with a special forward from NinjaRMM’s CEO, Sal Sferlazza) to share with your team! Read more

Andrew Rosenblum

NinjaRMM #1 in Stability, Patching, and Support in MSP Community Survey

In new poll on RMM quality, NinjaRMM tops the voting in key categories

Competing in a crowded field of 11 different companies that provide remote management and monitoring (RMM) software solutions, NinjaRMM earned the top score in 3 separate categories in a recent MSP Reddit poll: most stable, best patch management functionality, and best support. In a survey of roughly 380 responses from managed service providers (MSP), who specialize in providing IT services to small and medium-sized companies, NinjaRMM emerged as the #2 most admired RMM overall, scoring a 3.51, narrowly trailing the top vote-getter’s 3.53.

Read more

AJ Singh

Supporting Users and the Human Side of Being an MSP

There’s an actual person on the other end of that helpdesk ticket. We all know it, but that fact often gets lost over time. And it shouldn’t.

Many MSPs place their focus on the tools and technology that make being an MSP possible.  Terms like “multi-tenancy”, “remote”, and “automation” get MSPs excited, but if you were to try to sell a customer on the basis of the functionality and benefits these terms imply, would you make the sale? I doubt it, as most customers aren’t looking for an MSP to come in and install a bunch of tools; they are looking for someone who wants to partner with them to ensure their employees are secure and productive, making the business successful.

Read more

Lisa Harshman

Event Recap: Webroot & NinjaRMM Cybersecurity Brew & Learn Series

Three cities, threw breweries, three days!

Last week, NinjaRMM and Webroot partnered to present a Brew & Learn series to local MSP’s in Atlanta, Tampa, and Miami. We focused on discussing the cybersecurity issues faced by MSPs in today’s challenging IT environment and how to be prepared to deal with these incidents. The presenters were:

Tyler Moffitt, Senior Threat Research Analyst, Webroot

Brian Coffey, Senior Channel Account Manager, Webroot

Armando Najera, Vice President of Business Development, NinjaRMM

Read more

Andy Zhu
,

2.17 Release – RAID Controller, TeamViewer 13, and more!

Wondering what types of features are available in our latest 2.17 release of NinjaRMM? We have you covered with this recorded webinar from the NinjaRMM product team.

Read more

Lisa Harshman
,

NinjaRMM + Webroot: Security Awareness Training

According to the latest Verizon Data Breach Investigations Report, human error was directly involved in 65%* of successful breaches in the last year, proving cybersecurity isn’t just a technology issue. End users are the first line of defense against cyber threats, so educating them should be a major priority.

Check out this recording from NinjaRMM and Webroot to find out more about cybersecurity around end users including:
– Common issues caused by end users and their behavior
– Best practices for preventing cyberattacks
– How MSPs can help reduce the risk of cyberattacks for their customers

Read more

Andy Zhu

Choosing the Right Tools – Best of Breed, Best in Class, or Best of Both?

The challenge for any Managed Service Provider (MSP) working to add a new offering is which solution (relative to that offering) to choose. The solution selected can materially impact your business’ efficiency, productivity, and profitability, as it defines the very way by which you do business. With so many vendors vying for your attention claiming they’re “best of breed” or “best in class”, selecting the right tool for the job involves a lot more confusion than clarity.

 

Read more

Andy Zhu

Achieving Predictability in RMM

The key to any MSP’s growth is predictability – that business nirvana where you know how much time your techs are going to spend, exactly how they’ll address issues, how much revenue you’ll bring in, and how much profit you’ll make. But to get there, as mature and successful MSPs know, the concept of predictability needs to first extend down into every facet of your business. Why? Because it’s right there in the phrase predictable business – the entire business needs to be predictable.

 

This concept of every facet being predictable should find its way down to the very solutions your techs use to accomplish their work. After all, without a solution providing predictable results, your techs would be manually performing tasks according to step-by-step lists (and nobody wants that!).

Read more

Adam Bertram

Guest Blog: Introverts at Conferences

Today I nearly watched someone die because the awkward feeling of standing next to a group of people at a crosswalk was too much. It was during the early morning walk to the Microsoft Ignite conference. Myself and a group of other attendees were waiting for the all-clear to cross a highway when I saw someone join our group briefly. This guy quickly eyed our group nervously and then immediately begin to cross the road with a definite degree of determination. As he crossed the four-lane highway, I couldn’t help but think about his choice to sprint across a busy road risking his life rather than waiting a couple of minutes. Was it because he was, in fact, too uncomfortable to stand amongst strangers or was he simply in a hurry to get to an early morning session? The way he was acting led me to believe he simply didn’t want to feel awkward standing around with a bunch of strangers for just a few minutes in silence. Are you the introverted daredevil in this story? If so, read on. As an introvert myself, I struggle with many of the same anxiety-provoking situations that all introverts sometimes do; schmoozing, awkward silence, direct eye contact, etc. but it’s something I’ve managed to overcome to a degree. Tech conferences mainly used to be one of the most anxiety-fueled experiences I dealt with especially when I would attend by myself. Familiar coworkers were my crutch. They were my safe-place amongst the crowd of strangers that I would stick to like glue the entire time. But, it’s not like this anymore. Tech conferences typically consist of three main components:

• Conference sessions (large keynote and smaller breakout sessions)
• Shared meals in large halls
• After-parties in the evenings

Read more

Adam Bertram

Three Ways to Keep Active Directory Clean

Active Directory is one of those products that tend to get bloated. It’s a product where lots of people are making changes every day to and ultimately ends up being this enormous pile of stuff that somehow still works. Even the most well-intentioned IT department always seems to end up with an Active Directory environment that’s got lots of user accounts no longer needed, GPOs attached to OUs people didn’t even know existed and computer accounts that represented computers long gone. This state seems to creep up on people. One day, someone sits down in front of Active Directory Users and Computers (ADUC) and has that moment where they go, “Wow! This needs cleaned up.”.

Once someone in your organization has that moment, it’s probably going to be a daunting and overwhelming task. You may start a project to “clean up stuff” but you’ll soon find that right-clicking and deleting isn’t going to cut it. There are lots of ways to make this project a success with the first task being to define what exactly “clean up” means. For this article, we’re going to focus on unused user accounts. More specifically, we’re going to focus on three attributes that a user account might have that would deem it “deletable.” Those attributes are disabled accounts, accounts that haven’t been used in X days and accounts with expired passwords.

Read more

Adam Bertram

Syncing a CSV with Active Directory

This series of PowerShell tips and tricks is an on-going collaboration between NinjaRMM and Adam Bertram, Microsoft MVP.

One of the most common applications of PowerShell that I see IT professional is syncing information with Active Directory (AD). It seems like everyone has some external data source that correlates to some employees that we need to get into AD. This is to be expected because AD typically is the most used IT service in an organization and provides an excellent feature not just as authentication but as a repository of employee information.

Whether you’ve got data stored in a custom SQL database or some fancy HR system, it sucks to have to check two spots if you need information like employee department, groups that employee should be a member of and so on. When you do begin to sync that data, the source system may change its schema, may change APIs, servers and so on which means a code rework. To ensure the data source you’re syncing from always stays the same and can easily be created from any number of systems, it’s a good idea to get that data into a CSV file.

A simple CSV file can be exported from just about any software or database and when in this format, gives the administrator a copy that can be tweaked as well as necessary foregoing the requests from another team to change up a database somewhere.

Read more

AJ Singh

The Smart Way to Defeat Today’s Sophisticated Security Threats

Today’s IT security landscape is increasingly sophisticated and elusive, and many IT administrators see traditional network security defenses becoming less effective in protecting their businesses. A major culprit is malware signatures that are evolving more quickly than security vendors’ abilities to create patches. According to research from Cisco, antivirus vendors have created protection for more than 20 million known viruses, but hackers are estimated to have created more than 100 million — and that number grows each year.

One of the most insidious threats companies face is ransomware, which infiltrates companies’ networks oftentimes through emails containing links/attachments from seemingly legitimate senders (e.g., FedEx, the IRS, UPS). Once the user clicks the infected email link or attachment, the malware begins encrypting files on the user’s machine as well as any additional files the machine has access to via the network. Shortly afterward, users receive pop-up messages on their screens notifying them that their data is being held ransom, and they must pay a fee — typically $700 to $1,000 — to obtain the decryption key.

Read more

Andy Zhu

Avoid the RMM Shelfware Trap

Buying IT applications as a suite has become a common business practice, illustrated by Microsoft Office, which includes Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access in one packaged offering. Microsoft’s SaaS offerings, such as Office 365 Business Premium, adds Exchange Online, OneDrive for Business, Skype for Business, and Microsoft Teams to the list.

Buying bundles is good if you use all of the products, or at least if you’re not stuck paying extra for the products you don’t use. But business-to-business software bundles are the exception to the rule.

Read more

Natan Ovadia

3 Reasons It’s the Right Time to Become an MSSP

Your customers have already bought into the as-a-service business model; why not take the next step and deliver the security services they need, too?

Companies are finally realizing that cybersecurity threats aren’t just a passing fad — they’re here to stay, and they must be taken seriously. And, research from MarketsandMarkets suggests they’re doing just that. In its 2016 Managed Security Service Market report, the firm revealed the managed security service market size is estimated to grow from about $17 billion in 2016 to nearly $34 billion by 2021, representing a compound annual growth rate (CAGR) of 14.6 percent during the forecast period.

Read more

AJ Singh

MSPs: Use RMM to Gain a Competitive Advantage

RMM CAPABILITY GIVES MSPS A COMPETITIVE EDGE

Every Managed Service Provider (MSP) is looking for a way to stand out in the marketplace. Competition is getting fierce, and companies with the most outstanding customer service will achieve a competitive advantage. The use of Remote Monitoring and Management (RMM) software is critical to establishing market dominance because its capabilities allow you to collaborate with your customers to keep their systems running well.

Read more