RMM Blog Post #2
Remote Monitoring Detection and Response By: Devon Dys (Blog Post 2 / Emerging Trends in Technology) Introduction Continuing from the original blog post #1 I will be going into further details about Remote Monitoring and Detection Systems (RMM). Focusing primarily on the security, and functionality that is provided, such as: how you connect to the RMM, basic use and functions commonly used. A detailed look into SMART drive use; what it provides and how it is used, monitoring HUB and scripting possibilities. There will be a video demonstration using Tactical RMM using a demo architecture following these topics. Security When security is a concern, we look to an RMM to provide that extra layer to protect what’s important to us. This is applied through multiple layers and should be done in good practice. Some of the current security measures in place have changed drastically throughout the years. Like any product provided it is almost required to ...