IT Service Desk

Q&A: NinjaOne’s Josh Schofield on Scaling RMMs with Automation & AI

Expert Insights Interviews Josh Schofield, Director of Product Management at NinjaOne.

Last updated on Feb 17, 2025
Joel Witts
Written by Joel Witts
Josh Schofield NinjaOne
This article will cover

Managing IT securely and scalably is a key challenge for businesses of all sizes and scales. As the risk of cyber-crime continues to rise, it’s critical that users and devices are protected. But employees also expect more freedom than ever before; hybrid and remote workflows are putting more pressure on overstretched IT teams.

It’s no secret that IT teams are stretched thin and overworked. With an ever-growing list of vulnerabilities, constant updates to privacy regulations, evolving endpoint estates, and an increasing number of tools to manage, IT teams’ and MSPs’ workloads only continue to grow, says Josh Schofield, Director of Product Management at NinjaOne.

Expert Insights recently sat down with Scofield to get his insights on the state of the RMM space, how CISOs can find the right RMM solution, and what trends are on the horizon in 2025. This Q&A covers AI, how teams can maximize ROI, and the critical importance of automation for scalability. 

Q. What are the biggest challenges for customers in the RMM space today, and how are threats evolving?

The biggest challenges customers face when it comes to RMMs revolve around the expansive array of devices and data it has to manage, including legacy tooling and complex toolkits, which can cause issues with scalability. As organizations grow, IT should be an enabler of that growth, and customers need to be able to manage and secure their environments with ease, while managing a growing number of remote endpoints. With client demands evolving and heterogenous environments becoming more complex, IT teams need a solution that grows with them, helps them automate the hardest parts of IT, and enables them to maintain efficiency and productivity at scale.

Q. How does the NinjaOne platform help teams address these challenges, and how do you differentiate yourselves from competitors?

It’s no secret that IT teams are stretched thin and overworked. With an ever-growing list of vulnerabilities, constant updates to privacy regulations, evolving endpoint estates, and an increasing number of tools to manage, IT teams’ and MSPs’ workloads only continue to grow. To help them keep pace, NinjaOne’s automated endpoint management platform automates routine tasks, maintains network and device monitoring through real-time alerts, and provides visibility, security and control over all endpoints at any given time –taking the most complex tasks, like managing, deploying, and securing endpoints at scale and keeping them simple, the way they should be.

NinjaOne’s RMM solution comes with built-in automation and a fast, intuitive interface, enabling technicians to accomplish more with less. In fact, 71% of customers replaced more than four tools with NinjaOne. Additionally, NinjaOne makes integrations and partnering with industry leaders a top priority so that IT teams and MSPs can continue using the platforms they’re familiar with, while gaining an even deeper understanding and control of their IT environments.

Q. What are your top recommendations for CISOs in the process of looking for a RMM solution?

CISOs must understand their environment, organization, and the security gaps that need to be addressed. It is critical for all organizations to understand what devices they have in their environment and what’s running or installed on them. From an initial inventory, it’s then possible to continue to advance into managing the environment. If you don’t know where all of your windows are in your house, what’s the point in closing and locking the front door? 

Beyond everything else, CISOs should want to simplify the overall management experience for IT. Allowing for as much automation and streamlining of day-to-day tasks frees up IT to focus on the more complex challenges and ensure the best end-user experience possible.

Q. What trends do you expect to see in the RMM space in 2025?

As we head into 2025, AI is set to become a more essential part of RMM offerings. IT teams will increasingly rely on AI-driven applications to proactively identify and resolve issues before they can impact end-users, helping them improve the Digital Employee eXperience (DEX) while also streamlining everyday IT operations. In this new era, DEX, simplified security, and streamlined IT decision-making will be front and center. By harnessing the power of autonomous endpoint management solutions, IT teams will be able to automate routine tasks such as patch management and enhance proactive threat detection on their remote endpoints to better reduce the time and effort spent on day-to-day IT operations.

Q. In your view, what should organizations’ top RMM planning priorities for 2025 be? 

With wallet share shrinking, choosing an RMM that delivers a low total cost of ownership while maximizing ROI is essential. Organizations will want to look for an RMM tool that accounts for their unique business environment, is easy to implement, learn, and manage, and is ultimately designed to grow alongside their business as they scale.

Many RMMs face high implementation times and costs along with a lot of ongoing maintenance and configuration, often resulting in complex processes and higher onboarding costs for new IT employees. So it is important to not only consider the features and functions available, but also the level of support RMM vendors provide. With IT being a 24/7, 365 role full of unpredictable incidents, organizations need RMM vendors that prioritize their support and resources to drive their own growth and success. Especially for MSPs or smaller IT teams, as business grows and your IT estate changes, it’s important to have an RMM provider who is willing to partner and adapt with you every step of the way.


Further reading:


Written By

Joel Witts is the Content Director at Expert Insights, meaning he oversees all articles published and topics covered. He is an experienced journalist and writer, specialising in identity and access management, Zero Trust, cloud business technologies, and cybersecurity. Joel is a co-host of the Expert Insights Podcast and conducts regular interviews with leading B2B tech industry experts, including directors at Microsoft and Google. Joel holds a First Class Honours degree in Journalism from Cardiff University.