Monitoring
EDR and Endpoint Security
Endpoints are the primary target of cyberattacks. The most conservative estimates indicate that between 68% and 70% of data breaches begin on these devices. This is why implementing an EDR (Endpoint Detection and Response) solution is crucial to protect them in...
Deciphering Distributed Systems: A Complete Guide to Monitoring Strategies
Distributed systems allow projects to be implemented more efficiently and at a lower cost, but require complex processing due to the fact that several nodes are used to process one or more tasks with greater performance in different network...
Apply network management protocols to your organization for better results
To address this issue, first understand that, in the digitization we are experiencing, there are multiple resources and devices that coexist in the same network and that require a set of rules, formats, policies and standards to be able to...
What is Prompt Engineering? Detailed guide
Digital-First has become the trend of organizations in the world and Latin America, in which a digital strategy is chosen first for product and service delivery, especially when a greater impact of the brand is sought more immediately to a...
How to Analyze Problems with Root Cause Analysis – Full Guide
To understand what a Root Cause Analysis (RCA) is, we must start from the fact that a root cause is a factor that causes a non-conformance and must be deleted through process improvement. The root cause is the central issue and the highest-level...
2023 A year of achievements and transformations at Pandora FMS!
On this exciting journey, we celebrate the successes of our team over the course of an incredibly productive year. From solving 2677 development tickets and 2011 support tickets to spending 5680 hours on projects and operations, each metric...
What is SSH?
SSH stands for “Secure Shell.” It's a network protocol used to securely access and manage devices and servers over an unsecured network. It provides an accurate form of authentication as well as encrypted communication between two systems,...
What is the principle of least privilege (PoLP)?
The Principle of Least Privilege, also known as PoLP, is a computer security rule that states that each user or group of users must have only the necessary permissions to perform their corresponding tasks. In other words, the less power a user...
9 ChatOps tips your team should adopt today
Increase team collaboration quality and speed in emergencies with Pandora FMS and ilert's ChatOps features Pandora FMS is an excellent monitoring system that helps collect data, detect anomalies, and monitor devices, infrastructures,...
More modern monitoring: how telemetry and machine learning revolutionize system monitoring
It's time, take your things and let's move on to more modern monitoring. Relax, I know how difficult the changes are for you, but if you were able to accept the arrival of DTT and the euro, you sure got this! But first let us do a little review:...
Pandora FMS transformation: Discover its new interface. Updated, homogeneous and developing
Pandora FMS has changed a lot since its inception, and you, dear reader, may have noticed it. Through effort and hard work it has grown older and become someone strong and capable. As you know, a tool, hard as well as flexible, that recognizes,...
We received ISO/IEC 27001!
We live in an uncertain world and monitoring should try to ensure that whatever happens we will always stay informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy...
What do you know about Pandora FMS Enterprise features?
We have talked many times about the life and miracles of Pandora FMS Enterprise version. We are very proud of it indeed! We are like the father of the kid who wins the football final of the school league or the mother of Halle Berry crying...
Cybersecurity Summit in Madrid: “Europe is already on alert for data to not depend on third parties”
Madrid hosted on October 26th and 27th one of the major international cybersecurity summits. The fair Cyber Security World has brought together large technology companies, public administrations and references from the IT sector to address...
What are Pandora FMS values and code of ethics?
“The Code Ethics of a company” sounds pretty serious right? Something like out of a philosophy masterclass or something your dad would say when scolding you. Maybe something like a TED talk or a day of self reflection. What can we say? In this...
Pandora FMS is now certified Red Hat Enterprise Linux software
In Pandora FMS we are in luck, we now have Pandora FMS RHEL8 software certification. Some called it impossible, others the next step to take, whatever the case everyone received it with applause! But hold on... What is Pandora FMS RHEL8...
Pandora FMS a remedy for drought?
As you know, this summer half of Spain has been on drought alert. A consequence, without a doubt, of the extreme summer heat and rain scarcity. Andalusia was one of the most affected. Therefore, companies and public administrations in the...
Pandora FMS becomes an M81 partner to make IBM i system monitoring easier
Pandora FMS, an international benchmark in system monitoring, becomes technology partner of the French company M81. The French platform has extensive experience in the sector since its creation in 1988 and is currently considered one of the...
The IT company Pandora FMS, the first in Spain to offer a monitoring system integrated with IBM i
The technology company Pandora FMS, specialized in system monitoring, takes a step further towards growth becoming the first national technology capable of offering monitoring solutions, both for IBM i systems (formerly known as AS400) and for...
Would you like to know how Pandora FMS is helping half a million people in Brazil?
More than 500,000 citizens of the working-class district of Povo do Acre, located in the northwest of Brazil, have an Internet connection thanks to the collaboration of the Spanish company Pandora FMS. Pandora FMS brings the Internet to 500,000...
- « Previous
- 1
- 2
- 3
- Next »