Monitoring
Pandora ITSM 105: New Tools for More Efficient IT Management
With the new Pandora ITSM version 105, you now have features designed to improve your workflow and optimize ticket and project management. Content: Key Enhancements in Pandora ITSM 105 Improvements in Management and Security Key Enhancements in Pandora ITSM 105 New...
Pandora FMS and RedHat6, a story that comes to an end in 2022
Today I will tell you a little story, that of good Redhat6 and Pandora FMS, a relationship that endured, on favorable terms, everything it had to endure, but finally fell apart. Calm down, they still will stay as friends. Pandora FMS stops...
What is Role-Based Access Control?
La mayoría de nosotros ha visitado un hotel alguna vez en su vida. Llegamos a recepción, si solicitamos habitación nos entregan una llave, si vamos a visitar un huésped nos conducen a la sala de espera como visitante, si vamos a usar su...
Do you know what BYOD, BYOA, BYOT are? No? You lack experience!
We apologize in advance for this extremely freaky reference: If in the well-known science fiction saga Foundation there was a duty to collect all the information of the galaxy to save it, at Pandora FMS we have assigned ourselves the task of...
Announcement Pandora FMS CVE-2021-44228: The critical Apache Log4j vulnerability
In response to the vulnerability tagged as CVE-2021-44228, known as "Log4Shell", from Artica PFMS we confirm that Pandora FMS does not use this Apache log component and therefore it is not affected. Discovered by the Alibaba security...
You are a sinner (of data management)!
Let's get to the point about data management: Businesses need data, but accumulating too much can be detrimental. Data overcrowding can corrupt IT professionals, turning them into greedy hoarders. Being indigestible with excessive repeated,...
An unknown problem in the data center industry
The current global pandemic of Covid-19 has brought us a few gifts: global desolation, earaches from the rigid rubber bands of the FFP2 masks, applause for Health at eight in the afternoon on the balconies, fear of infected ones and staff...
Absolutely no one is safe from security attacks
Software developers and manufacturers around the world are under attack by cybercriminals. It is not like we are in a time of the year in which they spread more and they barricade themselves in front of the offices, with their evil laptops...
Global pandemic accelerates innovation in the public sector
Having an open, safe and efficient digital administration is the new objective of every Government these years. Although the recent pandemic may have hampered any master plan for system evolution and optimization, there is still some hope. The...
Cyber days are coming to Pandora FMS, here are our discounts!
Who does not know about Cyber days by now? A date that first debuted in November 2005, for the good of all geeks around the world, and that remains to this day as one of the most anticipated events of the year, at least for those of us with...
The Ultimate Combo: Artificial intelligence and data centers
How artificial intelligence helps in data centers Data centers have become an essential element within new technologies, if we add to that the current capabilities of artificial intelligence we have a perfect, superhero pairing, capable of...
What are data centers evolving to?
Closer and closer: the future of data centers “Adapt or die (and let others take your share of the cake)” is both an evolutionary law and a business law. Without going any further, today, the rise of new technologies and critical applications...
ARTICA becomes official CNA
What is a CVE and why is it important for your security? There are "good" hackers. They call themselves security analysts and some even devote their time to working for the common good. They investigate possible vulnerabilities in public and...
What is a data warehouse and what is it for?
Do you already know what a data warehouse is? We would love to say that companies, above all else, value their employees, but it would be as naive as it is false. Yes, because at the top of the companies' scale of values is data. The precious...
Three countries, outside the European Community, that are reforming their privacy policies
Privacy policies in three other countries outside the EU Are you not a little curious? Even a little bit, right under your chin or your temple about how they deal with privacy policies in other countries? Aren’t you? Well, surprise! Today, in...
Data Center VS Cloud, let the fight begin!
The fight of the century: Data Center VS Cloud! Let's go! In this blog we have always been eager for fights or competitions of whatever we please. We are like that, like fierce pokemon trainers who want to finally find out who has the greatest...
Micro data centers, that unstoppable David defeating Goliath again
Reasons why you need micro data centers right now We all remember a couple of biblical allegories here. That of the Good Samaritan, that of The Prodigal Son, that of an Aragonese with new Adidas and the trolleybus on line 8... But the one that...
Uptime/SLA calculator: what is an SLA and how to calculate it?
Content: What is an SLA? What do we want SLAs for? What is the «uptime» or activity time? What are the typical metrics of a supplier? How to calculate the service SLA time? Service monitoring What is an SLA? A Service Level Agreement (SLA) is a...
Monitoring as a service, here we come!
Pandora FMS Monitoring as a service is here! On the way to perfecting its services, Pandora FMS launches one of the most advanced and complete solutions in its history as monitoring software: Monitoring as a Service (MaaS). As we all know by...
Because not only autumn has a place in October: Cybersecurity Awareness Month.
Is Cybersecurity Awareness Month the event of the year? Welcome back to the incredible and majestic Pandora FMS blog. In today's post, we are going to deal with an event belonging to the month of October, that depressing month in which we become...
Key concepts of systems and networks
Together we check out the key concepts of systems and networks In the middle of the information century, who has not surfed the Internet or used a computer, be it a desktop or a laptop? But do you really know what a computer is and what it is...