Решение для удаленного мониторинга и управления для проактивного контроля устройств, сетей и приложений. Идеально подходит для поставщиков управляемых услуг (MSP) и ИТ-команд, стремящихся к автоматизации, масштабируемости и контролю в режиме реального времени.
Мощная и гибкая служба поддержки для команд поддержки и обслуживания клиентов, согласованная с процессами библиотеки инфраструктуры информационных технологий (ITIL).
Программное обеспечение для удаленного управления серверами и ОС Windows, Linux и Mac, ориентированное на системных техников и компании, предоставляющие управляемые услуги (MSP).
Augmentez la puissance de votre surveillance. Pandora FMS s’intègre aux principales plateformes et solutions cloud.
Collectez, centralisez et consolidez les données de journaux et d’événements provenant de différents systèmes, applications et appareils dans la plateforme unique qu’est Pandora FMS.
Solution de surveillance et de gestion à distance pour un contrôle proactif des appareils, des réseaux et des applications. Idéale pour les fournisseurs de services gérés (MSP) et les équipes informatiques à la recherche d’automatisation, d’évolutivité et de contrôle en temps réel.
Helpdesk puissant et flexible pour les équipes d’assistance et de service à la clientèle, aligné sur les processus de la bibliothèque d’infrastructure des technologies de l’information (ITIL).
An extensive collection from detailed guides that break down complex topics to insightful whitepapers that offer a deep dive into the technology behind our software.
Expande el poder de tu monitorización. Pandora FMS es flexible y se integra con las principales plataformas y soluciones en la nube.
Recopila, centraliza y consolida los datos de logs y eventos de diferentes sistemas, aplicaciones y dispositivos en una única plataforma. Los datos se integran de forma nativa con Pandora FMS, sin necesidad de herramientas adicionales.
Solución de supervisión y gestión remota para la supervisión proactiva de dispositivos, redes y aplicaciones. Ideal para proveedores de servicios gestionados (MSP) y equipos de TI que buscan automatización, escalabilidad y control en tiempo real.
Potente y Flexible Helpdesk para equipos de soporte y atención al cliente, alineado con los procesos de Biblioteca de Infraestructura de Tecnologías de Información (ITIL).
Expand the power of your monitoring. Pandora FMS is flexible and integrates with the main platforms and cloud solutions.
Collect, centralize, and consolidate log and event data from different systems, applications, and devices into a single platform. Data integrates natively with Pandora FMS agents, with no need for additional tools to capture key information.
Remote monitoring and management solution for proactive oversight of devices, networks, and applications. Ideal for managed service providers (MSP) and IT teams seeking automation, scalability, and real-time control.
Somos unos drogodependientes. No del verde cannabis o del MDMA, necesariamente, pero sí de algunos elementos esparcidos por el globo que sustentan la base de la economía mundial y que necesitamos, como agua de mayo, para que todo siga en orden. La escasez de chips de silicio ya es uno de los problemas más asfixiantes a los que la humanidad se tiene que enfrentar en estos tiempos, te lo contamos en este artículo.
Un nuevo problema mundial: La escasez de chips de silicio
Quizá hubo algún espabilado que lo supo antes, pero, para el resto de los mortales, fue en 2021 cuando quedó al descubierto la cruda dependencia que tiene la industria tecnológica con las fábricas que producen microchips. Sí, esas pequeñas cosas totalmente imprescindibles para el funcionamiento de los dispositivos electrónicos.
Ya puedes empezar a temblar, la escasez de semiconductores, de los chips de silicio, que actúan como la cabeza de los dispositivos informáticos, no nos viene bien. Porque, como deducirás, lo controlan todo en la actualidad, desde tu smartphone hasta el portátil, desde la tablet hasta tu nuevo coche, desde tu lavadora de última generación, hasta la Playstation 5 de tu chiquillo.
¿A qué viene esta crisis de semiconductores?
Como ocurrió con el resto de mercados, las restricciones impuestas por la pandemia obligaron a cerrar muchas de las fábricas que se dedicaban a la producción de estos chips, dificultando así su producción. Y esto no fue lo peor, es que, encima, aumentó la demanda de dispositivos informáticos, ya que todo el mundo estaba encerrado en su casa, necesitando trabajar por remoto o entretenerse con pantallas para no morir del asco haciendo pan o mirando a la pared. A todo esto se le sumó el inevitable retraso en los envíos y los transportes a escala mundial, también la subida del precio del silicio, elemento esencial de los microchips, y de otros componentes que se disputaban, con encono, las grandes potencias mundiales. Por si fuera poco, dos grandes productores de chips, como son Taiwán y China, sufrieron ciertas catástrofes que afectaron gravemente a la capacidad de sus fábricas.
Sabemos que la industria de los semiconductores fluctúa, que es veleidosa y atraviesa con regularidad ciertos ciclos de escasez, pero es que todo ha sucedido al mismo tiempo: dicha naturaleza fluctuante, la alteración de los patrones de demanda y oferta debidos a la pandemia, los desacuerdos entre las grandes potencias, y luego las catástrofes en los países de mayor producción… ¡Ni hecho a posta!
¿Quiénes han sido los peor parados a causa de la escasez?
Uno de los mercados que más se ha visto afectado es el automovilístico. De hecho, la asesoría financiera AlixPartners recuerda que, debido a la escasez de chips, la industria automovilística mundial ha perdido, este pasado 2021, 210.000 millones de dólares en ingresos. Eso son unos 7,7 millones de coches menos.
Pero no solo eso, la escasez de semiconductores también amenazó la disponibilidad de smartphones, tablets y demás cachibaches con microchips en los últimos meses del año pasado, que es, como sabéis, cuando se venden más estas cosas. El tirón de Navidad.
De hecho, la mismísima Apple, durante noviembre, tuvo que elegir entre sus iPads y sus iPhones, desviando los chips que tenía originalmente destinados a los primeros para los segundos, ya que los iPhones se venden más y les resultan más lucrativos. Esto significó que muchas tiendas especializadas en Reino Unido no tuvieran existencias del iPad mini o del iPad básico hasta pasados meses.
Pero ahora viene quizá el sector que más ha reivindicado el problema del silicio, los chips, los semiconductores y todos sus ancestros: el mundillo gamer. Porque el universo se puede hundir con un solo chasquido de Thanos pero que haya sido difícil de conseguir la nueva y flamante PlayStation 5 o la Xbox Series X es imperdonable. Y es que Sony se las vio canutas. Obligada, incluso, a frenar la producción de su producto estrella, la PS5, porque los cientos de chips que la componen resultan demasiado difíciles de conseguir. Lo mismo pasó con el gigante Nintendo, que advirtió, acongojado, que se encontraban en serios problemas. No podía satisfacer la demanda de su nueva consola. Mientras, las tarjetas gráficas de alta gama para juegos de pc todavía siguen siendo difíciles de encontrar. Si la cosa sigue así, en cualquier momento los niños rata, dejan los mando del Call of Duty, salen de su madriguera y van ellos mismos a refinar el silicio.
Si nos vamos al espectro estético, advertimos que si eres calvo pudiste no notarlo, el secador de pelo Supersonic y el moldeador de pelo Airwrap nos han faltado durante meses, ya que Dyson, el gigante tecnológico, sigue mendigando chips entre los pocos suministros que trasiegan a nivel mundial.
Conclusión: ¿Qué pasará en el futuro próximo?
Sí, la cosa está muy malita respecto al abastecimiento de chips y de materiales semiconductores. Aunque, tranquilos, los expertos avisan de que los efectos de la escasez solo tardarán un año en remitir. Habrá mejoras paulatinas, aunque seguramente no se satisfaga toda la demanda antes de 2023.
Muchas empresas, como Intel, han decidido crear nuevas fábricas de chips en Europa, América y Asia para evitar otro desabastecimiento a tal escala. Mientras tanto, medita, haz ejercicio, lee nuestros artículos, revisa tu sistema de seguridad, o intenta que el tira y afloja vuelva como deporte olímpico.
Hello and welcome back to our “Mystery Jet Ski”.
Much better than that Iker Jiménez’s program, which is lasting so long.
Today we will continue with our exhaustive research on the hacker’s world, and we will delve a little deeper into the concept of the “ethical hacker”. Is it true that there are good hackers, who are the so-called “White Hats”, and will Deportivo de La Coruña win the league again?
Do you already know who the so-called “White Hats” are?
In this blog we never tire of saying it: “Nobody is free from EVIL, because EVIL never rests”, and if in previous articles we saw that a bad hacker, roughly speaking, is a person who knows a lot about computers and uses his knowledge to detect security flaws in the computer systems of companies or organizations and take control, today we will see who is the archenemy of the bad hacker or cracker, the superhero of security, networks and programming… “The White Hat Hacker”.
White Hats are “evangelized” hackers who believe in good practice and ethical good, and who use their hacking superpowers to find security vulnerabilities and help fix or shield them, whether in networks, software, or hardware.
On the opposite side would be the “Black Hats”, the bad, knave hacker, who we all know for their evil deeds.
Both hack into systems, but the white hat hacker does it with the goal of favoring/assisting the organization he is working for.
White Hat Hacker = Ethical Hacker
If you thought that hacking and honesty were antonyms, you should know that, within the IT world, they are not.
Unlike black hat hackers, White Hats do their thing, but in an ethical and supervised manner with the goal of improving cybersecurity, not harming it.
And, my friend, there is demand for this.
A White Hat is not short of work, they are hypersolicited as security researchers and freelancers. They are the organizations’ sweet tooth for beefing up their cybersecurity.
Companies take the white hat hacker and put them to hack their systems over and over again. They find and expose vulnerabilities so that the company is prepared for future attacks. They highlight the ease with which a Black Hat could infiltrate, and get into the kitchen, a system, or they look for “back doors” within the encryption determined to safeguard the network.
We could almost consider White Hats as just another IT security engineer or insightful network security analyst within the enterprise.
Some well-known white hat hackers:
Greg Hoglund, “The Machine”. Known mostly for his achievements in malware detection, rootkits and online game hacking. He has worked for the U.S. government and its intelligence service.
Jeff Moss, “Obama’s Right Hand (on the mouse)”. He went on to serve on the U.S. National Security Advisory Council during Obama’s term. Today he serves as a commissioner on the Global Commission on the Stability of Cyberspace.
Dan Kaminsky, “The Competent One”. Known for his great feat of finding a major bug in the DNS protocol. This could have led to a complex cache spoofing attack.
Charlie Miller, “The Messi of hackers”. He became famous for exposing vulnerabilities in the products of famous companies such as Apple. He won the 2008 edition of Pwn2Own, the most important hacking contest in the world.
Richard M. Stallman, “The Hacktivist”. Founder of the GNU project, a free software initiative that is indispensable for an unrestricted understanding of computing. Leader of the free software movement since 1980.
Besides black and white, are there other hats?
We have already talked about the exploits of these White Hats, but what about the aforementioned “Black Hats”? Are there more “Hats”? Let’s see:
Black hats: the black hat hacker is the bad hacker, the computer criminal, the ones we know and automatically associate with the word hacker. The villains of this story. They start, perhaps, as inexperienced Script Kiddie and end up as crackers. Pure slang for how badass they are. Some go freelance, selling malicious tools, others work for criminal organizations as sophisticated as those in the movies.
Gray hats: Right in the middle of computer morality we find these hats, combining the qualities of black and white. They tend, for example, to look for vulnerabilities without the consent of the system owner, but when they find them they let you know.
Blue hats: These are characterized by focusing all their malicious efforts on a specific subject or collective. Spurred perhaps by revenge they master just enough to execute it. They can also be hired to test a particular software for bugs before its release. It is said that their nickname comes from the blue emblem of Microsoft’s curritos.
Red Hats: The Red Hats don’t like the Black Hats at all and act ruthlessly against them. Their vital goal? To destroy every evil plan that the bad hackers have in mind. A good Red Hat will always be on the lookout for Black Hat initiatives, their mission is to intercept and hack the hacker.
Green Hats: These are the “newbies” of the hacking world. They want their hat to mature into an authentic and genuine Black Hat. They will put effort, curiosity and sucking up in such an enterprise. They are often seen grazing in herds within hidden hacker communities asking their elders for everything.
Conclusions
Sorry for the Manichaeism, but we have the White Hat that is good, the Black Hat that is bad, and a few more colorful types of hats that walk between these two poles. I know you’re now imagining hackers sorted by color like pokémons or Power Rangers. If that’s all I’ve accomplished with this article it’s all worth it.
It is always a luxury to show off a new plugin in Pandora FMS, and for that reason we decided to devote an article in style to this Zendesk plugin on our blog. We will discuss what it is and how it can help us. Step by step, and concisely, so that no one gets lost along the way.
New Zendesk plugin added to Pandora FMS
But first: What is Zendesk?
Zendesk is a platform that channels the different communication modes between customer and company through a ticketing system.
A consolidated CRM company, devoted specifically to customer service, which designs software to improve relationships with users. Known for growing and innovating while building bonds and putting down roots in the communities where it lives. Its software, such as Pandora FMS, is very advanced and flexible, being able to adapt to the needs of any growing business.
Zendesk plugin
The plugin we are talking about today allows you to create, update and delete Zendesk tickets from the terminal, or from Pandora FMS console. For that, it makes use of the API of the service, which allows this system to be integrated into other platforms. Using a series of parameters, which would be the configurable options of the ticket, you may customize them as if you were working from Zendesk itself.
Zendesk Ticket System
Zendesk has an integrated ticketing system, with which you may track support tickets, prioritize them and resolve them.
To the point: System configuration to use the plugin.
To make use of the plugin, enable access to the API, either using password or token.
Do it from the API section in the administrator menu.
Plugin parameters
The plugin makes use of a number of parameters when creating, updating or deleting tickets. With them you may configure the ticket according to your own criteria and needs. Just as you would do it from Zendesk’s own system.
Method
-m
With this option you will choose whether to create, update or delete the ticket. Use post to create it, put to update it, and delete to delete it.
IP or hostname
-i
With this alternative you may add the ip or name of your site. Sites usually have this format:
Your username. Usually the email with which you signed up in Zendesk. Use this option, combined with password or token, depending on how you have it enabled.
Password
-p
The password to authenticate with the API.
Token
-t
The token to authenticate to the API. If you use this option, you do not have to use the password option.
Ticket name
-tn
The name to be given to the ticket.
Ticket content
-tb
Ticket text. It should be enclosed in quotation marks.
Ticket ID
-id
Ticket ID. This option is for when you want to update or delete a ticket.
Ticket status
-ts
The status of the ticket, which can be new, open, hold, pending, solved or closed.
Priority
-tp
The priority of the ticket, which can be urgent, high, normal or low.
Type
-tt
The ticket type, which can be problem, incident, question or task.
Ticket creation
By running the plugin with the appropriate parameters you may create tickets:
python3 pandora_zendesk.py -m post -i <ip or site name> -us <user> -t <token> -tn <ticket name> -tb <ticket content> -tp <priority> -tt <type> -ts <ticket status>
Example
With the following command:
python3 pandora_zendesk.py -m post -i pandoraplugin -us alejandro.sanchez@pandorafms.com -t <token> -tn "Problem with X" -tb "Something is giving some problem" -tp urgent -tt task -ts new
Interact with the API and the ticket will be created in your system.
Ticket update
You may update the tickets. The parameters are the same as in creation, but you have to add also the id, which will be the id of the ticket to be updated.
python3 pandora_zendesk.py -m put -i <ip or site name> -us <user> -t <token> -id <id ticket> -tn <ticket name> -tb <ticket content> -tp <priority> -tt <type> -ts <ticket status>
Example:
Let’s update the ticket we created in the example above, which has id #24
With the following command:
We see that the ticket has been updated and moved to pending tickets.
Ticket deletion
You may also delete a ticket by searching it by its ID with the following command:
You will be able to execute the plugin from the console, by means of an alert, which will make the use of the plugin easier.
To that end, go to the menu Commands in alerts:
Inside, create a new command that you will use to create alerts. To achieve this, run the plugin by entering its path and use a macro for each of the parameters used to create a ticket.
Add the description to each of these macros:
Once the command is saved, create an action to which assign this created command:
In each field below (the one of each macro where you have added a description when creating the command), add the value that you would have added to the parameter.
Once you have filled in all the fields of the necessary parameters, click Create.
Once done, go to List of alerts (don’t worry, once configured, you won’t have to repeat the process for each ticket you want to create), and create one.
Designate an agent and a module (it does not matter which one), and assign the action you just created. In the template, set the manual alert.
Once completed, click Add alert.
Now, to run the plugin, go to the view of the agent that you assigned to the alert and you will see it there. You may execute it by clicking the icon Force.
To establish different tickets, go to the action you created and change the values of the fields.
Just as we generated an alert for ticket creation, you may make another to update them and another to delete them to allow the use of the optimized plugin.
More integrations in ticketing services
Apart from Zendesk, there are more ticketing services that can be used from Pandora FMS by using a plugin. These are Redmine and Zammad, which have new plugins with which to create, update and delete tickets in these systems. And Jira and OTRS, which also have a plugin in the library that allows you to use these services easily from Pandora FMS.
Today I will tell you a little story, that of good Redhat6 and Pandora FMS, a relationship that endured, on favorable terms, everything it had to endure, but finally fell apart. Calm down, they still will stay as friends.
Pandora FMS stops supporting RedHat6 this 2022
Redhat6 was once the generation of Red Hat’s complete set of operating systems, designed for mission-critical enterprise computing and certified by leading enterprise software and hardware providers. Many systems were based on Rhel6. Among them we highlight CentOS, which in its day, was a derivation, a kind of free clone of Redhat, with the same life cycle.
As many of us know, CentOS 6 reached the end of its official life cycle, on November 30th, 2020, so it is a system that has been obsolete for more than a year. However, we, Pandora FMS, have maintained a year of extended support (2021) for these systems to make transition and migration from CentOS 6-based systems to systems based on CentOS 7 or the latest RedHat 8 easier. But this is over by 2022.
The Future of RedHat
What will happen now? Well, let’s talk about RedHat Enterprise Linux 8. Because the most cutting-edge IT is hybrid IT. And in order to transform a system into a hybrid environment, from data centers to Cloud services, certain formalities are needed. Like an adaptable scalability. Seamless workload transfer. Application development… And, of course, RedHat already has an operating system that meets all these requirements, the path to its future is RedHat 8. Cutting-edge technology that adapts to businesses and has the essential features, “from container tools to compatibility with graphic processing units”, to launch tomorrow’s technology today.
Some alternatives to CentOS
Are there any alternatives for team administrators who already moved on? Well, we have some candidates and we know them well because we support them.
RHEL for Open Source Infrastructure: RedHat itself launched this alternative to the community so that no one would sigh for the death of CentOS, even so we are facing a clone of RHEL.
Rocky Linux: It was developed by Greg Kurtzer and named after Rocky McGough. During its first 12 hours of life online, it was downloaded 10,000 times.
AlmaLinux: Although now managed by its own foundation,AlmaLinux was launched in its day by those responsible for CloudLinux. Since its inception it was claimed by many as the best positioned successor to CentOS, now its version 8.5 is the proposed exact copy of RHEL 8.5.
If you have to monitor more than 100 devices, you may also enjoy a Pandora FMS Enterprise FREE 30-day TRIAL. Cloud or On-Premise installation, you choose!! Get it here.
Finally, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here. Don’t hesitate to send us your questions. Pandora FMS team will be happy to help you!
La mayoría de nosotros ha visitado un hotel alguna vez en su vida. Llegamos a recepción, si solicitamos habitación nos entregan una llave, si vamos a visitar un huésped nos conducen a la sala de espera como visitante, si vamos a usar su restaurante nos etiquetan como comensal o si asistimos a una conferencia sobre tecnología vamos a su salón principal. No se da el caso de que terminemos en la piscina o entremos a la lavandería por una razón muy importante: nos asignaron un rol al llegar.
¿Sabes qué es el Control de Acceso Basado en Roles o RBAC?
En el campo de la informática también, desde sus inicios, todo esto se ha tenido en cuenta, pero recordemos que las primeras máquinas eran sumamente costosas y limitadas, así que tuvimos que conformarnos con recursos más simples y sencillos antes de que llegara el Control de Acceso Basado en Roles (en inglés RBAC).
Lista de control de acceso
En el año 1965 existió un sistema operativo de tiempo compartido llamado Multics (creación de los Laboratorios Bell y el Instituto Tecnológico de Massachusetts) el cual fue el primero en utilizar access-control list (ACL). Yo ni siquiera había nacido en esa época así que doy un voto de confianza a Wikipedia por esta información. Lo que sí conozco, de primera mano, es la lista de control de acceso a sistema de ficheros (en inglés filesystem ACL) que usaba Netware Novell® a principios de 1990 y de la que ya os hablé en un anterior artículo en este mismo blog.
Pero volvamos a la lista de control de acceso: ¿Qué es un control de acceso (access control)? Esto es lo más sencillo de explicar, es, nada más y nada menos, que una simple restricción a un usuario respecto a un recurso. Ya sea por medio de una contraseña, una llave física o incluso sus valores biométricos, como la huella digital, por ejemplo.
Una lista de control de acceso entonces es anotar a cada uno de los usuarios que pueden acceder (explícitamente permitido) o no (explícitamente prohibido, bajo ningún aspecto). Como ya imagináis, esto, se vuelve tedioso, estar pendiente de anotar uno por uno a los usuarios y también de los procesos propios de sistema operativo o de los programas que se ejecuten sobre él… Ya veis, vaya lío anotar todas las entradas, conocidas en inglés como access-control entries (ACEs).
Siguiendo el ejemplo de derechos sobre ficheros, directorios y más allá (tales como recursos completos: discos ópticos o «disco duros» enteros) fue que llegué a trabajar, el siglo pasado, con Netware Novell®. Esto es un Filesystem ACL (Network File System access-control list). Luego vino, superado el susto del milenio, el NFS ACL versión 4 que recogió y amplió, de manera normalizada, todo lo que habíamos usado desde 1989 cuando el RFC 1094 estableció el Network File System Protocol Specification. Considero que he resumido muchísimo y debería nombrar, al menos, el uso que le da MS Windows® a las ACL por medio de su Active Directory (AD), las Networking ACL para los casos de hardware de red (enrutadores, concentradores, etc.) y las implementaciones que hacen algunas bases de datos.
Todas estas tecnologías, y más, echan mano del concepto de listas de control de acceso, y como todo en la vida evoluciona pues surgió el concepto de grupos que compartían algunas similitudes, y se podía así ahorrar trabajo manteniendo al día las listas de acceso. Ahora imaginad que tenemos una, o más listas de control de acceso, que sólo admiten grupos. Pues bien, en 1997 un señor llamado John Barkley demostró que este tipo de listas equivale a un mínimo Control de Acceso Basado en Roles, pero RBAC al fin y al cabo, lo cual nos lleva al meollo del asunto…
Role-based access control RBAC
El concepto de rol en la RBAC va más allá de los permisos, también pueden ser unas habilidades bien delimitadas. Además, se pueden tener varios roles asignados, según sea la necesidad del protagonista (usuario, software, hardware…). Volviendo al ejemplo del departamento de cobro. Un vendedor, que ya tiene un rol correspondiente como tal, también podría tener un rol en cobro para analizar el pago de los clientes y enfocar sus ventas en los solventes. Con los roles esto es relativamente sencillo de hacer.
Beneficios de RBAC
• Primero que nada, RBAC disminuye muchísimo los riesgos de brecha de seguridad y fugas de datos. Si los roles fueron creados y asignados con rigor, está garantizado el retorno de la inversión del trabajo realizado en RBAC.
• Reduce costos al asignar más de un rol a un usuario. Es innecesario comprar ordenadores virtuales nuevos si pueden compartir con grupos ya creados. Dejad que Pandora FMS monitorice y os proporcione información para tomar decisiones acerca de redistribuir la carga horaria o, llegado el caso y solo de ser necesario, adquirid más recursos.
• Regulaciones federales, estatales, o locales sobre privacidad o confidencialidad pueden ser exigidas a las empresas, y las RBAC pueden ser una gran ayuda para cumplir y hacer cumplir dichas exigencias.
• Las RBAC no solamente ayudan a la eficiencia en las empresas cuando se contratan nuevos empleados, también ayudan cuando terceros realizan trabajos de seguridad, auditorías, etc. porque de antemano, y sin conocer realmente quién o quiénes vendrán, ya tendrán su espacio de trabajo bien delimitado en uno o varios roles combinados.
Desventajas de RBAC
• El número de roles puede crecer de manera vertiginosa. Si una empresa tiene 5 departamentos y 20 funciones podemos tener hasta un máximo de 100 roles.
• Complejidad. Tal vez sea esto lo más difícil: identificar y asignar todos los mecanismos establecidos en la empresa y traducirlos en RBAC. Esto requiere de mucha labor.
• Cuando un sujeto necesita ampliar sus permisos de manera temporal, las RABC pueden convertirse en una cadena difícil de romper. Para esto Pandora FMS propone una alternativa que explico en la siguiente sección.
Reglas de RBAC
Para aprovechar al máximo las ventajas del modelo RBAC, el desarrollo del concepto de roles y autorizaciones es siempre lo primero. Es importante que el manejo de identidades para poder asignar estos roles sea hecho también de una manera estandarizada, para ello la norma ISO/IEC 24760-1 del año 2011 intenta lidiar con ello.
Hay tres reglas de oro para las RBAC que deben ser vistas ordenadas en el tiempo y aplicadas en su debido momento:
1. Asignación de roles: Una persona puede ejercer un permiso sólo si se le ha asignado un rol.
2. Autorización de roles: El rol activo de una persona debe estar autorizado para esa persona. Junto con la regla número uno, esta regla garantiza que los usuarios solo pueden asumir los roles para los que están autorizados.
3. Autorización de permisos: Una persona puede ejercer un permiso sólo si el permiso está autorizado para el rol activo del sujeto. Junto con las reglas uno y dos, esta regla garantiza que los usuarios sólo pueden ejercer los permisos para los que están autorizados.
La versión Enterprise de Pandora FMS dispone de un RBAC ultra completo y de mecanismos de autenticación como LDAP o AD, además de mecanismos de doble autenticación con Google® Auth. Además, con el sistema de etiquetas o tags que maneja Pandora FMS podemos combinar RBAC con ABAC. El attribute-based access control es similar al RBAC pero en vez de roles está basado en atributos del usuario. En este caso, etiquetas asignadas, aunque pudieran ser otros valores como ubicación o años de experiencia dentro de la empresa, por ejemplo.
Pero eso, eso queda para otro artículo…
Antes de despedirnos, recuerda que Pandora FMS es un software de monitorización flexible, capaz de monitorizar dispositivos, infraestructuras, aplicaciones, servicios y procesos de negocio.
¿Quieres conocer mejor qué es lo que Pandora FMS puede ofrecerte? Descúbrelo entrando aquí: https://pandorafms.com/es
Si cuentas con más de 100 dispositivos para monitorizar puedes contactar con nosotros a través del siguiente formulario: https://pandorafms.com/es/contactar/
Además, recuerda que si tus necesidades de monitorización son más limitadas tienes a tu disposición la versión OpenSource de Pandora FMS. Encuentra más información aquí: https://pandorafms.org/es/
No dudes en enviar tus consultas. ¡El equipazo de Pandora FMS estará encantado de atenderte!
We apologize in advance for this extremely freaky reference: If in the well-known science fiction saga Foundation there was a duty to collect all the information of the galaxy to save it, at Pandora FMS we have assigned ourselves the task of making a glossary worthy enough with all the “What are” and the “What is” of technology. And today, without further delay or freakiness, it’s time to define the acronyms: BYOD, BYOA, BYOT.
* Warning to (very) lost sailors: This “Byo-” has NOTHING to do with that other prefix element, “Bio”. Thank you. Get back to your beloved diet
That means indeed: “Bring your own tech from home, kid”. This is what BYOT means. A policy that allows employees to bring their own electronic devices, personal ones, from home to work.
This has advantages even if you don’t imagine it. And the top companies each give their distinctive approach to implementing such a policy. Some offer employees remuneration to purchase such technology. Other companies think better of it and expect their employees to put up with half or all of the expenses. Some even spend the money but then they demand for employees to pay for some services separately, such as phone service or data…
In any case, no matter how you buy your new devices or whoever pays for the Internet that month, if the device is connected to a corporate network, a highly professional IT department must secure and manage the device.
BYOD (Bring your own device)
Correct. You have translated well: “Use your own device from home, kid”. This term refers again, although on a different scale, to the tendency of employees to use personal devices to work and connect to their company’s networks, access their systems or relevant data. You know what we mean when we talk about “personal devices”… your smartphone, your laptop, your tablet or, I don’t know, your 4-gigabyte USB.
The truth is that this rings a bell, companies, and especially since this terrible pandemic, now support teleworking. BYOD is here, more and more, working from home, maintaining a flexible schedule, including trips and urgent departures, in the middle of the morning, to get a Coke or to pick up your kid from school.
As it could not be otherwise, for the directives of your company the security of your BYOD is a crucial issue. Because for you it can be a whole morale boost, even on productivity, the fact of working with your trustworthy device, but if the IT department does not take care of checking it before, the access of your personal devices to the company network can raise serious security concerns.
The best thing in this case is to establish a policy where it is decided whether the IT department is going to protect personal devices and, if so, how it is going to determine the access levels. Approving types of devices, defining security policies and data ownership, calculating the levels of IT support granted to BYOD… Then informing and educating employees on how to use their devices without ultimately compromising company data or networks. Those would be the steps to follow.
Studies show that there is higher productivity for employees using BYOD. Nothing less than a 16% increase in productivity in a normal workweek, for those who work forty hours. It also increases job satisfaction and the fact that new hires decide to stay through a flexible work arrangement. Employee efficiency is higher due to the comfort and confidence they have in their own devices. Technologies are integrated without the need to spend on new hardware, software licenses or device maintenance…
Everything looks wonderful, although there are also certain disadvantages as usual. Data breaches are more likely due to theft or loss of personal devices, as well as employee dismissal or departure. Mismanagement of firewalls or antivirus on devices by employees. Increased IT costs, and possible Internet failures.
BYOA (Bring your own application)
And what’s that? BYOA is basically the tendency of employees to use third-party applications and Cloud services at work.
As we know, mobile devices, owned by employees, have personal-use applications installed. However, they access these applications and different services through the corporate network. Well, this is the aforementioned BYOA.
There are benefits, of course. All those who may be listening to Spotify or using your own Google Drive without paying directly for the Internet. However, the higher the BYOA, like the higher BYOD and BYOT, the bigger the security holes in your organization. No one suffers more than a company’s IT department when it comes to thinking about how vulnerable corporate data can be. Especially when they are stored in the Cloud.
Conclusions
BYOT, BYOD, BYOA solutions are very efficient in the way an employee works. High morals, high practicity, and high productivity. However, well, they do pose certain cracks in the corporate network. Sensitive data and unsupported/unsecured personal devices, sometimes are not the best combination.
“BYO” products have advantages but they need a seasoned, conscious, proactive IT department, always protected by management policies of BYOT, BYOD, BYOA.
If you have to monitor more than 100 devices, you may also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
In response to the vulnerability tagged as CVE-2021-44228, known as “Log4Shell”, from Artica PFMS we confirm that Pandora FMS does not use this Apache log component and therefore it is not affected.
Discovered by the Alibaba security team, the problem refers to a case of remote execution of unauthenticated code (RCE) in any application that uses this open source utility and affects unpatched versions, from Apache Log4j 2.0-beta9 up to 2.14. 1.
It is true that if we used it, we would be compromised, but fortunately it is a dependency that is not necessary for the operation of our product.
In turn, we must also state that the Elasticsearch component for the log collection feature is potentially affected by CVE-2021-44228.
Recommended solution
There is, however, a solution recommended by the Elasticsearch developers:
1) You can upgrade to a JDK later than 8 to achieve at least partial mitigation.
2) Follow the Elasticsearch instructions from the developer and upgrade to Elasticsearch 6.8.21. or 7,16,1 superior.
Additional solution
In case you can’t update your version here we show you an additional method to solve the same problem:
Disable formatMessageLookup as follows:
Stop the Elasticsearch service.
Add -Dlog4j2.formatMsgNoLookups = true to the log4j part of /etc/elasticsearch/jvm.options
Restart the Elasticsearch service.
In the event of any other eventuality we will keep you informed.
Let’s get to the point about data management: Businesses need data, but accumulating too much can be detrimental. Data overcrowding can corrupt IT professionals, turning them into greedy hoarders. Being indigestible with excessive repeated, outdated or banal information, the so-called ROT data, is bad. Companies of the world! The Devil tempts you with Big Data! Something that, if too much, could be harmful! We tell you all about it in this article.
The five mistakes we make in data management
The Liturgical Department of Pandora FMS, because yes, we have a Liturgical Department, right next to the Communication Department, has counted these past weeks the most despicable and sinful faults within data management. We counted up to five sins. Relax, they are not normally committed by a single offender, they are usually mini-points accumulated, over time, by several members of a team. However, we are going to list these vices so that you can count the ones you carry on your own. The scale is this:
One fault committed: Sinner.
Two faults committed: Great sinner.
Three faults committed: Excessive sinner.
Four: On the doorway to hell.
Five: You will burn in hell as the Great Grimoire points its tridents at you.
First offense:
You and your company have an ungovernable desire for data. You end up collecting an immensity of them in the hope of achieving the greatest possible advance. However, unfortunately, finding something worthwhile among such a wealth of information is like finding the broom in a student flat: a very difficult task.
Second offense:
Do you know when you have had the lunch of your life in the trendiest burger joint and despite being full, you order the dessert menu to see what cheese cake they have? Well, data excess, and the consumption of all the data you may swallow without a planned purpose, is comparable. That’s right, without a narrow archiving process, a company’s eager urge to fagotize data ends up in a bundle of unnecessary, outdated, and useless data.
Third offense:
Greed overcomes you! And you start hoarding and hoarding, carried away by greed. In the end, this leads to spending money on more hardware, the most cutting-edge on the market, to process and store all that mass of data you accumulate. You do that instead of finding a reliable process to classify, archive, and remove junk data.
Fourth offense:
Due to the massive amount of data that you have, you are lazily and slowly carrying out your queries and your processes. Indeed, the more data you accumulate, you and your company, the more time it will take to process it and make, for example, backups.
Fifth offense:
A company can feel more secure and stable the more data it has, however, the truth is different, the more data it has, the higher the concern. Having the barrel of data completely full does not mean anything if in fact those data are not used correctly.
Recovery Point Objective (RPO) and Recovery Time Objective (RTO)
How many faults/sins have you accumulated from this list? Have you raised your hand many times yelling “Yes, I am guilty”? Well, before you burn in hell, I want to tell you that there is a plan to escape its cauldrons: find and set a recovery point objective (RPO) and a recovery time objective (RTO). Yes, sir, that’s the first step! The RPO defines a tolerable amount of data loss before a company cannot recover. And the RTO, on the other hand, marks the time that data professionals need to recover the data without getting the business in an irreparable state. To give you an idea, one of the ways to expand the RPO is to backup data logs. However, large amounts of data can make backup times too long, putting our company in a bind again. That is why there is no need to accumulate so much useless data.
Do not mistake a recovery plan with a backup plan. You should first create a recovery plan and then prepare your backup plan. The backup plan will nuance your RTO and RPO goals, while the recovery plan will address disaster recovery and high availability objectives.
Conclusions
Today in this blog we learned that data excess can be an indication of a failed business plan and we have exposed the five mistakes that usually cause the increase of this unnecessary data. From everything we have concluded that the best thing is to have a purpose to reach with that data and to have a manageable amount of it, thus allowing professionals to operate in a simpler way.
Money is not the answer, paying for new hardware always seems like the solution but sometimes it is just a sign that your company is not competent enough. Knowing about these problems and finding a solution can save time and money.
Would you like to find out more about what Pandora FMS can offer you? Learn more by clicking here. If you have to monitor more than 100 devices, you may also enjoy a Pandora FMS Enterprise FREE 30-day TRIAL. Cloud or On-Premise installation, you choose!! Get it here.
Finally, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Learn more information here.
Do not hesitate to send us your questions. The great team behind Pandora FMS will be happy to assist you!And if you want to keep up with all our news and you like IT, releases and, of course, monitoring, we wait for you in our blog and in our different social networks, from Linkedin to Twitter going through the unforgettable Facebook. We even have a Youtube channel with the best narrators. Oh, we almost forgot, we also have a new Instagram channel! Follow our account, we still have a long way to go to match that of Billie Eilish.
The current global pandemic of Covid-19 has brought us a few gifts: global desolation, earaches from the rigid rubber bands of the FFP2 masks, applause for Health at eight in the afternoon on the balconies, fear of infected ones and staff shortage in the data center industry and shortage of IT professionals. In this article we will delve into this last topic.
*We will already devote a double-page report to the saw rubbers of the FFP2
Lack of staff in the data center industry
It is like that how our beloved pandemic has turned the world upside down, at so many levels that even the data center sector has noticed it. Data centers have received an unexpected amount of work due to the reinterpretation of the labor system and telecommuting. In fact, the size of the global data center industry has grown dramatically. This is a direct consequence of higher exposure and need for the Internet, which has come hand in hand with the confinement imposed by governments around the world to fight against infections. That way, it is estimated that the size of the world data center market will reach in the near future (2021-2026), nothing more and nothing less, than 251,000 million dollars.
Source: Uptime Institute Intelligence
And what is the growth of the global data center market leading to? Well, to a proportionally direct and parallel need of professionals in the sector. Estimates from the Uptime Institute, the long-standing champion of digital infrastructure performance, suggest that the number of staff required to manage data centers across the globe will rise from about two million today to nearly 2.3 million in three years.
This turns into countless new technical jobs for the data center industry. Of all types and sizes. With different requirements. From design to operation. And around the world.
You still don’t want to go send resumes?
Why the shortage of IT professionals and other personnel in the data center sector?
Well, just as remote regions are fighting for the repopulation of their villages, this sector is already dealing with the lack of personnel. It is not an easy subject. According to the Uptime Institute, it is very difficult to find suitable candidates for vacant positions at the moment, so if you want to look for a job in your domain, you must be prepared. Although, as it is often the case, in most positions, work experience, internships or work-study training may make up for a certain lack of skill and experience.
With much of the tech industry currently struggling to find qualified staff, data centers are finding it a bit more difficult to locate and hire professionals in high-demand roles. Like power systems technicians and analysts, facilities control specialists, or robotics technologists, or as I call them “Robotechnologists.”
If you’re serious about it and want to be one of the data centers, success in your quest requires a combination of special skills. Yes, exactly, like when you want to be a ninja or a neo noir detective. First, extensive infrastructure knowledge is required. If you have boards with mechanical or electrical equipment, the better. Programming, platform management, specific technological tools… Basic technological knowledge is also very important. In addition, as in the ninja world or in neo-noir crimes, data centers need specialists with practical determination and ample capacity to solve problems, critical thinking, a drive for business objectives, and, not least to know how to behave, both in teamwork and customer service. For all this string of skills and qualities it is making it difficult for them, in the data center industry, to find personnel. But, well, what can we do? There have also been few Fujibayashi Nagato (ninja) and Sam Spade (detective).
As a result, many data centers today are understaffed. They are overloaded, with more job vacancies than people ready to apply for them. And this without taking into account the high demand, outside the data center sector, for professionals with knowledge of computer science and software. The reality is like this, everyone needs a tech expert among their ranks, and sometimes you have to fight for them.
Source: Uptime Institute Intelligence
Debido al cataclismo mundial del Covid-19 y la recesión que ha traído, el estilo de trabajo ha cambiado, trayéndonos de súbito el teletrabajo y las operaciones remotas. Esto ha supuesto que los servicios de los centros de datos incrementen su rendimiento para que las empresas de todo el planeta pudieran operar. Los centros de datos están en un punto crítico. Tienen más trabajo pero menos personal especializado para realizarlo. Además, en estos tiempos, resulta bastante difícil encontrar a una plantilla a la altura. Quizá con la adopción de La Nube y nuevos avances en la tecnología digital se pueda cimentar un sistema, post-Covid-19, que lleve a las empresas hacia un futuro próspero.
Some conclusions
Due to the global cataclysm of Covid-19 and the recession it has brought, work style has changed, suddenly bringing us telecommuting and remote operations. This has meant that data center services increase their performance so that companies around the world could operate. Data centers are at a critical point. They have more work but less specialized personnel to do it. In addition, these days, it is quite difficult to find a team to match. Perhaps with the adoption of the Cloud and new advances in digital technology, a system, post-Covid-19, can be established that will lead companies towards a prosperous future.
If you have to monitor more than 100 devices, you may also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Software developers and manufacturers around the world are under attack by cybercriminals. It is not like we are in a time of the year in which they spread more and they barricade themselves in front of the offices, with their evil laptops seeking to blow everything up, no. They are actually always there, trying to violate information security, and in this article we are going to give you a little advice on the subject.
No one is safe from all threats
Whether it is a middling attack or sophisticated and destructive (as it happened to our competitorsSolarwinds andKaseya) evil never rests. The whole industry faces an increasingly infuriating threat landscape. Almost every day we wake up with some news of an unforeseen cyber attack that brings with it the consequent wave of urgent and necessary updates so that our system is safe… Nobody is spared, real giants have fallen over. The complexity of the current software ecosystem means that a vulnerability in a small library affects hundreds of applications. It happened in the past (openssh,openssl, zlib, glibc…) and it will continue to happen.
As we pointed out, these attacks can be very sophisticated or they can be the result of a combination of third-party weaknesses that make the client vulnerable, not because of the software, but because of some of the components in its environment. That’s why IT professionals should demand that their software vendors take security seriously, both from an engineering standpoint and from vulnerability management.
We repeat: No one is safe from all threats. The software vendor that took others out of business yesterday may very likely be tomorrow’s new victim. Yes, the other day it was Kaseya, tomorrow it could be us. No matter what we do, there is no 100% security, no one can guarantee it. The question is not to prevent something bad from happening, the question is how to manage that situation and get out of it.
Pandora FMS and ISM ISO 27001
Any software vendor can be attacked and each vendor must take the necessary additional measures to protect itself and its users. Pandora FMS encourages our current and future clients to ask their suppliers for more consideration in this matter. We include ourselves.
Pandora FMS has always taken security very seriously, so much so that for years we have had a public policy of “Vulnerability disclosure policy” and Artica PFMS as a company, is certified with the ISO 27001. We periodically employ code audit tools and maintain some modified versions of common libraries locally.
In 2021, in face of the security demand, we decided to go one step further, and make ourselvesCNAofCVE, to give a much more direct response to software vulnerabilities reported by independent auditors.
Decalogue of PFMS for better information security
When a client asks us whether Pandora FMS is safe, sometimes we remind them of all this information, but it is not enough. Therefore, today we want to go further and prepare a decalogue of revealing questions on the subject. Because some software developers take security a little more seriously than others. Relax, these questions and their corresponding answers are valid for both Microsoft and Frank’s Software or whatever thing you may have. Since security does not distinguish between big, small, shy or marketing experts.
Is there a specific space for security within your software life cycle?
At Pandora FMS, we have an AGILE philosophy with sprints (releases) every four weeks, and we have a specific category for security tickets. These have a different priority, a different validation cycle (QA) and of course, a totally different management, since they involve external actors in some cases (through CVE).
Is your CICD and code versioning system located in a safe environment and do you have specific security measures to ensure it?
We use Gitlab internally, on a server in our physical offices in Madrid. People with name and surname, and unique username and password have access to it. No matter what country they are in, their access through VPN is individually controlled and this server cannot be accessed any other way. Our office is protected by a biometric access system and the server room with a key that only two people have.
Does the developer have an ISMS? (Security Incident Management System)
Artica PFMS, the company behind Pandora FMS, is certified with ISO 27001 almost from its beginnings. Our first certification was in 2009. ISO 27001 certifies that there is an ISMS as such in the organization.
Does the developer have a contingency plan?
We not only have one, we have had to use it several times. With COVID, we went from 40 people working in an office in Gran Via (Madrid) to each and everyone of them working at home. We had power outages (for weeks), server fires and many other incidents that put us to the test.
Does the developer company have a security incident communication plan that includes its customers?
It has not happened many times, but we have had to release an urgent security patch, and we have notified our clients in a timely manner.
Is there an atomic and nominal traceability on code changes?
The good thing about code repositories, like GIT, is that these kinds of issues have been solved for a long time. It is impossible to develop software professionally today if tools like GIT are not fully integrated into the organization, and not only into the development team, but also into the QA, support, engineering… teams.
Do you have a reliable update distribution system with digital certifications?
Our update system (Update Manager) distributes packages with digital certificates. It is a private system, duly secured and with its own technology.
Do you have an open public vulnerability disclosure policy?
Do you have an Open Source policy that allows the customer to see and audit the application code if necessary?
Our code is open, anyone can review it athttps://github.com/pandorafms/pandorafms. In addition, some of our customers ask us to audit the source code of the Enterprise version and we are delighted to be able to do so.
Do the components/third-party purchases meet the same standards as the rest of the parts of the application?
Yes they do, and when they do not comply, we maintain them ourselves.
BONUS TRACK:
Does the company have any ISO Quality certification?
ISO 27001
Does the company have any specific safety certification?
National Security Scheme, basic level.
Conclusion
Pandora FMS is ready for EVERYTHING! Just kidding, as we have said, everyone in this sector is vulnerable, and of course the questions in this decalogue are elaborated with certain cunning, after all, we had solid and truthful answers prepared in advance for them, however, the real question is: Do all software vendors have answers to those questions?
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
Having an open, safe and efficient digital administration is the new objective of every Government these years. Although the recent pandemic may have hampered any master plan for system evolution and optimization, there is still some hope. The hybrid Cloud reaches the public sector, among other advances. We’ll tell you all about it in our blog!
The pandemic strengthens the hybrid cloud in the public sector
“The Cloud”, that abstract fantasy, has made possible large-scale government teleworking (so much so that “IDC ensures that 74% of government organizations worldwide will switch to remote work in the future”), in addition to giving institutions the opportunity to test new applications and experiment with them. Being the advantages of scalability and the safety benefits the first objectives.
The public sector, like so many others, got down to work when the shackles of Covid-19 fell on them. Like concert halls or gyms, they had to get reinvented, and soon after new online platforms arrived and heavy investments were made in Artificial Intelligence, Cloud-based management systems and other transformative solutions that give a break to organisms collapsed by difficult conditions. In fact, IDC Research Spain has confirmed that “40% of the public sector already works in a hybrid cloud environment compared to 90% of private companies”. This shows, indeed, that Public Administrations are heading towards new models.
The Hybrid Cloud in the public sector
So, we can say that damn Covid-19 accelerated not only masks sales, but also the adaptation of the most cutting-edge technologies to governments. They were suddenly aware, for example, as we say, of the possibilities of the Hybrid Cloud. Due, of course, to the rising popularity of hybrid IT environments; that although we know that they can be difficult to manage at high scale, and that they require specific capacities, they will always be welcome from now on.
What caused the skepticism regarding Hybrid Cloud in the public sector? Well, surely it was because the governmental institutions throughout the planet faced several and notorious obstacles related to the subject. Ensuring a high-performance infrastructure is no easy task, for example. Certain types of traditional monitoring technologies do not work in such heterogeneous ecosystems. In addition, sometimes, the speed at which some tools are deployed in the Cloud can lead to security problems.
Optimize Hybrid Cloud Management in the public sector
But is it all over? Do governments have nothing to say in the face of these “different and notorious obstacles”? Relax, as the highest paid coaches and cartoon heroes show us, there is always hope, even to optimizehybrid Cloud management in the public sector.
A new approach
From Pandora FMS, a company devoted to delivering the best monitoring software in the world, we tell you: NOT ALL MONITORING TECHNOLOGIES WORK THE SAME.. Many are either designed for local data centers or for the Cloud, but not both. This is where lots of improvements can be made and IT experts must intervene, especially to prioritize a plan for monitoring hybrid environments. Always with a vision of the general state of the systems, the performance and the security of the network, the databases, the applications, etc. It seems that no one had the time or the necessary skills for this task, which ends up exposing organizations, especially regarding security.
The hybrid network
After being aware that investing time and efforts in Cloud services is necessary, the idea that connectivity and network performance are a key factor will come hand in hand, at least to guarantee the provision of quality services.
So we must address issues such as network latency, increased cloud traffic, interruption prevention, and any other problem, before they affect us and the end user.
It goes without saying that Software-defined wide-area network (SD-WAN) technologies play an obvious role in hybrid technologies and can help simplify network management tasks and avoid network overload.
Beware of identity and access control
No, it is not crazy to monitor who has access to what. We do it here and call it “Standard Security Practice”. However, when everything becomes a hodgepodge of employees/users/everyone having access, and you interact with data from a large number of sources, things get a bit complicated.
Indeed, rushing is not good at all, and the implementation of the Cloud is wished right away, “immediately”, so access controls sometimes bear the brunt and remain a vulnerable point. So, you only have to take your chances on multi-factor authentication, as an improved official replacement for passwords for digital access.
Zero-trust frameworks, network segmentation, and new security practices for the provider are other healthy practices to better be safe than sorry and help protect the assets hosted in our hybrid environment.
New skills, new mindset
Big changes need small changes. The capabilities and skills that are necessary for managing the hybrid Cloud are far from those that are needed for a local infrastructure. The data center is already an abstraction of what it was and what IT teams know well. Technology is the future, but also the most current present, and if government institutions do not develop the adequate and necessary capacities to support such technology, there will be neither a well-managed hybrid cloud, nor anything to do in areas such as monitoring and security.
Conclusions
As we started saying, the global pandemic of Covid-19 has justified and potentiated the modernization of technology, and accelerated adaptation to the Cloud and IT environments, but there is still a long way to go for these services to be really used by institutions and their citizens. And this should be a priority, as well as its good performance, accessibility and security. At the appropriate time, supported by the necessary investment and work, I am sure the Cloud will reveal itself in all its splendor showing us its full potential.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
Who does not know about Cyber days by now? A date that first debuted in November 2005, for the good of all geeks around the world, and that remains to this day as one of the most anticipated events of the year, at least for those of us with minimal technological ambition.
Cyber days in Pandora FMS: 25% less in our training
In a company where we are devoted to monitoring systems and networks with the best software created for this, Pandora FMS, we were not going to be less, therefore, we now show our cards on the table and show you our hot sale for these cyberdays.
Cyber days in Pandora FMS: 25% off in our training
That is, Pandora FMS offers a25% discount on its training courses until December 31, with its corresponding official certification.
The objective of PAT training courses is to help you learn how to install Pandora FMS, teach you to monitor remotely and locally (with agents) and manage Pandora FMS features such as events, alerts, reports, graphical user views, network recognition..
On the other hand, PAE training courses will teach you to carry out advanced monitoring, in distributed architectures, and high availability environments, operate with plugins (server and agent) and use Pandora FMS monitoring policy system and manage Pandora FMS services.
Cyber Days Promotion: 25% off in packs
We’re going to show you our incredible promotion packs for the next Cyber Days, made up of the course taught, access to e-learning and the exams for the official certification.
Other options
But, we do not only offer packs, we also show you other options separately: the PAT/PAE exams, access to our e-learning platform and the magnificent and demanded customized courses, for specific needs. If you want to join the latter, first check with our professionals, since they cannot be taught online.
Our software
Many of you know our software, Pandora FMS. It is one of the most powerful and flexible ones out there in the market, and it offers several possibilities. Therefore, learning to master all its secrets is not easy task. On many occasions you need these courses. For this reason, this offer is a privileged opportunity to learn as much as possible about our tool.
The official Pandora FMS documentation reaches more than 1500 pages; you may read them, watch all our videos or even read the code; you may also count on extra help to save money and save your valuable time, but… who better than software developers to certify whether or not you master Pandora FMS?
Our official certifications not only show who deeply knows the product; They are also a way of finding out whether the person taking the course has really made the most out of it.
With almost a thousand certificates over the last decade, you can be sure that if someone is certified, they have enough knowledge to implement Pandora FMS.
If you have to monitor more than 100 devices, you may also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here.
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Data centers have become an essential element within new technologies, if we add to that the current capabilities of artificial intelligence we have a perfect, superhero pairing, capable of providing us with all kinds of advances and benefits. Yes, we can shout it to the wind: “Blessed is the time in which we live!”
The future: smart data centers
For artificial intelligence to be devoted to scaring us to death through iconic movies like 2001 or Terminator is a thing of the past, today it has other, much more interesting and practical purposes. For example, crowning itself by playing a fundamental role in data processing and analysis. Yes, that’s her, the futuristic AI, increasingly faster, more efficient and, now, necessary to manage data centers.
We know that data is already the element that moves the world. An essential requirement for any operation, be it institutional, business, commercial… This makes data centers one of the most important epicenters of digital transformation. After all, in their physical facilities you may find the equipment and technology that sustains, among other things, the information on which the world economy depends. Centers that store seamlessly data backup and recovery with just one hand, while supporting Cloud applications and transactions with the other. Therefore, they guarantee an ideal climate for investment and opportunities, they boost the economy and encourage and attract a large number of technology companies. They are almost the center of the digital revolution.
Although data centers are not without problems. It is estimated that in the future, three or four years from now, 80% of companies will close their traditional data centers. It’s not foresight madness if you consider the myriad of inconveniences traditional data centers face. I mean a certain lack of preparation for updates, infrastructure problems, environmental deficiencies, etc. But don’t worry, as for so many things, there is a vaccine, a remedy, to take advantage of the advances in artificial intelligence to improve, as far as possible, the functions and infrastructure of data centers.
Forbes Insights already pointed it out in 2020: AI is more than poised to have a huge impact on data centers. In its management, productivity, infrastructure… In fact, they already offer potential solutions to data centers to improve their operations. And data centers, already upgraded by artificial intelligence capabilities, process AI workloads more efficiently.
Power Usage Effectiveness, PUE
As you may guess, data centers consume a lot of energy, which is why an artificial intelligence network is necessary to increase the efficiency of energy use (PUE). The Power Usage Effectiveness or PUE, also equivalent to the total electrical power of the CPD or the total electrical power consumed by the systems, is a metric to calculate the efficiency of data centers.
A couple of years ago, Google was already able to achieve a consistent 40% reduction in the amount of energy used for cooling by deploying Deepmind IA in one of its facilities. This achievement equates to a 15% reduction in overall PUE overload, once electrical losses and other non-cooling issues have been accounted for. It produced the lowest PUE they had ever seen. And the thing is that Deepmind analyzes all kinds of variables within the data center to improve the efficiency of the energy used and reduce its consumption.
Can Smart Data Centers be threatened?
Yes, data centers can also suffer from cyber threats. Hackers do their homework, always finding new ways to breach security and sneak information from data centers. However, the IA once again shows its guts and resources, and learns from normal network behavior to detect threats based on possible irregularities in such behavior. Artificial intelligence can be the perfect complement to the current Security Incidents and Event Management (SIEM) systems, and analyze the inputs of the multiple systems and the incidents, devising an adequate response to each unforeseen event.
Effective management
Through the use of intelligent hardware and IoT sensors, artificial intelligence will show us the effective management of our data center infrastructure. It will automate repetitive work, for example. Activities such as temperature monitoring or the status of the equipment, security, risks of all kinds and the management of refrigeration systems. In addition to carrying out predictive analysis that will help distribute the work among the company’s servers. It will also optimize server storage systems and help find potential system failures, improve processing times, and reduce common risk factors.
AI systems have already been developed that automatically learn to schedule data processing operations on thousands of servers 20-30% faster, completing key data center tasks on the go twice as fast during times of high traffic. They handle the same or higher workload faster using fewer resources. Additionally, mitigation strategies can help data centers recover from data disruption. This immediately turns into a reduction in losses during the interruption and our customers giving us a wide smile of satisfaction.
Well, what do you think of this special union, this definitive combo that artificial intelligence and data centers are and will be? Do you think something can marinate better? Data centers and the Cloud ? N-Able and Kaseya? ,White wine and seafood? Condensed milk and everything else? Leave your opinion in the comments!
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
“Adapt or die (and let others take your share of the cake)” is both an evolutionary law and a business law. Without going any further, today, the rise of new technologies and critical applications have led to a substantial change in data centers. It is natural of course, so much data, so much data generated by millions of Internet users wasting their time on the Internet… Data processing centers, or data centers, require new advances and solutions to be able to adapt to the processing of such an amount of information.
Therefore, current data centers are evolving, indeed, in response to this new situation. Improved facilities are now dedicated to supporting higher workloads and higher user traffic. We are talking about renewed systems and technological resources that grant a break, superior applications, shared data, flexibility, and high security for the protection of information.
The market is a jungle , and demand is continually stimulated by new proposals, models and skills that promise to renew the future of the data center. What are data centers evolving to? Let’s check out together some of the most in-demand competencies that will make data centers evolve in the coming future.
The work of data center technicians
Do not forget about them, in the end they are the ones responsible for data centers mostly. Installation, server and network computer maintenance, daily performance monitoring, maintaining a controlled and optimal equipment environment and solving all those unforeseen events that are usually associated with the network and servers. Not to mention the emergencies outside working hours, which will make them leave the shelter of their life as a civilian to go to repair any mess. Therefore, technicians from data centers will be a value to be taken into account by the market. Without a doubt they will take their chances on those that are the best and most prepared in the future. Computer support to staff and clients while they solve the bustle of servers and the network with the other hand. Their work is incalculable!
An architect in the Cloud
IT infrastructures and services in the Cloud, that is where money is invested, at least they are the two most notable factors companies want to take their chances on in recent times, and the appearance of 5G only reinforces their position. They take advantage of faster and more correct data transfers.
The data processing center, the technology company… absolutely everyone wants to focus now on the important factors that surround this investment: security in the Cloud and its architecture. They are looking for that revolutionary architect from the Cloud, with deep knowledge in the field, an architecture project up his sleeve and the final design of a unique product.
Hybrid management
Hyundai and its hybrid cars are not the only ones that have hybridization as their flag, there we have IT management that is also hybrid. Something unified to manage both the infrastructure in the Cloud and the traditional services. The benefits are many, including that hybrid IT management solutions provide key automation across IT functional areas. This encompasses service management, compliance, assurance, and governance.
And it is now that companies are using more AWS, Microsoft Azure and Google Cloud Platform, and other services in the Cloud, when IT administrators must guarantee network bandwidth between applications. Organizations will get into it more than ever.
Data center security
We live in a world where millions of users roam the Internet at ease, which makes managing and protecting data centers considerably more difficult. To ensure higher security, companies have to ensure their data and uninterrupted network performance. That’s why they hire fellow data analysts and cybersecurity architects skilled enough to look over the big picture and create a model of perception and protection against potential threats.
Edge computing
The arrival of edge computing certainly helps IT companies to collect and weigh information from IoT devices. They then transmit that data to a data center, be it remote or local. An edge server, as we know, differs from a source server in closeness to the client machine.
Edge servers store cache content in localized areas helping to ease server load. As the implementation of edge computing progresses, the thinking heads of data centers will look for talents with skills in networking, system design or database modeling and security.
Edge computing, security, hybrid management, architecture in The Cloud and specialized technicians are just some of the specialties towards which data centers are heading in their evolution. So if you are thinking of making a career out of it, this is the right time to rethink it. Ditch what you’re up to and join the demand around data centers. It is not Bitcoin, but it is undoubtedly a more consolidated bet.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
What is a CVE and why is it important for your security?
There are “good” hackers. They call themselves security analysts and some even devote their time to working for the common good. They investigate possible vulnerabilities in public and known applications, and when they find a possible security flaw that could endanger the users of those applications, they report that vulnerability to the software manufacturer. There is no reward, they are not paid for it, they do it to make the world safer.
What is a CVE?
This entire process, from the moment the manufacturer accepts the reported vulnerability until it is fixed, is taken to a public reference system called the CVE Database. This is a database maintained by MITRE Corporation (that’s why sometimes it is known as MITRE CVE list) with funds from the National Cyber Security Division of the government of the United States of America.
The CVE Program is an international effort, based on the community and it is based on it to discover vulnerabilities. Vulnerabilities are discovered, assigned and published in the CVE list.
Each CVE uniquely identifies a security problem. This problem can be of different types, but in any case, it is something that if it is not solved but rather stays hidden, someday someone will take advantage of said failure. A CVE simply describes which is the vulnerable application and the version and/or component affected without revealing sensitive information. When the error is corrected, it reports where the solution can be found. Generally a CVE is not made public until the mistake has been corrected, this is especially important, since it guarantees that the users of said application are not subjected to a gratuitous risk when publishing information about the failure. If there were no CVE, researchers would publish such information without coordinating with the manufacturers, producing unacceptable security risks for users who have no way to protect themselves against data that reveals security errors in their systems as users of those applications. Don’t forget that all software vendors have public CVEs published. Nobody is spared.
This consensus between manufacturers and researchers on the way to reveal sensitive information regarding security flaws of an application allows a continuous improvement of the security of public information systems. Although MITRE is originally a US funded organization, there are partner organizations around the world that help to organize CVEs regionally, decentralizing management and helping local manufacturers organize more efficiently.
INCIBE and ARTICA
CVEs are coordinated by CNAs, voluntary organizations that offer themselves to coordinate and resolve disputes when there are conflicting positions between security researchers and manufacturers. The root CNA is MITER, and there are CNAs spread all over the world. Most of the software and hardware manufacturers like Microsoft, CISCO, Oracle, VMware or Dell are CNAs that are part of the CVE program.
INCIBE, the National Cybersecurity Institute of Spain, is a Spanish organization that has recently become a CNA Root, a member with a special status within the CVE hierarchy, as it coordinates the Spanish CNAs. It is also a contact point in the country for receiving vulnerabilities discover n the IT domain, industrial systems and IoT (Internet of Things) devices.
Thanks to its collaboration with INCIBE, ÁRTICA the company behind Pandora FMS, Pandora ITSM and Pandora RC has become the official CNA of CVE. This is especially important as it shows Pandora FMS’s commitment to information system security and makes itself available to researchers from all over the world to work on solving any problem that may affect its users.
From this moment on, the program has two hundred one CNA from thirty two countries, ARTICA being number two hundred all over the world and third in Spain. After joining the program, ARTICA will be able to publicly receive any information related to the security of Pandora FMS, Pandora ITSM or Pandora RC and process the solution of the problem reliably as well as its public communication.
Our vulnerability management policy allows us to assure any Pandora FMS user that any problem will be dealt with rigorously, prioritizing the impact and mitigating risk in productive environments, while guaranteeing the researcher correct reception, communication and publication in the open of his/her work.
Vulnerability disclosure policy in Pandora FMS
At Pandora FMS, we have a very open policy in this regard. Pandora FMS was born with an open philosophy, this not only means open source, it also means free knowledge and, of course, process transparency. We have a fully public and transparent vulnerability disclosure policy. Over the years, different researchers have contacted us to report security problems in Pandora FMS. Yes, we too have had, and will have, security flaws. And thanks in part to the selfless work of security researchers, we have been correcting many of these flaws. We are so compliant and honest that we publish them ourselves in a list of known vulnerabilities on our own website.
Security bug reports generally have a life cycle that allows users to avoid the added risk of publishing information about software bugs ahead of time, before the manufacturer has been able to create a patch and distribute it in good time to its users. In this process, the security breach remains in a waiting stage, where the manufacturer accepts the reported problem and agrees on a date to solve the problem. The security researcher waits patiently and makes the solution of the problem as easy as possible: providing more information, collaborating with the development team, even doing some additional testing when the patch is available. The point is to work as a team to improve the robustness of the software.
The e-mail box security@pandorafms.com is open to anyone with an interest in improving the security of our software.
We would love to say that companies, above all else, value their employees, but it would be as naive as it is false. Yes, because at the top of the companies’ scale of values is data. The precious data. Data that actually only plays an important role when properly stored. And here is where the data warehouses come in.
What exactly is a data warehouse?
A data warehouse is actually a way of managing your data, specially designed, of course, to support business activities, especially those related to analytics. Enterprise data warehouses contain, of course, vast amounts of historical data to collate, query, pattern or analyze. These data, which the warehouse centralizes, come from a wide and different range of sources. We have the type: application log files, transaction applications, etc.
Apart from centralizing data and unifying their sources, data warehouses help in the decision-making process. This is because they contain valuable raw business knowledge. A very rich historical record for analysts and data experts. And from them, from the experts, we have taken the main advantages of data warehouses:
Source tracking and verification Thanks to data warehouses, we may trace the data to its source and verify both the information as well as the root it comes from. That way we will be able to store this source in our database and always ensure consistent and relevant information.
Sifting relevant data for companies. Once in the system, the quality and integrity of the data is guaranteed. Companies will only have useful data, those necessary for their activities, since the data warehouse format predisposes the analysis of their information at any time and under any circumstance. No one should any longer depend on a hunch or rash from the decision-maker, incomplete or poor quality data. The results will be fast and accurate.
In the data warehouse, the data is copied and processed, integrated and restructured, in advance, in a Semantic Data Store. This makes any analysis process much easier.
Imagine analyzing large amounts of data of all kinds and retrieving a value from them in a specific and precise way.
Types of data warehouses
If we strictly stick to company data warehouses, today we can have three main types:
Enterprise Data Warehouse (EDW): A data warehouse that contains the business data of a business and that includes all the information about its customers. It enables data analysis and can provide actionable insights. It also offers a unified approach to organizing and representing such data.
Operational Data Warehouse (ODS): We are faced with a central database that provides us with a snapshot of the freshest data from multiple transactional systems so that we can prepare operational reports. The ODS enables organizations to combine data in its original format, from several sources, to produce business reports.
Data market: It focuses on a single functional area of an organization and encompasses a subset of stored data. The data marketplace is specially designed for use by a specific department or set of users in an organization. We are talking about a condensed version of the data warehouse.
Small retrospective
Most would stop the clock on their time machine in 1980, where they believe that the concept of the data warehouse arises, but we would have to let it run a little further back, to the hippy sixties. When Dartmouth and Mills develop the term dimension and facts in a collaborative project.
Then we would advance to the seventies to witness how Nielsen and IRI introduce Dimensional Data Marts for retail sales, Tera Data Corporation launches a database management system prepared to help and assist in making decisions, and then, after a decade of progress, in the eighties, where the first implementation of a data warehouse emerged by the hand of Paul Murphy and Barry Devlin, IBM workers.
From the data warehouse to the Cloud?
As we have already seen in previous articles, the coronavirus pandemic that has devastated our planet has a lot to do with the new technological restructuring and with the religious ascents to the Cloud. It is also, of course, to blame for moving data warehouses to Cloud platforms.
On-premise data warehouses have great advantages: security, speed, etc. But they are not that elastic, and the foresight to determine how to scale the data warehouse, regarding future needs, is quite complex. During the famous Confinement, most moved to the Cloud and the data warehouses were going to follow their example of course. Even those in large companies, those who no one thought they could abandon their local data centers, are switching to the Cloud to make the most out of its advantages. That flexibility in computing and storage. Its ease of use, its versatile management and its profitability.
Tomorrow: Automation of the data warehouse
The list of issues a data warehouse deals with is still there: data integration, data views, data quality, optimization, competing methodologies, and so on. However, we can find an answer: warehouse automation..
With data warehouse automation, a data warehouse can use the latest technology for pattern-based automation and advanced design processes. This allows you to automate the planning, modeling and integration steps of the entire life cycle. We are faced with what seems like a very efficient alternative to traditional data warehouse design, one that reduces time-consuming tasks such as generating and deploying ETL codes on a database server.
After this long journey through the life and exploits of the data warehouses, we say goodbye, as you can see, focusing on the answers that it promises to give us in the near future. We will always be positive in the matter.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here.
Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your questions. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
Privacy policies in three other countries outside the EU
Are you not a little curious? Even a little bit, right under your chin or your temple about how they deal with privacy policies in other countries? Aren’t you? Well, surprise! Today, in Pandora FMS blog, we are going to get it out of our system by discussing how they do it, how they deal with the protection of international data and privacy, in at least three countries outside the European Community.
We are not going to choose countries at random, we leave that for a special of where we would go on vacation in Pandora FMS. The three countries we have chosen have one thing in common: they have initiated data protection reforms. They want to guarantee 100% the safety of their peers by offering them an improved data protection law.
This decision by these three countries is very likely due to the current pandemic, you know Covid-19 everywhere. With the almighty Internet as the systematic platform for sharing data, crooks had an obvious target. So in there we have been able to see, for some time now, countless data breaches and cybersecurity fraud. Therefore the demand for data security has proportionally generated concern and a large number of countries have decided, due to pressure, to reform their archaic and moth-eaten privacy and data protection policy frameworks. This is absolutely necessary. We have already seen it in film sagas such as James Bond or the Bourne Case, every country worth its salt handles sensitive data to protect.
Ó Pátria amada, idolatrada, salve, salve, Brasil.
We transport ourselves to the sunny and fine sands of the beaches of Brazil to find that the country approved the National Internet Law back in 2014, and that this same law defined the policies on data processing on the network. The strengths of this legislation considered consent as the strategy to follow and the fact that minors under 16 have restricted the exchange of personal data.
Brazil is currently preparing to introduce a new data protection plan through an ANPD (National Data Protection Authority). In fact, it has already published its normative strategy for the 2021-2023 fork. This ANPD wants to strengthen data protection in the country through the development of regulations, a new claim management for data breaches and adherence to the LGPD. These new privacy policies are not without certain similarities with the GDPR of our EU.
In case you didn’t quite understand the data, the LGPD is the General Law for the Protection of Personal Data, which we have among us since August 2020. Its function is to regulate the use and collection of personal data by all companies that do business and market in Brazil. It goes without saying that all these companies we are talking about must comply with the policies of the new law. Law that perfectly defines the penalties for violation and requires companies to comply with all its points. It also aims to give Brazilians some fundamental rights to improve their control over their data.
O Canada! Our home and native land!
The country of elk and maples has recently submitted different amendments to its data privacy law, now proposing the Consumer Privacy Protection Act (CPPA). Bill C-11, Digital Charter Implementation Law, replaces the previous data privacy law known as PIPEDA (Personal Information and Electronic Document Protection Law). Indeed, Canada, which has always strived, both to hunt down Bigfoot, and to ensure data privacy. Although it must be said that their legislative acts on the subject are sometimes limited to the private, commercial and institutional sectors. The power to enforce the rules of this law is shared between the Office of the Privacy Commissioner and the Court of Personal Information and Data Protection.
Article eight of this new law vows to protect citizens from unreasonable searches and seizures. The Consumer Privacy Protection Act also introduces restrictions on the collection, use and disclosure of personal information by any private entity and imposes high penalties for infringing it or failing to report an infringement.
This new law is based on the consent of citizens, but, to keep everyone happy, it also allows companies to use certain validation and consent strategies to collect personal data. Citizens may withdraw their consent in the future, if they wish, and request the deletion of their data.
Oh say, can you see, by the dawn’s early light…
There is no other way, unlike the most reasonable countries, the United States does not have a strict data privacy policy. What they actually have is a statewide compliance policy, which varies in rules, guidelines, and penalties. We are faced with several federal laws specific to each sector and with privacy laws, as we have said, at state level. Who regulates these privacy laws? Well, the thing is in the hands of the Federal Trade Commission.It is in California where we find ourselves with the strictest privacy policies. These policies give the individual the right to full transparency of the data used by companies and the provision not to disclose their data if they do not wish to do so.
Currently, there are many US states that are expanding their data policies. Since the pandemic, it is an unavoidable need.
Update or die, you know and especially regardingsecurity anddefense of our data. If you liked this article in which we visited different countries, leave us a comment, down there, with the country that you think has the highest data vulnerability and, why not?, the country you would go on a trip next year. I sincerely hope they don’t match.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
The fight of the century: Data Center VS Cloud! Let’s go!
In this blog we have always been eager for fights or competitions of whatever we please. We are like that, like fierce pokemon trainers who want to finally find out who has the greatest capabilities to win. They have praised us for it, they have hated us for it, but it does not matter, the point here is not having fun, but to give the most complete information about the litigants and the battle, so that the user can see closely who they should choose in the future. For all these reasons, today we have in our very own ring Data Center VS Cloud.
How to choose between a data center and Cloud storage?
When the decisive moment arrives, a company must decide about what it intends to do with data storage: “Do we send everything to the Cloud? Do we store our data right here, in our datacenter? Do we outsource them to a professional data center? After all, there are multiple factors, financial elements, the logistics of the company, different clauses and details. A lot of regulation to take into account that has you sweating when it comes to finding the correct answer.
The truth? In this article we are going to expose situations in which data centers beat the Cloud, because, for better or for worse, we are facing a foreseen victory.
Do you need more security?
It is true that the Cloud is no longer sooo in cloud 9 and both the Cloud and its computing and data storage solutions have made great progress in recent times. In fact, they offer a great infrastructure with protected access and the add-on of pay-as-you-go. But if you really want to have the appropriate protocols, compliance and security software, well, your data can be better and more secure in a data storage center, external or at home. There are many companies that offer external, professional and guaranteed data storage, which certifies that the information is your exclusive property and that the data will always be kept safe.
As we have said, storage security in IT Clouds is not as weak as some leaks of private pictures of celebrities have led us to believe. What’s more, the Cloud is often the first choice for a large number of companies, but there are certain nuances in Cloud storage that lead others to choose data centers. And there is a certain lack of control when choosing Cloud storage: problems with shared servers, lack of automatic backups, data leaks, fraudulent devices, vulnerable storage gateways, etc.
Combining infrastructure and profitability
If there is something that the clouds look like from the mainland, it is comfort and convenience, and so does the Cloud, something comfortable, agile… However, user fees can end up being quite expensive, depending on the type of services that one might need. An on-premise data center, in your own facilities, can also be one of the most expensive options, in addition that to manage it you must have a good security and IT team that takes care of regular updates and keeps it operational and always ready.
External storage might be the middle ground. Your own space within a data center or as part of a colocation package. If you think about it, you get the advantages of the Cloud without having to spend all that money that normally requires hosting data on a local data center. It is a very attractive option, considered by companies that have started getting consolidated and are now in full growth. Something more robust and reliable than the Cloud and without so many problems with the facilities.
Do you handle sensitive customer data?
Do you know when companies make up their minds quickly in this fierce fight between on-premise vs Cloud? When it comes to collecting, saving and using customer data that if leaked, lost or stolen would mean the destruction of their business, the private life of the person who trusted them or the public welfare in general. To give you an idea, Emperor Palpatine would never hang plans for The Death Star in the Cloud. Too risky.
Imagine then companies that compile and safeguard financial, political, medical, institutional, sensitive data… All of them choose to use physical data centers instead of the Cloud. And the same goes for telecommunications or social media companies. Physical centers are not the best thing ever, but the Cloud has proven itself more often to be vulnerable and easier to be violated more times.
You need a Cold Storage Location
When we talk about a Cold Storage Location we mean the storage of data that is completely offline, that is, they are not in the Cloud at all, they do not relate to the Cloud, they do not want the Cloud, they do not know what the Cloud is. Data is stored on safe physical means and then moved off-site in the event of a cataclysm. Like you know, a dana, a volcanic explosion, the Twister hurricane or a robbery attempt. This data storage option is often used by companies that have long-term compliance dates, financial institutions, brands threatened by ransomware attacks… They all see Cold Storage Location as the safest backup plan they can have.
Conclusion: Then, what about it?
Well, if we have to reach some conclusions, it must be said that storage in the Cloud is often convenient and has its place, but, of course, it is not the only option, nor is it the best for many companies. Data centers are the ones that best help companies, provide them with security, scalability and peace of mind. It is also the only alternative for companies looking for Cold Storage Location.
After this brawl, Cloud VS on-premise, you can take more into account the advantages and disadvantages of each one of them and make the best decision for your company and your customers’ data.
¿Quieres conocer mejor qué es lo que Pandora FMS puede ofrecerte? Descúbrelo entrando aquí. Si tienes que monitorizar más de 100 dispositivos también puedes disfrutar de un TRIAL GRATUITO de 30 días de Pandora FMS Enterprise. Instalación en Cloud u On-Premise, ¡¡tú eliges!! Consíguelo aquí.
Por último, recuerda que si cuentas con un número reducido de dispositivos para monitorizar puedes utilizar la versión OpenSource de Pandora FMS. Encuentra más información aquí.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here. If you have to monitor more than 100 devices, you may also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL Installation in Cloud or On-Premise, you choose !! Get it here
Finally, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here.
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook. We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel! Follow our account, we still have a long way to go to match that of Billie Eilish.
We all remember a couple of biblical allegories here. That of the Good Samaritan, that of The Prodigal Son, that of an Aragonese with new Adidas and the trolleybus on line 8… But the one that interests us today is that of the most holy and bethlemite David, preceded by Saul and succeeded by Solomon, who, among his many achievements, managed to defeat the Philistine giant Goliath. And he did so despite their difference in size and strength, which comes close to explaining the potential of micro data centers compared to traditional data centers.
Micro data centers, small but actual beasts
Look in the rear-view mirror, an allegorical rear-view mirror of course, as it is very unlikely that you will find yourself driving while reading this brilliant article. Look in the rear view mirror. Far back on the road is the gray monotony of centralized data centers. Yes, given how new and cool cloud computing is, which companies are currently going for, data centers are becoming, in a subtle way, micro data centers. That is, smaller and more succinct versions of the system, the mechanics and the traditional apparatus.
These “mini versions”, compared to traditional data centers, are built for a different type of workload. In addition, they solve very specific problems that traditional data centers can no longer solve.
Macro qualities of a micro data center
If we go directly to the most common features, the most typical micro data center is around ten servers and one hundred virtual machines. They are autonomous systems that contain the same capabilities as traditional data centers and more. We are talking about refrigeration systems, security systems, humidity sensors and a constant power supply.
I no longer need you to look in the rearview mirror, now look at the front windshield. Due to the global pandemic of Covid-19, remote work or telework has become part of our lives permanently. Well, these micro data centers as small and cute as they come have been created as the ideal proposal for locations of all types. They can be deployed in a higher number of locations and rooms. Even for a rudimentary installation in a classic office, they are the most silent and functional ones.
More benefits of micro data centers
If we had to make an official list of benefits and advantages of our little David, the first thing we would point out, in bold type, is that micro data centers directly empower companies. And they do not do so by magic, they do it, for example, reducing server costs, since they do not require bulky storage, or giving the option to companies to upgrade according to their own needs. This already by itself supposes a substantial difference in costs that will come in handy for the development and growth of companies.
Micro data centers are closer to users, which also translates into a reduction in latency. All of that in addition to how cheap they are compared to traditional data centers.
If you keep on looking ahead the advances are coming, one after the other, like traffic signs that we quickly leave behind with our allegorical ride. Technology companies increasingly have more data to accumulate and are in need of more processing power. Big brands will have no problem, they have the money, but what about small offices, retail areas or even town firms? They more than anyone should take advantage of edge computing and micro data centers to improve their businesses. And not only because they have the strangest and most remote and forsaken locations, but because these micro data centers can run all kinds of security systems, cash registers and other digital systems that are usually needed by small businesses.
Imagine your neighborhood grocer, “Frank, The 6 fingers,” using data analytics to improve marketing. After all, micro data centers only need a comfortable cabinet for cooling. And if we are talking about a small savings bank or common bank, well, they can implement their financial practices making them more efficient with micro data centers. Leaning even towards IT solutions, edge computing, IoT…
But be careful: Micro data centers should not be mistaken with edge computing.
To avoid mistaking them: micro data centers take advantage of edge computing to reach their goal, while edge computing is the one that increases processing power, brings it closer to the data source, speeds up the process of transporting data and improves device performance.
Even if it was this time from 1 Samuel 17: 4-23; 21: 9, David blows up again and knocks out Goliath. Proving that the small can knock down the big one and that we all have a chance in this land of God, at least if we are seasoned enough and have a fighting spirit.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
A Service Level Agreement (SLA) is a document that details the expected level of service guaranteed by a vendor or product. This document generally sets out metrics such as uptime expectations and any payoffs if these levels are not met.
For example, if a provider advertises an uptime of 99.9% and exceeds 43 minutes and 50 seconds of service downtime, technically the SLA has been breached and the customer may be entitled to some type of remuneration depending on the agreement.
What do we want SLAs for?
A Service Level Agreement (SLA) specifies the quality of a service. It is a way of defining the limit of failures or times in which the response to a service is measured. Each service measures its quality in a different way, but in all cases it refers to times, and therefore it can be measured.
For example, if you worked in a restaurant, you would define your customer service SLA with several parameters:
Maximum time since a customer sits at the table and is served by a waiter.
Maximum time since you order the drink and it is served to you.
Maximum time since requesting the bill and paying.
Suppose that in our restaurant, we consider that the most important thing is the initial attention, and that no more than 60 seconds can go by, from when you sit down to when you are served. If we had a fully sensorized business with IoT technology, we could measure the time from when the customer sits at a table until a waiter approaches the table.
That way, we could measure the number of times each waiter manages to serve a customer in the established time. The way to do it can be more or less simple, but let’s keep it simple, suppose that every time they do it in less than 60 seconds they comply and when they do not make it, they do not comply. So if out of ten clients they serve in an hour, they fail only with two, they would be 80% compliant. We could make the average of their entire work day and thus easily compare different employees to find out which one has more “quality” in the metric of “serving a customer when they sit down.”
If we use a monitoring system, we could notify their manager every time that the overall quality of the service drops below 80% and by generating automatic reports, we could each month reward those with the best service compliance percentage and take measures (or fire) for those who are doing it worst.
One of the most important functions of monitoring systems is to measure. And measuring service compliance is essential if we care about quality. Whether we are on the provider side or on the client side.
If you are paying for a service, wouldn’t you like to check that you are actually getting what you pay for?
Sometimes we do well not to trust the measurements of others, and it is necessary to check it for “ourselves.” For this, monitoring tools such as Pandora FMS are essential.
What is the «uptime» or activity time?
Uptime is the amount of time that a service is available and operational. It is generally the most important metric for a website, online service, or web-based provider. Sometimes uptime is mistaken with SLA, but uptime is nothing more than a very common metric in online services that is used to measure SLAs, not an SLA, which as we have seen before is something much broader.
The trade-off is downtime – the amount of time a service is unavailable.
Uptime is usually expressed as a percentage, such as “99.9%”, over a specified period of time (usually one month). For example, an uptime of 99.9% equals 43 minutes and 50 seconds of inactivity.
What are the typical metrics of a supplier?
Those that are agreed between the supplier and the client. Each service will have its own metrics and indicators. Thus, in our Monitoring as a Service (MAAS) we can establish several parameters to be measured, among others, let’s see some of them to better understand how to «measure the service quality» through SLA:
Minimum response time to a new incident, 1 hr in standard service.
Critical incident resolution time: 6 hours in standard service.
Service availability time, 99.932% in the standard service.
When we talk about a time percentage, it generally refers to the annual calculation, so 99.932% corresponds to a total of 5h 57m 38s of service shutdown in a year. We can use our SLA calculator (below to test other percentages).
On the contrary, 1hr would be the inverse calculation, and for this we can use online tools such as uptime.is. By using it we will get that six hours would correspond to:
Weekly reporting: 99.405 %
Monthly reporting: 99.863 %
Quarterly reporting: 99.954 %
Yearly reporting: 99.989 %
Similarly to the initial waiter example, we can measure compliance with a support SLA by measuring the sum of several factors, if all are met, we are meeting the SLA, otherwise we’re not. This is how Pandora ITSM measures it, the helpdesk component integrated in Pandora FMS. Pandora FMS clients use Pandora ITSM for support, and thanks to it we can ensure that we attend to client requests on time.
How to calculate the service SLA time?
Use our online calculator to calculate a service downtime. For example, test 99.99% to see the maximum downtime for a day, a month, or the entire year.
How can Pandora FMS help with SLAs?
Pandora FMS has different tools to exhaustively control the SLAs of your client/supplier. You have SLA reports segmented by hours, days or weeks. That way you can visually assess where the defaults are.
This is an example of an SLA report in a custom time range (one month) with bands by ranges of a few minutes.
There are reports prepared to show the case of information sources with backup so that you can find out the availability of the service from the customer’s point of view and from the internal point of view:
This is an example of a monthly SLA view with detail by hours and days:
This is an example of a monthly SLA report view with a weekly view and daily detail:
This is an example of an SLA report view by months, with simple views by days:
Service monitoring
One of the most advanced functions of Pandora FMS is monitoring services with Pandora FMS. It is used to continuously monitor the status of a service, which, as we have seen at the beginning, is made up of a set of indicators or metrics. This service often has a series of dependencies and weightings (there are things more important than others) and all services have a certain tolerance or margin, especially if they are made up of many elements and some of these are redundant.
The best example is a cluster, where if you have ten servers, you know that the system works perfectly with seven of them. So the service as such can be operational with one, two or up to three machines failing.
In other cases, a service may have non-critical elements, which are part of the service and that we want to control, even if the service is not affected:
One of the advantages of service monitoring is that you can easily get the route to failure, literally being able to find the needle in the haystack. When you talk about technology, the source of a problem can be somewhat tiny compared to the amount of data you receive. Services help us determine the source of the problem and isolate ourselves from informational noise. They also allow to monitor the degree of service compliance in real time and take action before the quality of the service for a customer is affected.
On the way to perfecting its services, Pandora FMS launches one of the most advanced and complete solutions in its history as monitoring software: Monitoring as a Service (MaaS).
As we all know by now, Pandora FMS is a software for network monitoring that, among many other possibilities, allows visually monitoring the status and performance of several parameters from different operating systems (servers, applications, hardware systems, firewalls, proxies, databases, web servers, routers…). It can also be deployed on almost any operating system and has remote monitoring (WMI, SNMP, TCP, UDP, ICMP, HTTP …), etc.
But what concerns us this time is to see how Pandora FMS once again surpasses itself with Monitoring as a Service. Because yes!, it is time for you to have Pandora FMS ready to use and ready to cover all of your needs. Avoid, from now on, wasting valuable resources on installation, maintenance and operation, MaaS is fully intended as a flexible and easy-to-understand subscription model.
Monitoring as a Service (MaaS) advantages
In order not to roughly explain it in a rush, we better go into detail and list some of the most important advantages of Monitoring as a Service (MaaS).
With Monitoring as a Service, you do not need to invest in an operations center, or in an internal team of engineers to manage monitoring. That’s it, without capital expenditures (capex) or operating expenditures (opex).
With Pandora FMS as a Service monitoring you may accelerate the time to obtain values.
Available 24/7, access it anytime, anywhere. There are no downtimes associated with monitoring. Wonderful and available 24/7.
Generate alerts based on specific business conditions and discover the easy integration of this service with business processes.
Important: Permanent security. All information is protected, monitored and complies with GDPR.
Operation services, we can operate for you, saving resources and optimizing startup times.
Custom integrations, with Pandora FMS specialist consultants at your disposal.
Deployment projects, to support specialized resources wherever you need them.
Here is our proposal in more detail
What does this mean for your company or business?
Going straight to the point, Monitoring as a service (MaaS) provides unlimited scalability and instant access from anywhere and gets rid of worrying about maintaining storage, servers, backups, and software updates.
It is up to you to discover, right away, how the digital transformation of all business processes makes Monitoring as a Service (MaaS) an essential activity to boost the productivity of your company.
Some frequently asked questions about the solution (FAQ)
Of course, given such a technological scoop, you may have some doubts about the subject. Here we answer several of the most frequent questions that we were asked.
What agent limit does the service have? Does it have an alert or storage limit?
There is no agent limit, although the service starts from 100 agents. There is no limit on alerts or disk storage.
How long is history data stored?
45 days maximum. However, you may optionally hire a history data retention system to store data for up to two years.
What is the service availability? What happens if it crashes on a weekend?
The service availability SLA is 99.726% in Basic service, 99.932% in Standard service and 99.954% in Advanced service. In short, we will make sure it is never down.
In which country are the servers located?
We have several locations, to comply with different legislations, such as GDPR (EU), GPA (UK), CBPR (APEC) and CPA (California).
What security does the service offer?
In addition to an availability SLA guaranteed by contract, our servers are exclusive for each client, we have 24/7 monitoring, and our own system security. Of course, backup is included in the service.
How much does the service cost?
You pay a fee per month, which is calculated on the number of agents you are using that month. So if you increase the number of agents in a certain month, you will pay more that month. However, if you decrease the number of agents, you will pay less. There are also some start-up costs for the service and also some optional packages, such as if you want our engineers to develop a custom integration or help you deploy monitoring in your internal systems.
How is it billed?
Quarterly or semi-annually, with monthly cost calculations, so you can plan growth and costs without surprises.
What does the service include?
From Pandora FMS Enterprise license to the operating system, database management, system optimization, maintenance, updates, emergency patches, integration with Telegram and SMS sending, backup and recovery, preventive maintenance, environment security and any other technical task that may take up operating time. You will only have to operate with Pandora FMS.
What is the difference between Basic, Standard and Advanced services?
With the basic service, if you want to make a report or configure an alert, you can do it directly, without worrying about installing, configuring or parameterizing anything. In the Standard and Advanced service you can ask us to do it for you and we will be happy to do so, the same applies for building remote plugins, creating reports, users, policies, graphs or any other administrative Pandora FMS task. In the Standard and Advanced services you will have a number of hours of service each month for any request you may make, and our technical team will be at your disposal. Our technical team will be at your complete disposal.
What are the service hours?
Full office hours (from 9 AM to 6 PM) in America and Europe. From San Francisco to Moscow.
If you can no longer handle the intrigue and want to see how far the possibilities of Monitoring as a service go, you may now hire the solution through this link.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
Is Cybersecurity Awareness Month the event of the year?
Welcome back to the incredible and majestic Pandora FMS blog. In today’s post, we are going to deal with an event belonging to the month of October, that depressing month in which we become aware of fall, it is colder and someone keeps cutting short our daylight hours. If April is the month of flowers and November the month of the male mustache for testicular cancer, October is the Cybersecurity Awareness Month.
What is Cybersecurity Awareness Month?
Cybersecurity Awareness Month, which is commemorated every October, was created between the United States government and national industry to ensure that everyone had the necessary resources to stay safe and secure online.
Since its inception, under the supervision of the US Department of Homeland Security and the National Cyber Security Alliance, Cybersecurity Awareness Month has grown stronger and more widespread, reaching out to millions of users and businesses, and all types of corporations and institutions. Today, in 2021, it continues to make an impact, and not only in its country of origin, it already does around the world because, who would not join the cause of feeling more protected in these times we live in?
Cybersecurity Awareness Month: Origins
As we’ve explained, the National Cyber Security Alliance and the US Department of Homeland Security launched Cybersecurity Awareness Month in October as a shared effort to help Americans stay safe online. And they did it a few of years ago, at least all those that distance us from October 2004.
When a baby starts to walk, the first steps are short and simple. So were the early Cybersecurity Awareness Month awareness efforts. Most of them focused on giving recommendations on how to update the antivirus, at least twice a year. But little by little they increased their ambitions, their reach and their participation. For example, launching complex campaigns in the industry, involving clients, NGOs and even university campuses.
The organizers made it clear in these years that responsibility for cybersecurity problems is fully shared. From large companies to small users with their battered laptops, all of us must protect our digital treasures and always keep them under supervision.
The European Cybersecurity Month (ECSM)
What is European Cybersecurity Month? The European Cybersecurity Month works, like the American Cybersecurity Awareness Month, as an annual campaign devoted to promoting cybersecurity among users, companies and institutions. The only difference is that the European Cybersecurity Month is promoted by the European Union.
Throughout the month of October, safety information is provided online and awareness is raised through good practices. Activities are carried out around the entire continent: conferences, workshops, seminars, presentations, etc. Everything in order to make us finally aware of digital hygiene.
We must thank the European Union Agency for Cybersecurity (ENISA) and the European Commission for the fruitful month of European Cybersecurity Month, which, of course, has the full support of the EU Member States.
Some events of Cybersecurity Awareness Month
Like the Homecoming Week for high schools, Cybersecurity Awareness Month is also divided into different segments. We are going to list those established by the National Cybersecurity Alliance this year, 2021.
First week
The first week will be themed on creating strong passwords, using multi-factor authentication, backing up data, and updating software.
Only that way will we be able to realize how dependent we are on technology and reconsider the amount of personal and commercial data that we treasure on platforms located on the Internet. There, at the hand of any cybercriminal.
Second week
The motto? “You must be careful with emails, text messages, and chats opened by strangers and incognitos.” You are just one click away from a suspicious email, link, or attachment, to bother the hell out of you. Indeed phishing and digital scams in general have been on the rise since we began with this pandemic. Since we have the damn COVID among us, phishing attacks represent more than 80% of reported security incidents.
Third week
The third week of Cybersecurity Awareness Month will be focused on supporting, inspiring and applauding students who have chosen, or want to choose, a university career focused on cybersecurity. Whether they are teenagers, adults or confused kids who want to change fields of study. Cybersecurity is cool, youngster! It is fully growing and has space and credits for everyone!
Fourth week
This week we will try to make security a priority for companies more than ever. Incorporate security in products, processes, tools… Promote cybersecurity in employees and teams. Get cybersecurity in the minds of department heads until they themselves celebrate the vanguards and news of this discipline on a daily basis.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
Together we check out the key concepts of systems and networks
In the middle of the information century, who has not surfed the Internet or used a computer, be it a desktop or a laptop? But do you really know what a computer is and what it is made of? and what about the Internet?
It is important to know at least the most superficial layer of something as important as computer systems and networks, and therefore, we are going to talk about the key concepts of these two topics.
A computer system is a device made up of the union of hardware and software, which allows the use of this system by a person, whether qualified or not, that depends on the purpose of the system.
But, what does “hardware” and “software” mean? Let’s talk a little more about it.
You can define as hardware the set of physical components that make up a computer system. We are going to define the main components of a computer system, although there are a few more:
Processor: It is the component in charge of executing all the system programs. It is in turn made up of one or more CPUs.
RAM memory: This component stores the data and instructions executed by the CPUs and other system components.
Hard Drives: Information and content are stored here in computer systems.
Motherboard: It is the component where the others are located, and works as a bridge for communication between them.
Well, now that we have a basic understanding of what hardware is, we move on to software.
Software are all the programs that run on a computer system, among which you may differentiate three types of software:
System Software: It is responsible for the proper functioning of the operating system and hardware in general, such as device drivers.
Programming software: They are tools whose sole purpose is the development of new software.
Application software: It is any program designed to perform one or more specific tasks, for example video games or applications designed for business or education.
We already know what a computer system is, but without communication with the outside we are not making the most out of the potential that these systems have (which is a lot), so we decided to connect it to that abstract site full of information and services: the ‘Internet’.
Everyone knows the term “Internet”, but do we know what the “Internet” is?
We could say that the Internet is the great global network that unites all existing devices, allowing communication between all of them from anywhere on the planet. In turn, this large network is made up of other smaller networks, such as those of a country, city, neighborhood, etc.
Mainly, we distinguish three types of networks:
LAN: It is the smallest network, a local area network, such as the one in work areas or the one you have at home.
MAN: It is a somewhat larger network, being able to cover from neighborhoods to cities. They can also be the networks used by large companies for communication between their different offices.
WAN: It is a network that connects countries or even continents to each other, not devices. We can say that the Internet is the ultimate WAN network.
Ok, we already know what the Internet is made of. But, how do devices communicate on these networks? There are systems used to identify each computer on the network, known as IP addresses. An IP address is, basically, the ID or identifier of a device, so it is unique and unrepeatable.
At the beginning, when the idea of an IP address was created, there were only a few dozen computers in the whole world, and this, as we already know, has gotten quite out of control since then. As a result of this increase, they decided to come up with a new concept, known as DNS (for its acronym Domain Name System).
What the DNS protocol does is, basically, translate the domain name that we enter, either in the web browser or in any other program, and convert it into an IP address, with which it communicates with the destination. Of course, all domain names are stored on DNS servers, scattered around the world to avoid connection overload, and to avoid slow name resolutions.
There are a large number of protocols, each with a different purpose. These protocols are grouped in layers, such as application, transport, Internet or access to the network, according to the TCP/IP model. But, that’s not all. We still lack another important concept in relation to communications between devices, what we know as “ports” of a computer system.
Imagine a road, if all the traffic that wants to enter a city only had a single road, what would happen? Well, the same thing happens in computing, and that is why these virtual ports exist.
These ports range from 0 to 65535, but the first 1024 are reserved for “important” protocols, such as the DNS protocol, which we have mentioned above, belonging to the application layer and that uses port 53 for both UDP and TCP connections.
TCP and UDP are two protocols belonging to the transport layer, whose main difference is that the TCP protocol is connection-oriented. That is, the TCP protocol makes sure that the data reaches its destination, while the UDP protocol sends the data, faster but less securely. This data may even not arrive or at least not fully arrive.
The protocols for web connections or HTTP/HTTPS, both belong to the application layer. Depending on which one you choose, it uses a different port. That is, for HTTP connections, port 80/TCP is used, although it is deprecated due to its lack of security, so the standard has become HTTPS connections, which use port 443/TCP and include a security layer based on SSL/TLS.
Connections made through safe channels or SSH, also from the application layer, use port 22/TCP, and thus we could continue with lots of other protocols.
Of course, these ports are a standard in the systems that receive the requests, the client that initiates the request can use any port that is not reserved to send the request and receive this data. As you can see, this is much easier to communicate with servers, although they can also modify their default ports, but the normal thing is that they do not do so if they want to provide a public service.
Finally, we are going to talk about a concept that, due to the pandemic, is the order of the day: the VPN.
As its name indicates (Virtual Private Network), we can define a VPN as a network “tunnel” that is created between client and server, where data are fully encrypted and sent through the Internet. The common use of VPNs is anonymity on the network, since the IP that is exposed is that of the VPN server, or, also, to be able to visit pages that cannot be accessed from the source country.
In the business environment, this tunnel allows direct communication between the client device with any other device in the network of that server, which allows access to an environment as if we were physically in the office of our company. It also allows access control and registration, which otherwise could not be done.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
From now on, let us add “Supernet” into our vocabulary. Learn more!
A set of computers and/or computer equipment connected to each other, and that can exchange data and information, all of those make up a network. The Internet is the network of networks. We could even think that the Internet is the “Supernet”, but we have to tread carefully when using frequently debated terms in computing… For that reason, today, we bring to the fore the term “Supernet” (or Supernetwork), of course always taking an approach from a monitoring perspective.
* Warning: what I write below is my way of looking at things from a practical and sincere point of view. This article only endorses me and, in any case, this entry should be read taking into account the learning approach, it does not intend to be official in any way. That said, let’s start from the basics, which is not the same as starting from scratch.
Terms: Supernet and Supernetting
If we have a network and we buy a new computer, we say that “we add it to a network.” If we have a supernet, then “we add it to a supernet.” We even have a specific verb for it. It is very common to use the term Supernetting; however the following terms are also valid (but less used):
Prefix aggregation
Route aggregation
Route summarization
If we get even more specific, technically we will find differences but for the purposes of this post we will deal with it the same way… Do you think it is daring on my part? Well, there is more!
Request for comments
Although we can go a lot further back in time, the Internet was born in the United States of America, originally called Arpanet, in the late 1960s. A technological predecessor could be the landline from which many of the concepts are born, used when planning the “network of networks”. In fact, the wiring itself, the colors that identify the pairs, are very similar, at a physical or hardware level. This includes the similarities in switched connections (or circuit switching). But, obviously, the Internet and data transport in a digital way ended up completely absorbing telephony.
But the Internet needed more than the physical and conceptual foundation or sustenance of the great American telephone companies. Moreover, October 1969 is marked as the birth of the Internet since the first connection between two computers was made… And it was simply that, since it was not yet a common computer network.
The Internet was born, in my opinion, when pioneer Dr. Steve D. Crocker published the first issue of Request for Comment (RFC) on April 7, 1969. In Issue 6 (RFC 6), Steve Crocker recounts his conversation with Bob Kahn about code conversion for data exchange. RFC 11 publishes the connection implementation in the FAT operating system (yes, that’s what it was called), and I fervently believe that this, published in August 1969, is what enabled the feat performed in October of that same year.
Based on this knowledge base, the RFCs were born: gathering a group of people in their twenties who moved among different universities sharing knowledge and cementing concepts, something that we now do by email… In fact, RFC 733 (1977) outlines this technology and the standard for the email is published in RFC 822 (year 1982).
RFCs grew decade after decade: in 1992, RFC 1338 “Supernetting: an Address Assignment and Aggregation Strategy” was published for information purposes. Yes, at first the supernet was just a mere advertisement, not a protocol, and not even a standard.
Just the following year, in 1993, RFC 1518 “breaks” the paradigm of networks by classes. While class A networks allow millions of IP addresses, the next step – class B networks – only allowed 65 thousand IP addresses: between the two of them the “waste” of IP addresses is very high.
For that reason, the Classless Inter-Domain Routing (better known as CIDR) was born, which is an extension of the original IPv4 addressing system that allows more efficient address allocation. The original class-based method used fixed fields for network identifiers, which was wasteful as I said earlier: most organizations that are assigned those addresses (class A and class B networks) never intended to put so many devices on the Internet.
As additional information, this is the origin of CIDR notation, the suffix that accompanies an IP address (there are 32 bits in an IPv4 address, four octets separated by periods) and that allows describing or narrowing down a range of them. For example, for /20 it allows 4096 IP addresses, for /21 2048 IP addresses and so on, as well as all the way around (all powers of base 2, this is important for a supernet as we will see later). All these numbers can be obtained using the IP address calculator included in Pandora FMS. You may also find many of these calculators online, each with its own style, shapes and colors to present the same data.
Flexible like Pandora FMS
CIDR thus changed the fixed fields to variable length fields and this allowed to assign IP addresses better, and in a more refined way. CIDR IP addresses include a number that indicates how the address is divided between networks and hosts.
For example, in the CIDR address 201.249.0.0/19 the /19 indicates that the first 19 bits are used for the identification of the network and the remaining 13 are used for host identification.
The main purpose of a supernet is to decrease the size of the route table of routers. For example, instead of a router having 8 individual routes, it may have a single route aggregated from these 8 individual routes. This saves memory and processing resources on the routing devices, thus requiring less space to store their route table and less processing power to search the route table. It also provides stability in networks because fluctuations can be isolated, that is, in one part of the network they do not spread to all parts of the network.
Supernetting and Pandora FMS
From Pandora FMS version NG 731 IPAM was included (abbreviation of Internet Protocol Address Management) which allows to manage, discover, diagnose and monitor hundreds of IP addresses.
Within this feature, the supernet, subnets and even virtual private networks (VLAN) are included, all integrated, with the option to export data in CSV files. Unlike creating VLANs, we can only create supernets manually using IPAM. For that, you have to configure, with the necessary parameters, each of the supernets that you want to have, and later add networks already managed with IPAM that may belong to a VLAN. Although it is a manual process from version NG 758, it includes the ability to quickly addy our data from files in CSV format.
To finish off this post, let’s see what the rules that operate a supernet are.
Supernet Rules
Apart from good practices in network configuration, the established rules must always be followed and enforced to avoid chaos reigning.
The rules for creating supernets are as follows:
Networks must be contiguous or sequential.
The number of networks to add must be a multiple of two or “base two”.
And the rule that is somewhat more complicated: compare the value of the first octet not common from the first block of IP addresses (the smallest) of the list of networks to add against the number of networks to add (see previous point). The value of the first non-common octet must be zero or a multiple of the number of networks to be added.
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here: https://pandorafms.com/
If you have more than 100 devices to monitor, you may contact us through the form: https://pandorafms.com/contact/
Also, remember that if your monitoring needs are more limited, you have Pandora FMS OpenSource version available. Learn more here: https://pandorafms.org/
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Today we will talk about one of the most versatile elements that Pandora FMS Enterprise offers us for monitoring distributed environments, the Satellite server. It will allow you to monitor different networks remotely, without the need to have connectivity directly from the monitoring environment with the computers that make it up. We will describe the typical case of companies that have central headquarters and remote offices, the different things we may find and how the satellite server can help us deploy efficient monitoring in an economic, fast and simple way.
Standard monitoring types
Before getting into the description of the case, let’s remember how monitoring works overall with Pandora FMS. There are two basic types of monitoring, local monitoring and remote monitoring.
The first, which we call local, consists of installing a small software on your devices (servers, mobiles, workstations, etc.) which we call monitoring agent. Agents are in charge of collecting the metrics locally on the machine, packaging them and sending them to the server. In this type of monitoring, communication goes from the agent (monitored device) to the server in a defined time interval, so the server does not have to interrogate the device, it just has an open port through which information is received, and any device that can reach that port will be able to send its data, so communication is “simple”, you just need to make sure that your monitoring server is exposed to all of your agents.
The second form of monitoring is what we call remote monitoring. Remote monitoring means that the monitoring server interrogates the agent to monitor through some protocol (icmp, tcp, snmp, http, wmi, etc). This could go from a simple ping to connecting to the api of a complex tool, such as vsphere, to retrieve information from all virtual machines, esx and datastores running in this environment and their corresponding metrics.
This type of monitoring opens the doors to being able to retrieve large amounts of data requiring little configuration and without the need to install any extra software on the devices, which is wonderful, but it also entails other inconveniences, such as having to guarantee connectivity from the monitoring server to each of the elements to be monitored, taking into account the security criteria to open these communications.
When you have a single headquarters of any size, this is not usually a problem, since you might usually have your devices and applications concentrated in the same place and communications management between environments is usually easier, this situation becomes complicated when you have more than one headquarters or small remote offices.
Description of a distributed environment
Let’s picture a distributed architecture with a headquarters where you have most of your applications and IT equipment, but you also have smaller sites that also have their equipment and applications. We have examples of this infrastructure, highly distributed, in environments like restaurant franchises, supermarkets, banks, retail stores, pharmacies, insurance companies, etc. Where they usually have powerful, well-managed data centers at headquarters, but remote sites lack the space or staff to maintain servers. Most of the time, there are not even permanent technical support staff for the equipment in these locations, so implementing monitoring can be challenging.
If some technology is implemented such as a site-to-site vpn, a sd-wan or dedicated communication between your sites, there is hardly any problem, you may have your monitoring environment at your headquarters and from there “attack” your remote devices. Well, the problem is that these solutions are expensive and require implementation and management, and if they are not already implemented, their implementation can become very complicated (and expensive). It is in these cases where the satellite server becomes essential, since it combines the versatility of remote monitoring with the communication behavior of local monitoring.
Using the Satellite Server
The Satellite Server consists of software that will be in charge of doing the remote checks on your network. Let’s say that in our restaurant, for example, it will do network scans, monitor each of the restaurant’s devices through different protocols, store these data and then pack them and send them to the main Pandora FMS server as if it were a local agent, so the headquarters/remote headquarters communication is simplified. You just have to make sure that a single device, the Satellite Server, can communicate with Pandora FMS server, in that sense from the remote headquarters to the main headquarters to send the data packets. Remote checks will always be done from within the local network without the need to expose any of the services, devices or applications of your remote headquarters.
Even if you want to make use of hybrid monitoring (local and remote monitoring) in your remote headquarters, you may install software agents on your devices and point them to our satellite so that it becomes the single delivery point between your remote headquarters and your headquarters.
In addition, the Satellite Server has remote configuration, so once deployed, it can be managed and configured from your main monitoring environment, being able to add new metrics, alert systems, policies and more configurations without having to access your remote headquarters, all from your Pandora FMS web console at your headquarters.
Regarding its deployment, the Satellite Server is a very light software especially compared to a full Pandora FMS installation, so the hardware requirements for monitoring remote sites are really low, it can even be deployed in a Raspberry Pi, which is a very cheap and compact device, or failing that, you may use any of the resources that are already deployed at the headquarters, such as a data server, to deploy your Satellite.
As you can see, monitoring remote sites using the satellite server simplifies a huge deal the configuration necessary for monitoring, helping you save money and implementation time that without a tool like this would be a lot higher and more complex.
Today we discussed only one of the typical cases, which is one of the most common ones, to describe the performance and the usefulness of a satellite server, but it is not only valid for remote locations, it is useful in many other ways, such as load balancing, making checks at the same point from different locations (very useful in monitoring web pages) or even for monitoring complex environments such as Kubernetes or Openshift, where many of the services are not exposed to the outside, such as databases or backend services, and that you could monitor if you deployed a pod with the satellite within the network and directly attacking these services, for example.
If you want to learn more about the Satellite Server feature, how to install and configure it, or want to find out more Pandora FMS specific features, stay tuned to our blog and do not hesitate to visit our youtube channel, where you may find tutorials, workshops and a lot of content devoted to this and many other topics related to monitoring.
Do you already know what a web firewall is? Let us tell you about it.
There’s something that humans and machines have in common, and no, it’s not the disappointment suffered by the final season of Game of Thrones, or, well, at least not only that. What we have in common is that we need protection. You know, animals need it too, and plants, but if you’ve gotten this far, it seems that you’re interested in computers, networks and all these pretty modern “geek” things, so today we’ll talk about that kind of protection.
Just as you would protect your dog, your ficus or yourself, you have to protect your computer. The world is a place full of dangers and risks and the Internet is not far behind. It’s like in Crystal Jungle, only instead of people carrying guns around, we’ll find hunched over users willing to collect information from your computer, networks, and troll you in any possible way.
Remember: “The night is dark and harbors errors”. And horrors too.
The Internet also hosts them, so to protect our beloved computer, we must make use of a “Web Firewall”. What is this “Web Firewall”?
A “Web Firewall” is a system that is intended to protect our private network and block unauthorized access or attacks from other networks. In turn, it allows incoming and outgoing traffic between computers on the same network. That is, it is like the door of your house, or, worth the analogy, a half-open blind that only lets in a specific amount of breeze according to your personal comfort.
But not only that, it can be our beloved ally, protector of what we love the most, since through configurations you may limit, encrypt or decrypt this traffic. Here’s another lucid analogy: Maybe, in your day to day, you have to go to a clandestine meeting whose members no one should know. It is similar with your computer, you may encrypt your traffic so that you cannot access the most relevant data.
The web firewall, capable of such feats, can be implemented in hardware or software. If it’s well configured, it will be an advantage when it comes to protecting your networks, so it’s vitally important to understand how it works and how you may get the most out of it.
How does a web firewall work?
Outline of a firewall on a computer network
It is usually located at the junction point between two networks. Each network or computer can have its own firewall. This can limit the consequences of an attack, as you can prevent damage from spreading from one network to another. The sooner the spread of evil is tackled, the better.
The essential thing that you must know for the operation of the web firewall is that the totality of information and traffic that goes through our router and that is transmitted between networks is analyzed by it. If the traffic complies with the rules you have configured for it, it can enter or leave your network. If the traffic does not meet those certain rules, then it will be blocked from reaching its destination.
There are several methods by which you may filter the traffic of the firewall, for example, configuring it as you please. Remember that a good firewall configuration is paramount. If the lock on your front door was badly designed and anyone could open it, bad people could get in and steal, this is the same thing.
Let’s take a look at some of the filtering methods we’ve been provided by our dear friend, the Web Firewall.
Traffic filtering methods
Firewall policies: They allow you to block certain types of network traffic.
Anti-spam firewall: It protects against spam, phishing, etc.
Antivirus firewall: It protects the internal network against attacks that come from the Internet or wan.
Content filtering: It allows you to block some types of web content.
WAP Managed Service: It allows you to control wap devices.
DPI services: It allows you to control specific applications.
There are a few types of firewalls to highlight, these can be software or hardware, and, if we investigate a little more, we will find others that are somewhat more defined.
Types of web firewall
Gateway application level: It applies security mechanisms for specific applications.
Gateway level circuit: It applies security mechanisms when a tcp or udp connection is established.
Packet filtering: At network level as an IP packet filter.
Personal: It is installed as software on your computer.
Using a firewall has lots of advantages. We already discussed some, with lots of examples and tremendous analogies, even so, we are going to list the most obvious ones:
Advantages of using a firewall
It blocks access to computers and/or applications to our networks.
It allows you to control and restrict communications between the parties under your settings.
It optimizes communication between internal network elements, helping to reconfigure security settings.
It establishes reliable perimeters.
Protection of intrusions and private information.
Nothing is perfect, and web firewalls, despite their fiery name, well, they aren’t either. These also have some notable limitations:
Limitations of a web firewall
It cannot protect itself from attacks whose traffic does not go through it.
It cannot protect threats made by insider attacks or negligent users.
It does not protect against service security flaws and protocols whose traffic is allowed.
It cannot protect against attacks on the internal network through files or software.
There are many firewall systems, if we use Linux, the one commonly used is Iptables. Yes, it sounds weird, we don’t like weird sounding things and since we don’t like weird things we use the firewall… Hmm… before entering a self-destructive paradox, we will try to understand what this“Iptables” is through a simple explanation.
What is Iptables?
Linux has a firewall system included in its kernel called Iptables, although its configuration can be a bit complex. Its default configuration is to allow everything to enter and exit.
With a suitable Iptables configuration you will be able to filter which packages, data or information you want to enter and which ones you do not. Just like the previous example about the inputs.
To work with Iptables you need administrative permissions so you will have to use sudo. You will have to choose wisely what you let in and what not, and, for this, an adequate knowledge of the commands that you can use in this system is necessary. The following examples are only intended to teach a basic configuration to understand the logic of the web firewall, but for a more correct and complex configuration, I recommend adding information by searching the Internet, specialized books or colleagues in the world.
Some commands to understand Iptables
sudo iptables -P INPUT DROP
-P = Anyone who wants to access the computer INPUT = We ignore it DROP = We ignore it
With this command nobody will be able to enter your computer, in fact you neither… so it is not the most appropriate one.
sudo iptables -A INPUT -i lo -j ACCEPT sudo iptables -A INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT
The first line tells us that our own computer (lo = localhost) can do whatever it wants.
Before, we said that this was like a house, if we have siblings, parents or children and they leave, we want them to be able to get in again, right? Well that’s what we do with the second line, all the connections that come out of our computer will be allowed by Iptables.
sudo iptables -A INPUT -p tcp –dport 80 -j ACCEPT
With this command, anyone can see the websites that our computer has.
-j ACCEPT = Accept or allow -dport 80 = Traffic to port 80 -p tcp = make it tcp -A INPUT = that is incoming
These would be some basic examples of how Iptables works. That is, just to understand the basics of its operation. Like I said, I recommend digging deeper and diving into more information to make an acceptable setup.
And just like Game of Thrones ended, this article also does it, although much better (what a crappy last season), so I only have to say goodbye and wish you to have a good day. AH! And to recommend you to use Pandora FMS, which despite not being a web firewall, is a tool that will also help you protect yourself by collecting information.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
We give you 21 computer security tips for beginners
The Internet is a tool that, without a doubt, offers a great amount of positive aspects in the daily life of our society, like instant communication, easy access to information… among many other benefits. But also it has negative aspects, and one of the big ones is cyberattacks. That is why we give you today 21 computer security tips for beginners!
Although these attacks are usually aimed at companies, governments, celebrities and in general, targets with important information or involving great monetary value, common people and their domestic devices are not completely free from this problem. And you may think, “ok, but how are they going to attack me, a common person, with no fame and no money?”. Well, regardless of how little you may have, there is always going to be someone who may want to try to take it away, so we suggest you to try to protect yourself as much as possible in this “cyberworld.”
And to make it easier for you, we are going to give you twenty-one computer security tips to protect you against possible malicious cyberattacks:
1. Do not share personal information on social networks. Such as your address, phone, ID… Oddly enough, there are people who do it…
2. Free WiFi? It may sound good, but it could be a trap. It is not advisable to access websites using “sensitive” data on public networks.
3. Passwords. Yes, we know that we’re very lazy to change them every once in a while and that it is very easy to set the same for all of your accounts so that you remember it quickly. But think about this, if they manage to enter your Facebook account, where else can they get into with the same password?
4. Sharing is living? It depends on what, and since passwords are something very personal and sensitive, you shouldn’t share them with anyone other than you, not even your alter ego.
5. And speaking of passwords, do you still have the default password that came with your router? I think it’s about time you update it.
6. Beware of mails. Have you received an email from your bank about an unauthorized change in your account and it asks you to enter your credentials? Very suspicious… If in doubt, contact your bank by phone before rushing! Look carefully at the sender, hover over the URL and check which website the link redirects you to, check if they refer to you by name or by “Dear customer”. In addition, most of them tend to have spelling errors. In general, we suggest you to exercise caution with everything that reaches your mailbox.
If you want to know more about the topic, you can search for “phishing” in your browser.
7. Giveaways you didn’t participate in. There are an unlimited number of scams on the Internet, and you’ve probably come across more than one “You’re our 1000th visitor and you’ve won an iPhone!” Well, it’s clear that this is a scam, and in case you weren’t quite sure, we’re here to confirm it.
8. Recommendation for gamers. Although it is very “cool” to have at your disposal all the games on the market without paying a dime, you should do a little research into the reliability of that succulent pirated gaming website before downloading and installing anything on your computer just because.
9. This one for the not so “gamers” The same thing that we have discussed above applies to the rest of “things” on the Internet. That is, applications, programs, movies…
10. And since we mention programs… Keep your software up to date, or at least, don’t delay too long updating to the latest version developed by developers, as they always tend to add features, bug fixes and, most importantly, security patches.
11. Clean up!. And I don’t mean cleaning your house or your room, I mean your computer. Every program, application or game you have installed is a possible security breach, so consider uninstalling everything you don’t use. And by the way, empty the recycle bin, man!
12. Online shopping. Whenever you go to buy something online make sure that the website has a security certificate, known as HTTPS. You’ll recognize it by the “little lock” to the left of the URL. You can also use payment methods such as PayPal before entering your bank details to make the payment.
13. The Firewall. It is an indispensable element in terms of security for your computer, since it is the one that is responsible for rejecting all connections that are not allowed in its parameters.
14. Antivirus. Another element, although less essential but always recommended, is to have an antivirus. In Windows 10, Microsoft Defender is installed by default, which is a good remedy to fight against most malicious programs, although if you go for some other of your liking, the important thing is to always keep it active.
15. Alexa, what time is it? Lately it is quite trendy to have a smart device at home but… do you know that every device connected to the internet is “hackable”? With this we’re not telling you to buy one, we only advise you to ponder over the pros and cons well, and whether you are going to risk a possible espionage by means of “Alexa, tell me a joke”.
16. Espionage? You never know who or what may have infiltrated your computer, so if you are somewhat skeptical, you can cover up your webcam and mute or unplug the microphone so that no one can see or hear you.
17. The“guardian angel”. Well, he’s not really a guardian angel, but he’s been with us everywhere for a few years. You know what we mean, right? Indeed, the mobile phone, or as it is known lately “SmartPhone”. Some think that these devices are immune to attacks… but we are sorry to tell you that they are not. Therefore, you must take the same precaution, in this case with messages and calls from strangers that seem suspicious, and of course with unofficial applications, the famous “apks”.
18. “Backups”. Hasn’t it happened to you that your hard drive (or your entire computer) broke down and you lost the photos of the summer of 2006 that you spent in San Diego that you had so much appreciation for? A quick and easy way to avoid this is to create a backup, both of the entire disk or of the photos themselves, or whatever you want to save on another disk as a precaution. Also that way you can prevent certain types of viruses that destroy everything in their way from affecting you.
19. Every precaution is little. If you want to make sure that nothing happens on a network while you are not present, you can disconnect from the network, or directly turn off your router, for example at night, thus making sure that no one can attack you and thus have a “good sleep”.
20. Browsers. The Internet is riddled with web pages that track and monitor your activity and store information about us. Therefore, it is convenient to have a browser that allows you to block or manage as much as possible both the trackers and the well-known “cookies”.
21. VPNs. If you are looking to have privacy on the Internet, you can try using a trusted VPN, which is the closest thing you are going to have to “real” privacy in the “cyber world”.
And with that we finish off our round of advice! We hope that they will be of great help to you in raising the security level of your devices, and in general, of your home network.
Would you like to find out more about what Pandora FMS can offer you? Find out by clicking here. If you have to monitor more than 100 devices you can also enjoy a Pandora FMS Enterprise 30-day FREE TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here !
Last but not least, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all of our news and you like IT, releases and, of course, monitoring, we are waiting for you in our blog and in our different social media, from Linkedin to Twitter not forgetting Facebook. We even have a YouTube channel with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
In the last century we had very primitive computers and now, at the dawn of a new millennium are we the users who have become primitive !? Want to learn more? Let’s get to know User Experience Monitoring
My first computer, in 1987, was a laptop with a monochrome LCD screen and 16 kilobytes of program memory. They were 15,584 precious bytes and they were read and executed very quickly. When I started to study engineering, it was the turn for that noble artifact to perform approximate integrals and, bam! This is where user experience comes in, when the professor asked me to compare his final result with that of the computer.
Sometimes, depending on the complexity of the formula and the iterations requested, the teacher would finish before the computer. That is why I had to choose those parameters well before starting the calculation, just based on estimation. A decade later, GNU/Linux already existed, the Internet boom began (which has not stopped to this day) and we began to connect by applications that allow us to have a terminal window and thus leave workload calculation to servers dedicated to it.
The experienced user
What we were clear about was that computing power was needed. Decades had gone by where it was delegated to remote terminals and/or dumb terminals and the entire workload was done on a “supercomputer.” Sir Tim Berners-Lee created, de facto, HTML and web pages were like static board ads, changing from time to time. Something called Common Gateway Interface (CGI) was invented to allow them some dynamism. This is how we began to worry about the time it took to solve calculations and results and then present them in a web page template.
Databases evolved: I used MS Access® for small applications and for everything else dBase® and Clipper®. Then Visual Fox Pro® came, with which I was able to handle tens of millions of records on a personal computer.
It was inevitable that databases would pass by without impacting our lives. Later, in this century, PHP language was responsible not only for creating web pages, their HTML code, but we could also custom generate, in several versions, according to different parameters, connecting directly to databases and retrieving data for users in real time.
Brief retrospective
By the beginning of this century, Pandora FMS was born (in 2004, to be precise) and the checking and loading time of a web page, its HTML component, is part of what I consider primitive monitoring. It even has some advanced components, such as text search on the web page or simple login, like the POST type, to take the time it takes to return a result, among other Modules.For Pandora FMS, each measure is called a Module, which are grouped by Agents.
Meanwhile, desktop applications, now known as on premise, were also evolving. In said applications, all their binary code relies on the device where they are executed, and the data is either obtained from a local file or is connected to a database to obtain and edit information, more useful and widely used. They are also known as native applications of each operating system in particular.
Pandora FMS can do remote database checks and we can add operations that a user would generally do. For example, ask for the last seven days of sales, -if the database is online- how long it takes to return this result: if it takes X amount of seconds or more, return a warning on the screen or an alert by mail, SMS, and so on. This gives you a rough idea of the state and operation of a system, but it is not yet user experience monitoring.
Complex applications
As the computing power in servers has always been higher than in our homes or offices, the ingenuity of application programming interface, better known as API, was realized. An API is a set of functions, procedures, and subroutines that provides a “library” to be used by other software. Pandora FMS and many applications have this way of allowing third parties to develop their own interfaces to perform predefined tasks: create a new article in the database? Publish a price list? These tasks are candidates to be performed through an API.
But we are approaching user experience monitoring: if the application created by a third party goes slowly, where is the bottleneck?, in the application?, on the server?, in the communication of the server? Are there other causes for this delay?
Another detail to take into account is our human factor: I have personally had to be told that an application I have made “is going slow”. I took the source code, I changed the background color of the forms, I compiled, installed and received a variety of different responses: what got better, what got worse, etc. That is what is called qualitative reporting, but without figures or facts to support it.
Pandora FMS has real cases of experience monitoring where they reported quantitatively how and when process delays were detected. Thus we are already reaching the present, the applications that we use the most at the time of writing these lines.
Web applications
You can see how the Internet has changed the way we work to reach something that is practically ubiquitous today: web applications. Through a web browser, users are identified and everything is done online, whether the web application connects directly or, through API, to one or more databases.
They have the advantage of being able to quickly change forms for users, but it opens up other problems such as workload sharing between multiple servers and redundancy in data storage. For all this, Pandora FMS has excellent tools, and we can even add our own, that’s how flexible it is!
Said web applications can also be delegated to third parties, and if this is the case, Pandora FMS can monitor the service level agreements (Service Level Agreement or SLA): these scenarios are really complex and they may even need to include user experience monitoring.
Primitive Users
Thus, we have reached the great concern of our times: Is our computer powerful enough to run our favorite web browser? Because, actually, the vast majority only run a web browser and there they read their email, communicate through social networks, carry out their remote work during the pandemic, access their bank accounts, publish on their blog, keep spreadsheets online for different subjects…There are even dozens of tabs open, each one consuming processor and memory cycles by the web browser.
We have become rudimentary and elementary, even our web browser updates automatically. We can acquire a new computer and in a short time have everything working again as we had it since it is completely based on the web browser. I even have Mozilla Firefox and Google Chrome accounts that sync with my other devices like mobile phones and e-book readers: they offer this service to keep everything centralized.
With Pandora FMS and its Software Agent (small application installed in each device and that monitors locally) we can quickly know if these web browsers represent a very large workload for the device, as well as inventory of the software and hardware from all of them.
Have we been monitoring enough with this brief retrospective that I told you? This is where user experience monitoring comes in.
Experience monitoring
User experience monitoring is like simulating being a user who executes predefined monitoring tasks and whose results are carefully measured, saved and sent to the corresponding Pandora FMS server.
It was invented for all this that I explained you, both web applications and desktop applications.
To be honest, I’m not the first to write on this blog about user experience monitoring:
Essentially, and in both cases, it is about moving and clicking with the mouse and/or pressing the keyboard for each of the application options to be monitored. If you want to know the details in depth, you should undoubtedly click on each of these two articles after finishing your reading here, since there is not much left to finish off.
Progressive web applications
Of course the world is constantly changing. Now web browsers, through the support of each operating system, offer progressive web applications that blur the boundaries between web applications and desktop applications.
They base their technology on HTML, CSS and JavaScript (which works as PHP but on the client side), which is no surprise to us who are used to web applications. The difference is that it uses background processes that are responsible for intercepting our requests to the domain where the web system server resides, but go further using the cache of the web browser. They do not need installation as we know it (if the user consents to its use) and can even make use of their own local databases such as SQLite, for example.
Here monitoring is somewhat complicated, since these progressive applications are capable of working offline with previously saved data: it will be a matter of programming requests with content of random values to avoid this behavior. We can also refine and target our Software Agents to refine our monitoring task. But all of that is enough material for another article.
Before finishing, remember Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here: https://pandorafms.com/
Also, remember that if your monitoring needs are more limited, you have Pandora FMS OpenSource version available. Learn more information here: https://pandorafms.org/
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Do you know what Productivity porn is? We tell you everything you need to know!
“Have we gone crazy yet?”, this is a question that comes to mind very often these days. Indeed speed and excess is what characterizes the present time we live in. Constant and pressing stimuli that lead to viral videos, fake news and extravagant coach appointments that lead nowhere. Vanity and emptiness are for sale, even when it comes to productivity tips. “Do you know Productivity porn?”, this is another question, not as conventional but as relevant as the previous one, at least if you have fallen into its disturbing clutches.
To this day, we know that if you have managed to get to work, already a milestone, you will do so for an average of at least 90,000 hours in your life. That’s about ten years of consecutive work. Discouraging but true. So it is normal that, aware of the subject, you try to make the most of the time you spend at work. However, our desire for it has gone so far and in such a macabre way that, as always, it has ended up taking its toll on us. That harmful addiction to productivity, productivity, productivity and productivity at work has been renamed “Productivity porn”. A more stale and abominable “porn” than the “porn” we are used to.
Some obvious characteristics and signs of the so-called Productivity porn:
Productivity porn is often noted for its unrealistic demands,“If you want to achieve maximum productivity, get up at 5 in the morning and check out your entire mailbox, social networks and what the commercial postman brought before 6″ “Do you only have one planner? Go get several! In paperback as well as digital and online and fill them in with a succession of hours and perfectly delimited work blocks so that there is total evidence of the 15 minutes and 40 seconds of the rest for beer and tacos that you deserve once a week.”. Because Productivity porn is like that, consider that you are an indefatigable robot, perfectly designed to advance in your work and in your life or die in the exhausting attempt.
Even less realistic results. One can fan that flame: “Do not be yourself, be the best version of yourself, be the TOP of yourself, Leonardo Da Vinci and Cristiano Ronaldo, together, of yourself.”. But what Productivity porn does is try to capture and brainwash you into being a completely different person than you really are. Changing your personality so that it is replaced by a computer program, and also promises you that this transformation will take place from one day to the next. Like the diets of the telemarketing.
There is always a guru. Perhaps this is the greatest of the signs that Productivity porn presents. A god among men, who floats above them radiating a halo of light and who expresses with all his being an aura of “Admire me, I know the way (for everything) in this life”. Many times you will recognize him for appearing in the ads of your favorite videos on YouTube, others for his pedantic demagogy. In any case, his physical and psychological attractiveness is one of the greatest assets of Productivity porn.
It is very true that, as experts in the field, they will have achieved results sometimes, but it is very naive on our part, and misleading on their part, to believe that there is a definitive recipe, that if it is followed carefully, it could work miracles, to turn any of us into a profitable machine and harvester of successes, with the results that we hope to achieve at our feet in the blink of an eye.
If you’ve ever come across any of these striking features, you’ve likely been in front of the toxic tóxico Productivity porn. I’m sure right now you would know how to identify it among other realistic and evidence-based productivity strategies. Cool, it is important to be aware that applying Productivity porn can be harmful.
But why do we fall prey to Productivity porn?
If it smells rancid a mile away, why the hell are these unrealistic productivity plans so appealing to us? I already told you, Productivity porn points directly to our little heart, to that part that likes to have illusions.
And it is that positive thinking is usually synonymous with productivity, but fantasizing and constantly having our heads in the clouds, with our unlikely desires, takes us out of the most palpable and decisive reality. We plunge into a whirlwind of fantasy, based on dreams instead of facts, and we end up setting goals that, at first, can never be achieved. Bad things for true productivity.
And, surely, Productivity porn and its presumptuous and unreal routines do not help. Both planning, and reading excessively on how to plan, is an obvious sign of procrastination, also typical of Productivity porn, which takes us away from what we really should be doing: focus and work on our purposes.
We need more confidence and performance and less to have the false sense of work that planning too far in advance and in the long term gives us.
Spending the afternoon watching videos on YouTube about how this diet is going to get rid of that belly is much more comfortable than going down to the street immediately to exercise. ¡Focus!
Product tips of the day
We have already seen what it is and why we fall into this nervous breakdown that is Productivity porn, now we better see some tips about real productivity. Something that helps you move forward and focus, but not like a locomotive with an inexhaustible battery, rather like a capable and persevering being who wants to make their day to day something useful.
Accept your limitations.. The sooner you stop thinking of yourself as a Superman who endures and can do everything, the better. Consider yourself a Batman, he also has bad days and also gets tired of battling the Joker. Do not take your work home with you, do not corrupt your family life, love life, friendships or hobbies with it. You will come back with more enthusiasm if you leave your work apart from your private life.
Avoid spending the day looking for tips and secret formulas to save time in your life or in your work, and guess what, you will save precious time in your life and in your work.
If you install a new productivity strategy in your routine, give it time to work. It needs that, perseverance, diligence and discipline to master it. Do not go crazy because at the very beginning you have not achieved a world productivity record, give yourself time.
When you know that something works, keep it and do not change it, at least without prior analysis, by another type of strategy that you have been promised works better. Go at your own pace and if it works, don’t mess it up. Better productivity in hand than two in the bush.
And after all these recommendations? Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send your inquiries. The great team behind Pandora FMS will be happy to assist you! And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in this our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers. Ah well, we also have a new Instagram channel ! Follow our account, we still have a long way to go to match that of Billie Eilish.
How to destroy the world. Is it possible to take down the internet?
We have been warning for a long time: Pandora FMS will control the world. We have given time to world governments to prepare, to North American villagers to prepare their bunker, for sects to draw their banners with “THE END IS NEAR”. And it is, it is indeed. Today, in our blog we reveal the secret plans of this company to overthrow the institutions and rule the world, then you will say that we did not warn you. Get ready, run to hide, children and gentle pets first, because the time has come: Is it possible to take down the internet?
That is the key to everything: Is it possible to take down the internet? For years, in the underground facilities of our offices, scattered across all continents, Pandora FMS has secretly worked to create an evil robot with an evil appearance that will execute even more evil plans. Its super intelligence, unattainable for any other desktop on the market, will help us take what belongs to us from this wasteland called earth and make it ours.
That is why today, on our blog (soon the only existing one) we have the exquisite pleasure to introduce you to Pandorinator RDM (Radical Destructive Mindset), the superior and ominous AI created by our company to help us in the work of crowning ourselves as the sovereigns of the world.
“Damn! Is it possible to take down the Internet, Pandorinator?! “
Pandora FMS: Good afternoon and welcome, Pandorinator. Pandorinator RDM: Good afternoon everyone! Thank you for inviting me to this talk/colloquium at the end of the world.
Was it hard to get here with that alloy of platinum and gold that you have as armor?
Not at all. I have to get used to moving in it, otherwise one becomes paralyzed and does not come out of its hidden lair. In addition, it is a pleasure to wear it. Touch it, touch it! Don’t be shy! and watch it shine! Nor the roar of a thousand yellow suns at 12 noon radiating with their flames in summer equals it.
Let’s get to the point, Pandora FMS has always wanted to take control of the world, in fact that is why we created you, to advise us. With that said, Pandorinator, what do you recommend?
Well, a global pandemic, which is pretty trendy right now, confronting two great powers such as China and the USA, or, look, even easier, to take down the Internet.
Damn it! Is it possible to take down the Internet, Pandorinator?!
Of course it is, and I say that as an Artificial Intelligence expert on the subject of generating chaos. You only need to know inside out the critical infrastructure elements that make the Internet work.
What are these possible attack vectors?
Look, do you have a notebook there or something? Take note:
Specific services (web, mail, etc)
Through distributed service denial attacks, it is possible to “take down” services such as websites, applications and others. There are mechanisms to protect against these attacks (such as CDN) and today there are dozens of attacks of this kind daily, massive, but they are quickly mitigated and usually affect specific services (a company’s website) or the Internet as a whole. They often work like an extortion attack (either you pay or we take down your app). Thug life.
CDN
Basically they are large cache systems for publishing content, which allow Internet traffic to go smoothly. Without them, it would be much more expensive and slow to access all kinds of content, from images to text. All major media use CDNs.
The failure of a CDN can cause partial Internet blindness, cutting off access to large media simultaneously as it happened with the failure of Fastly in June 2021. There are many other CDNs and if they failed, that would mean the blackout of hundreds of thousands of websites of all kinds. The failure of a CDN only causes temporary problems (minutes/hours) in any case.
Domain Name System (DNS)
DNS is one of the most critical parts of the global Internet infrastructure. The downfall of all the world’s root DNS, as we know it, would truly spell chaos. There are 13 root (main) DNS servers spread across the world. They are hosted by organizations such as NASA, Verisign, the University of Maryland, or the US Army Research Laboratory. To sum it up… tough guys.
If the 13 nodes fail, although there are hundreds of thousands of secondary replicas around the world, it would be necessary to coordinate the recovery, which would lead to partial chaos all over the network. This has never happened precisely because of the security measures and the original design. But that’s what Pandora FMS and I are here for, right?
Cloud (Amazon, Azure)
Due to the intense concentration of many online services in public clouds such as Amazon or Azure, if one of them fails, that would mean all types of services not working anymore immediately. BOOM! Both AWS and Azure have different geographies to distribute the impact, but in the event of a physical destruction of one of their large data centers, the impact would be significant. Some premium services include automatic geographic high availability, but not all services can afford it. If the AWS data center in Ireland were destroyed by fire, tens of thousands of services would be affected for a long time.
Something similar, but on a smaller scale, happened when part of the data center of OVH, one of the largest European MSPs, got burned. Thousands of customers could not continue operating and lost data, since the backup in a different physical location was an optional service.
Connectivity
I know what you have in mind. A simple mind like yours might think that the simple cut of a submarine cable could blind an entire country, but the truth is that the Internet was originally designed to avoid such situations. The Internet has millions of interconnections that can be reordered automatically in case of failure of one of them to redirect traffic through the connections that are still operational.
Worms and Malware
A worm is a malware that is exponentially infected through the network and that can cause a collapse due to its massive use to try to replicate itself. In 1988, still at the dawn of the Internet, when technology and security were not yet very advanced, the Morris worm almost completely collapsed the Internet. Today a worm could collapse geographic sections of the Internet (such as a region) for a short time, but coordinating a massive attack is really complex to carry out without a large organization. Although, well, we could try…
It’s incredible everything you have in that quantum stubborn head we made for you, but I’m running out of pages to take note, Pandorinator RDM, could you give us any conclusions on how it is possible to bring down the Internet?
My, my, thanks for the compliment, Creator. I’ll give you your succinct conclusion: The Internet is designed for failure, so that we can lose services, but never leave the network inoperative at all. It is designed to be resilient and survive nuclear catastrophes that physically volatilize part of its infrastructure. The Internet is capable of regenerating its basic infrastructure (the routes that interconnect the nodes that make up the network) and the services that operate on them have their own ways of protecting and rebuilding themselves.
The only way we have to “turn off” the Internet is through a massive electromagnetic pulse that affects the entire planet or a massive Solar Storm. In both cases, the Internet crash would be the least of our problems.
And, listen, do you have a way to generate one of those massive electromagnetic pulses?
Me? Pay more attention! Who do you think you’re talking to? OF COURSE I HAVE! Right under this compartment, see? Even in the form of a red button.
Let’s see, let’s see…
How long will the planet as we know it last? Will Pandora FMS and Pandorinator RDM finally carry out their plans for world domination? You just have to stay tuned with our blog, our social media, and if Wi-Fi reaches you, because as the most cautious sect smokers announce: “THE END IS NEAR”.
Official comparison: N-Able vs Kaseya vs Pandora FMS
Lemons, oranges, grapefruits, limes… We know that they are not the same, but if necessary, you can make juice with all of them. And yes, we can and we will. We are in summer and it makes you want to make a good cocktail, doesn’t it? Today, in PFMS blog, we are going to analyze the commonalities of N-Able (Solarwinds MSP), Kaseya and Pandora FMS. Also their -remarkable- differences of course.
Both Kaseya and N-Able stand out for being RMM solutions and integral IT management systems in SaaS mode for MSP. In short, they are a very good solution for managing remote workstations and being able to manage and monitor them remotely. This includes tasks such as patch installation, remote software installation, network equipment configuration, remote desktop access, backups, and of course, receiving alerts when something goes wrong on managed machines.
Kaseya’s client is usually an MSP that provides services to different users, so it needs a tool that with a single license can serve different clients, managing them in an isolated, but centralized and homogeneous manner. This saves costs and is more efficient, since both Kaseya and N-Able are specific tools for Windows desktops that need to be managed remotely.
Pandora FMS client is usually an end company, or an MSP specialized in managing more complex infrastructures, which requires a tool with a more technical profile, which allows its technicians to apply their existing knowledge, scripts, etc. integrating them to compose an effective monitoring that allows them to go where other tools cannot. They are more oriented towards base infrastructure (communications, servers and applications) than to desktop computers.
In this comparison, we will also talk about prices, and both Kaseya and N-Able are above 20K USD in projects of 250 teams, yes, they are expensive tools and they also have a complex and peculiar pricing model, so much so that you will not be able to find these prices clearly on their respective websites.
A very important difference is that both Kaseya and N-Able are usually used in a cloud model (SaaS) (although they also have on-premise licensing), while Pandora FMS is a much more conservative model and is totally on-premise. This is especially relevant regarding the impact on security, since as the last hack to the Kaseya infrastructure showed us, attacking the manufacturer may imply that they can reach the end customer. As we teased long ago, Solarwinds is also not spared from this plague of security problems, and has suffered, since the first attack in 2020, several more attacks.
Given that Pandora FMS is a 100% autonomous installation (it can be installed in an environment without Internet access), and that Pandora FMS agents are not accessible from the outside nor can they be updated remotely, it is, by design, somewhat safer than Kaseya and Solarwinds. However, no one is spared, and Pandora FMS during 2020 and 2021 has published several security patches, as it can be seen in the CVE registry of Mitre.org.
As a summary, we have created a table that describes features. Below there are some additional explanations.
N-Able vs Kaseya vs Pandora FMS
Prices
Others don’t talk about prices, we do. And we do it because it is something that everyone wants and needs to see. We know that it is very difficult to compare them because no product is licensed the same and they do not even share the same concepts. What we do is propose a more or less understandable and standard project to be able to compare the costs in three years. Let’s say, for example, that you want to monitor about 250 computers distributed among virtualized servers (30), workstations (200), physical network equipment and physical servers. Making a total of 250 teams. Well, the cost of a THREE-year project, without professional services and with standard support, would be the following:
Kaseya: 30,000 USD
N-Able: 50,000 USD
Pandora FMS: 15,000 USD
Conclusions
Both N-Able and Kaseya are products that excel in desktop management capabilities: patch management, software installation, and configuration change management. They provide added value such as monitoring, backup, security policy management and remote control. To all of this, they offer a layer of additional services such as ticketing and a portal for MSPs to offer their clients an integrated management and billing platform (the latter only in the case of N-Able).
They are very oriented to job monitoring. Monitoring, although it covers many aspects, is not the main focus of the product, especially if we consider some advanced features such as:
Service-oriented monitoring (defining of service trees).
High capacity (more than 10,000 devices).
Advanced monitoring of enterprise technologies (Oracle, SAP, VMware …).
Detailed monitoring of cloud environments (AWS, Azure).
In general, both N-Able and Kaseya have monitors for all kinds of applications, but only from a very superficial and remote point of view. That is, they are limited and not easily extensible.
If we add the high costs to this, Kaseya and N-Able do not seem like a good option for server monitoring projects or core infrastructure. For that, Solarwinds has a more traditional on-premise solution, although with costs of a similar order of magnitude, while Kaseya can only offer its product in an on-premise model.
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here . If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Imagine being offered an electronic lock for your front door. One that allows you to open the door through a mobile application in the cloud, would you accept it?
They promised that they would never lose the key, that with the app your would be able to open the door remotely and even through a webcam in the peephole, the device will be able to recognize your face and welcome you.
Well, that would be making things even easier, thieves no longer would have to go door by door, breaking locks. A good thief would be enough to break the security of the company that manages the application in the cloud and resell the master key to the highest bidder on the deepweb, this includes criminal groups around the world. Days later, if not the same evening, specialized thieves will enter the houses of the selected clients, because, of course, in addition to the master key, they will have a list of clients with attributes, names and addresses. The cloud company will have to choose between crying, denying everything and declaring bankruptcy. The president of the company (CEO) will probably be the first to sell his shares in a hurry.
Weeks after the thieves almost run out of addresses on their lists, thanks to the webcam and access logs, because through those they will know that there is no one at home, the owners will arrive at their homes and when they arrive, they will not know what happened, among other things because there will not even be, a forced door.
Please don’t laugh, does it look like the script from an upcoming Netflix production? You should know that what I tell you has already happened before, including the CEO selling shares in a hurry.
It may seem like a step back, but making the decision to go back to old-fashioned IT management can be the difference between life and death for a business. Cost reduction, service outsourcing and the culture of “everything in the cloud” leads us inexorably to this phenomenon.
It happened. It’s happening. It is ransomware. It is about encrypting all the information and then blackmailing for its recovery, its decryption.
They enter your house, they take everything and if you want to see it again, you will have to pay a ransom. The information is still there, encrypted, inaccessible. Nothing works and what is worse, if you try something or you don’t pay on time, they will erase everything forever.
This time those affected are not governments or large companies. They are greengrocers, nursery schools, restaurants, dentists… hundreds of small and medium-sized businesses have had to close due to their computer systems being blocked. Again, a ransomware attack that encrypts and locks all the hard drives on your computers. Tomorrow it could be your business… or your own personal mobile. It is connected to the cloud, right?
All the victims had one thing in common: the remote access and patch management software they used at their companies. This software, Kaseya, is sold to managed service providers – outsourced IT departments – which they use then to manage their customers’ networks, usually small businesses. That software, of course, works in the cloud.
The cost of the ransom is not the most important thing, although the figures are not small (we speak of 70 million dollars for Kaseya, an average of 300 thousand USD to each individual affected).
Could it happen tomorrow again?
Absolutely, YES.
The problem is no longer the software itself. It’s not that Kaseya is a bad software or it is poorly made. Probably its level of engineering has nothing to envy to the giants of the industry like Microsoft. Everything can be improved, but that is not the issue.
As it happened with Solarwinds, a security problem led to hackers taking their malicious software inside the client, using the attacked software’s own update system to spread. Like a virus that replicates inside its victim and spreads to relatives, once inside a house, sheltered from heating and blankets. Once the attack perpetrated this way, the company in turn had problems sending the patches to its customers, that is, the patient could not get the medicine that would cure him. For some customers who never responded electronically, they had to call them to tell them the software update procedure.
The problem with Kaseya is that we are not talking about software for large companies, which requires qualified personnel for its operation, but rather a software used to provide services to small companies without technical personnel, or very few, and that cannot manage such an attack.
While Solarwinds is used by government organizations, banks, and companies on the top 500 Standards & Poors (an American financial services rating agency) list, Kaseya is used by small and medium-sized businesses around the world, and the security problem is much more massive and its impact can be even more devastating.
If the attack is directed at a company, and it is successful, it allows taking control of that company. If one service provider is attacked and the attack succeeds, all their customers’ systems can be accessed. That is why the attack on Kaseya is so serious, because Kaseya has tens of thousands of customers around the world due to its SaaS (Software as a Service) model.
Although Kaseya is a US company, affected companies have already been reported throughout Europe, the Middle East, Asia, and South America.
The attack was so successful that companies like Elliptic, which analyze cryptocurrency networks to analyze unusual traffic, are scared by the number of victims who are proceeding to pay ransoms. No doubt, if the attack was a success and made lots of profit, there will be many more.
Can it be helped?
Well, imagine that you’re invited to a barbecue in a garden. Everything is beautiful, it looks like a villa in Italian Tuscany. The temperature is perfect and the aroma of the food is delicious. The wine, the company, everything is fantastic.
There is only one problem, mosquitoes are going to devour you. When you go back home, you will not be able to sleep, you will end up full of bites and will wonder how it is possible.
Something similar happens with Kaseya and Solarwinds. They are fantastic, but, do you see yourself all your life assuming the inconvenience of eating in the countryside? It is not about putting on pants or applying insect repellent. There are wasps, ants, all kinds of bugs in the countryside, attracted by people and the smell of food.
A party in your home kitchen may be less glamorous, but if you just want to eat well and not watch out for mosquito bites, you know the smart thing to do. It will be more inconvenient, even more expensive, but it controls the environment.
The same goes for applications based on the cloud or based on the SaaS model. They have many advantages, but security is not one of them, because you delegate it to organizations that you do not know.
If you rely on IT for your business continuity, you may need to step back and go back to more conservative models. After all, trends go by and the world keeps on running.
With Pandora FMS SaaS monitoring you can start operating almost instantly, using our Enterprise technology, thanks to any of our certified partners who offer this service. This allows you to focus exclusively on the operational aspects, control costs and growth from the very first minute, without having to invest in training, licenses, management, updates, initial implementation, etc.
Let’s cut to the chase. The standard SaaS would be closer to the guy who´s made his bed so he can lie in it, simply by hitting the buy or try button in the provider of his choice within Pandora FMS certified ones. Perfect to start a project or to operate a medium or small sized environment.
However, our new SaaS Plus model goes much further. It is suitable for that other type of professionals, who need to scale from an environment with hundreds of agents to several thousands. Due to limitations beyond their control, it cannot operate on its own, in a more traditional (on-premise) model. In addition, these professionals are looking for help in the early stages, with consulting and integration. Just what we do best: helping. You will also have custom support with the sale, which is done individually, guided by a sales engineer, with a specialized technical profile and the support of pre-sales and support engineers.
Okay, but then what makes SaaS plus different from Pandora FMS?
100% system control (hardware, OS and Pandora FMS).
Hour packs for custom adjustments.
Monitoring operation./li>
Agent installation services and remote deployments.
Installation and dedicated staff.
24/7 NOC (Network Operation Center) operation anywhere in the world with customized service level conditions.
SaaS Plus services can be run in any country in the world, relying on local partners to integrate the best of partner proximity and experience and vendor expertise and support.
Would you like to learn more about this new Pandora FMS release? You can download all the information right here
If you have to monitor more than 100 devices, you may also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Cloud installation or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
Pandora FMS organizes its official annual barbecue, summer 2021
Christmas 2019, bubbly employees of Pandora FMS meet, without their knowledge, for their last group meeting outside working hours. Games and lots of laughing, fooling around, party horns, appetizers topped with prawns and champagne. “What do the Christmas baskets have this year?” “Pass me the goose fuagrás to spread on top of my little toast with extreme delicacy before it gets soft.” Party drags on into the night in a murky local of shishas. People in ecstasy embrace one another and we love, celebrate and have fun, promising, at the end of the night, to see each other again in a short period of time. Oh, what will be our surprise when a world scale cataclysm explodes and prevents all real contact until the very and already sacred company barbecue of this summer 2021..
Because it’s been like that, many of our most intimate company buddies have not seen each other, breathed, or touched each other since that last Christmas meeting of 2019. How sad. They missed each other with such force and profusion that this new reunion has only been able to be resolved and collapsed in a celebration, such as the hippy Woodstock Festival of ’69 or the arrival of Pope John Paul II in Brazil, with the Mass in the stadium of Sao Paulo and everything.
But the event didn’t just consist of a series of friendly reunions in slow motion while smelling the bacon being roasted to perfection in the background, just between crunchy and tender, no!, it was much more, and I will take advantage of the fact that we live in the golden age of digital photography to illustrate it.
Pandora FMS – Sacred Company Barbecue, 2021
To start off, we must first talk about the location. From the beginning different options were considered, the beach of Leandro in Fuerteventura, for example, although the procedures to make that hidden place an Ibizan enclave were going to be hard to manage, or the midfield of the Wanda Metropolitano, stadium of our beloved Atlético de Madrid. But that didn’t turn out well either. On the same day, the only date in Spain, Taylor Swift played. So we decided on something more cute and Sundayish: a campsite, full of friendly tourists bathing in the sun and chubby children, who, given their parents getting their fill of sangria, ran near the edge of the pool without anyone stopping them. Caravans, robust prefabricated huts, public toilets, elongated porches, the possibility of jumping on a trampoline right after having lunch and under the heat of three in the afternoon… In short, a paradise that can only be described by Virgilio or by me. Camping Alpha, it was called. We had a great time and from here we recommend you to visit it.
The first to arrive were in charge of establishing the foundations of the organization of a good barbecue: cool the beers, open the bags of crisps and hot dogs, and pray that they do not have the only important mission: to be the official chef of the evening. It is a position that is applauded and praised but hated. Nobody wants that kind of work. And less in June at thirty degrees. Staying safe from the sun and beer nearby, that’s what everyone longs for. However…
However, there were heroes. Heroes named Quique Condés, Channel Manager in the company, and Marcos Serrano, Graphic Designer, who risked their physical integrity by approaching the fire at filthy temperatures, to sweat and present us at the table the greatest delicacies that can be offered by bacon, sausages and ribs. Poets of the forge, smoked by the black seed of coal, effects of Fata Morgana reverberating in her armpits, and… yet always firm and ready to smile. Few beers were offered in appreciation.
Here is a sample of their haute cuisine. We will upload the video to our channel with the recipe. But take note, you need bacon and salt, peasant style bread, if you like to eat with two loafs per serving of meat.
Here we already have a sample of Renaissance art. The Last Supper if Yesuscraist had taken his Jewish epigones to a campsite. The important thing is to eat in a hurry and eagerly. You know your companions. If you are not fast enough, they will leave you without the long-awaited seasoned ribs. So a bite of sausage, a few crisps of these birthday bags, bread, do not forget, chew twice and swallow it all with cold beer. There is no place to choke. It is time you waste without eating.
Here you can see grazing, in their natural habitat, that small subgroup which are the interns. If you get too close, they will scatter, like a herd of wild bamboos still close to puberty. But if you however think you have mastered their language and say “cool” and “awesome” things without squeaking like the mature oldie you are, you can try socializing with them. But don’t trust yourself too much, take care not to end up telling one of your battles, otherwise they will leave bored one by one, without you noticing and they will regroup away from you.
However, sometimes there may be a respectful relationship between intern and tutor. A bond as strong and knotted as Emma’s lacquered pigtails in the Spice Girls. Based on complaints from the intern and sealed by the corresponding reprimands by his superior authority. I let you guess, dear readers, who of the two is the intern and who is the tutor.
Many may think that it is a by-product, but here is a clear, faithful and quick example of the smile and the festive blush that a good bottled sangria can draw.
As every year, at each official barbecue, the famous Artica Awards were held. So don’t panic. These two burning chives are our presenters. On the left, with stylized leopard shorts, the Ana Obregón of yoga and reception, Carmen Rodríguez, and on the right, with a visible joy produced by the twelve beers he already had, Dimas Pardo. Both were in charge of guiding the gala with the elegance and the know-how that characterizes them. They were the perfect coupe. They fit better than two Lego pieces fresh out of the box, the Iron Man armor in the first movie, the whipped cream and the Kama-sutra with your last girlfriend.
Here are the categories and winners of this year:
SEXIEST person: .Kornelia Konstantinova.
DRUNKEST person: Alberto Sanchez AKA Alsanba.
FUNNIEST person: Marcos Alconada.
Most ABSENT-MINDED person: Raúl Martín
KINDEST person: Javier Mannuzza.
BUBBLIEST person: Technical tie between Carmen Rodriguez and Alexander Rodriguez. *They are not brothers.
CLUMSIEST person: Lidia (intern) *She does not have last names because she is an intern.
SMARTER person: Rafael Ameijeiras
Most CREATIVE person: Javier Mannuzza
Most MYSTICAL person: Elias Veuthey
Here we have Marcos Alconada showing off his exquisite award: a chicken hat with a light feather and scarlet caruncle. We know, for good measure, that there will be no Tinder date or Nephew’s Communion in which he does not take it upset and cackling.
Another of the winners, Elias Veuthey. Although he won in the category of mysticism, for his knowledge in this science and the enigmatic aura that he gives off, he was also nominated, as is evident, in the category of sexiest. There were fights in the pool to sign foreheads, thighs, arms and backs. We ran out of permanent markers. Damn groupies!
We finish the photographic tour with the winner in the sexiest category. She is Kornelia Konstantinova and right now Elle and Vogue magazines are crazy over her for their covers, and, well, Marvel Studios has already offered money to speed up Scarlett Johansson replacement as Black Widow in possible sequels to the franchise.
And with this we close this extensive slide show. We hope we made you jealous enough, dear readers, so that you will sign up next year, whether it be to the pool, as volunteers to cook or in the voting of the award nominations. Meanwhile, if you miss us, we wait for you in our blog and in our different social networks, from Linkedin to Twitter not forgetting Facebook. We even have a YouTube channel , and with the best storytellers. Ah, we also have a new Instagram channel! Follow our account, we still have a long way to go to match that of Billie Eilish.
We travel back in time in search of the first digital transformation
“-Jimmy! Define Digital Transformation!
-I haven’t studied it…
-There are no excuses, it is a very intuitive and well-known concept, even for an elementary school student.
-Mmm…
-Come on, Jimmy! Or I’ll give you an F that will give you blisters!
”
It was right then that Jimmy rose like a spring, and with his mind blank and his gaze clouded, he snapped a sonorous and mechanical sound to the horizon:
“Digital transformation is that change or advance relative to any application of new digital technologies in all aspects and aspects of human society.”.
“-BRAVO, JIMMY! BRAVO!”, applauded the whole class.
That day they carried Jimmy out of the building on their shoulders and immediately instituted summer vacations for the entire school, in the middle of October. From here we can only say: Thanks, Jimmy. We will use your neat and undeniable definition to trace today, on Pandora FMS blog, a journey through time in search of the first notions about digital transformation and its consequent repercussions. So join us, if you like, on our tuned, hybrid, and full of diesel DeLorean, to make an absolute reference to Back to the Future.
Digital Transformation in 2011, 2013 and 2015
We have already burned wheels in two parallel lines of fire with our DeLorean and we have reached 2015. Do you remember? Jorge Lorenzo won his third MotoGP World Championship and Juan Goytisolo received the Cervantes Award. That same year the research center MIT Center for Digital Business and the private firm Deloitte declared: “mature digital businesses are focused on the integration of digital technologies, such as social, mobile, analytics and cloud, at the service of the transformation of how business is done. In contrast, less mature businesses are focused on solving discrete business problems with individual digital technologies.” Is it clear enough? If you are not applying digital transformation, your chances of being left behind are high then.
In 2013, the Year of Faith according to the Catholic Church and the year of Luigi according to Nintendo. Not that long ago, not even a line on our DeLorean’s tank marker, we found a very uneven analog-digital conversion, according to Booz & Company, the global strategy consulting team. We are talking about sectors and countries lagging behind in converting from analog to digital. I am sure that if you look back, you will remember the uncertainty and slowness of analog technology. Politicians and strategists at the helm around the world had to step up the development ladder in this paradigm shift. The economy depended on it!
In 2011, with the death of Steve Jobs and the beatification of Pope John Paul II, we find that only a third of the companies around the world have a particular program of truly efficient digital transformation. Sad, yes, but as we travel backwards we will feel this crudeness more strongly.
Digital Transformation in 2000
We refuel our DeLorean in 2000, big milestones of the year? I got Pokemon Gold with Typhlosion at level 91. At that time, digital transformation was a fact very much in mind and in which they were already working, but the arrival of the three Ws (World Wide Web) changed, profusely, the speed and scope that digitization would show. There was increased pressure from societies to pass this process.
Digitization had become a concept/argument that was used at all times. And of course, it had to do with the increased use of the Internet and IT at all scales. This climate, already so common in companies, made us all aware of the issue and even the EU, for example, created the Digital Single Market. From this place arose many of the ideas with which the political agendas of the different countries of the Union were nurtured. The transformation of their different societies began gradually.
Digital Transformation much further back in time
I know you didn’t expect our DeLorean to be past eighty. After all, many believe that from there, apart from the unquestionable Back to the Future franchise, comes all the magic of digitization. However, it is time to accelerate. The Flux Condenser will fume but it will be worth it. If we get stuck in the past, with no possibility of returning, we will learn its customs and form a new family while we make ends meet by investing in aspirin or the gramophone.
In 1703, the King of Portugal, Pedro II, declared himself opposed to the cause of Philip of Anjou and Tsar Peter the Great founded the city of Saint Petersburg. However, the digital transformation has to give thanks at that time to Gottfried Wilhelm von Leibniz, who, attentive, gave birth to the concept of digitization in one of his most transcendental publications: “Explication de l’Arithmétique Binaire”. Years later, 1854, 1938, approx, geniuses as renowned as George Boole and Claude Elwood Shannon complemented and developed it.
In 1939, World War II begins and Gaby, Fofó and Miliki decide to form a comic trio of clowns. But we also have George Stibitz, known in the trade for his work on the development of digital logic circuits and, nothing more and nothing less, than for laying the foundations of the first digital computer. In addition to popularizing the term “digital”, very important for this article.
In 1961, Yuri Gagarin becomes the first human being to travel to outer space and Roy Orbison releases his debut album, “Roy Orbison at the Rock House”. But who interests us is Leonard Kleinrock, the American, engineer and science teacher who conceives the Internet in his work “Information flow in large communication networks”. To this day (the day the article is published), this man is still alive. Better go pay tribute to the door of his house. He resides between New York and Los Angeles and likes camellias.
In 1969, the arrival of Apollo 11 to the Moon and the Beatles’ last public performance. The ARPANET network was also created, commissioned by the US Department of Defense, and which is basically the seed of what we now know as the Internet.
Now that we have returned, unscathed, from our journey in search of the past milestones and nuances of the “Digital Transformation” concept, and now that the DeLorean is parked, until the next adventure (in which we will undoubtedly go see a Tyrannosaurus Rex or a Queen concert), we can resolve that the digital transformation has led to important changes within business models, social and economic structures, political and legal decisions, culture and other organizational patterns that guide us in the present. The concept went from a small and private sector to reach the hands of a huge public, always eager to master new technologies. The question is: In this new kingdom, as we have seen, new and old at the same time, what is your place?
Would you like to find out more about what Pandora FMS can offer you? Find out clicking here .
If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise, you choose !! Get it here .
Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .
Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!
And if you want to keep up with all our news and you like IT, releases and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from Linkedin to Twitter through the unforgettable Facebook . We even have a YouTube channel , and with the best storytellers.
Find out what VMWare is and how to include it in monitoring
Before we dive into how to monitor virtualized environments with VMWare, let’s clarify a couple of concepts for those who are less into the subject, starting withWhat is VMWare?.
VMWare is a software product development company, mostly related to virtualization, and more recently to containerization, although this is beyond the scope of this article. Today, we are going to focus on monitoring virtualized environments with VMWare.
To do this, the first step would be to know what virtualization is. A quick summary, and a bit imprecise I must say, but that will give you a general idea. We can claim that virtualization is like dividing the components (CPU, Memory, Disk, etc.) of a physical computer or server (which we will refer to from now on as Bare-Metal) into virtual or emulated components. This will allow us to share the same component between different instances which we will call “virtual machines.” That way, using a single set of hardware, you may have different virtual machines running different versions of operating systems, applications, libraries, etc. simultaneously and separate from each other.
The interesting thing about this is that, for the virtual machine (which we will refer to as VM from now on), the resources that have been assigned to it are only from it and are real elements. This opens a world of possibilities, it allows you to have many services and virtual machines running on a single hardware device with the energy, space and cost savings that this implies. In addition, since it is all at software level, it will allow you to manage the machine as one more file inside the computer, being able to copy it, modify it or even package and distribute it.
The advantages of virtualization are more than proven and today almost any service and infrastructure runs mostly on virtual servers. A very clear example is when you go to your favorite cloud provider and click a button to activate an instance of a database or a server, actually what you’re doing is activating a virtual machine that it already had pre-configured and that can work for you in a matter of seconds, thanks to this technology.
Due to these types of advantages, and because of the massive distribution of virtual machines in most ecosystems, it is so important to have a monitoring tool capable of adapting to this type of environment efficiently.
Now that we know what virtualization is, we will see a new concept. We already said that from a physical machine we can emulate and subdivide its components to create instances of smaller virtual machines, and it is true, although there is a small nuance, we require software devoted to this, we call this software hypervisor.
There are different types, manufacturers and features we are not going to delve into today. If you are interested in this topic and want us to do a more detailed article on virtualization leave it in the comments
vSphere
Today we will focus on one of VMWare’s most widespread and well-known products: the vSphere suite which, according to Wikipedia, “is VMware’s core business suite, the cornerstone on which almost all the business products they offer rely on. It consists of the ESXi virtualization software that is installed directly on the servers and the centralized management console vCenter.2020 ”
As we have seen, vSphere is the name of the set of tools that VMWare offers for device virtualization, there is a range of different vSphere environments, from a single ESXi server that works as a hypervisor as well as management.
To much more complex environments where several ESXi work in parallel being managed by a centralized administration software called vCenter.
Virtual environment monitoring
To monitor virtual environments, whether it is from VMWare or not, there are two main ways.
The first is to treat each virtual machine as an independent machine, attacking its operating system with standard protocols or using some monitoring agent.
This approach does not require for the tool have a special or devoted management, since it will deal with each VM as any other machine. Along this approach, we can say that we will interrogate the operating system, therefore, in heterogeneous environments, we must define metric captures for each system.
The second way is more general and allows deploying monitoring very quickly and efficiently. In this case we will integrate the hypervisor, since it has information on all the machines it contains and we can interrogate it directly. For each manufacturer the protocol, the responses and the format with which we will interrogate the hypervisor may vary, but in most cases they have an interface to communicate with it. Along this approach, it is the monitoring tool that must be adapted and have a connector to communicate with the supervisor in a centralized way.
Of course, Pandora FMS has both types of monitoring, being able to combine them if necessary if deep and detailed monitoring is required.
In today’s case, we will see the monitoring integrated in Pandora FMS Enterprise Discovery tool. That will allow us, in a very simple way, to connect well, either with a standalone ESX or with a vcenter, through the vmware SDK.
vSphere Monitoring with Pandora FMS
Starting from the fact that we have a Pandora FMS Enterprise instance, the steps are very simple: by default Pandora FMS has the necessary libraries to connect to a VMWare environment, you only need a user account with reading permissions and connectivity with the ESX or vCenter as the case may be.
Once you fill in the simple form with the data from our VMWare environment:
You will see a window to configure some monitoring data, such as the scan interval for new machines, the execution threads that you will devote to this task, if you want to activate network monitoring and (only for vcenter), if you want to capture the environment events.
Once finished, you will be able to see that a task has been added to Pandora FMS task list, where you will be able to see its last execution, enable it, disable it or force task execution manually.
The default task will give you information about all the ESXs (in the case of vcenter), virtual machines and datastores available in the vmware environment that you configured, returning the following metrics:
Default monitoring for Datacenter:
Ping
Check 443 port
Default monitoring for Datastore:
Capacity
Free Space
Disk Overallocation
Free Space Bytes
Default monitoring for ESXi:
CPU Usage
Memory Usage
Received data
Transmitted data
Disk Read Latency
Disk Write Latency
Host Alive
Disk Rate
Net Usage
Default monitoring for virtual machines:
CPU Usage
Memory Usage
Tools Running Status
Host Alive
Disk Free
Disk Read Latency
Disk Write Latency
Received data
Transmitted data
Net Usage
In addition to the metrics described, you will also have a specific view for monitoring vSphere environments that has compilation information on the general state of the environment and each monitored ESX and even a map of the monitored infrastructure.
As you can see, it is very easy to start monitoring a vSphere environment with Pandora FMS, just follow a few steps and you will have your VMWare monitoring integrated quickly and easily.
If you are interested in knowing in more detail how synthetic transactions are configured and executed with Pandora FMS, do not hesitate to visit our YouTube channel, where you may find different contents such as tutorials, workshops and a lot of other resources devoted to this and many other topics related to monitoring.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.