Have you modified your network configs for remote workers? Keep track of and manage changes.

By now, we’re all fairly aware that the ongoing crisis has changed the way people work. Businesses around the globe have adopted the remote working model. Many jobs today are compatible with remote working, with business-critical applications readily accessible through the internet. However, not all applications deployed in an organization are available through the internet. Some of them are available only on the business’ LAN due to security concerns.


How an IT services company reduced service delivery time by 50%

April 1, 2020 When it comes to IT Services, their whole world revolves around offering technology solutions with support and management. For these companies, it has become important now, more than ever, to modernize their workspaces and make the shift with IT digitization to effectively manage complexities like maintenance, security, scalability and resilience. While digital transformation may sound great in theory, in practice, it presents some unique concerns for businesses.

pandora fms

VLAN, WLAN, LAN... and other types of networks you should know

If you thought the fishmonger’s hair net was the only kind of net you’re wrong. From Pandora FMS we will show you some more, so that you do not get lost without them. The term “network” is used in computing to name a set of computers connected to each other in such a way that they can share resources, services, and information. There are several ways to classify these networks, based on their scope, relationship, or connection method.

The 5 Best Open Source Load Balancers

Consider for a moment which fundamental pieces of technology enable the modern web. Odds are, you’re thinking about things like Javascript and HTTP—and yes, they are fundamental parts of the modern web. But, the often-overlooked component of this ecosystem that has truly enabled the web to scale to billions of users and transactions is load balancers.


EKS Networking Best Practices for Security and Operation

Securing your Elastic Kubernetes Service (EKS) cluster’s network traffic and access is crucial for the entire cluster’s security and operation. Follow the below recommendations and best practices to protect your Kubernetes network on EKS. Why: By default, network traffic in a Kubernetes cluster can flow freely between pods and also leave the cluster network altogether.


Top 10 Reasons Why NMS is A Must Have

March 26, 2020 Nothing’s worse than getting a call from the users that the network is down. Too often, IT lacks the visibility they need to get before performance issues arise, meaning you’re in the dark until a user or customer calls to complain. Once an outage happens, the clock is ticking. And the more time you take to understand and resolve the issue, the more it costs you: in terms of customer dissatisfaction, and also staff time & lost productivity.


Virtualizing a Network Operations Center

A Network Operations Center (NOC) is a location from which IT support technicians can supervise, monitor, and maintain client networks and infrastructure. Because they act as a central nervous system for many organizations, NOCs are typically located in a central physical location. The global coronavirus (COVID-19) pandemic is an unprecedented situation that is creating new challenges for everyone—and that includes NOCs.


4 Ways to align your Service Desk to business operations

March 24, 2020 As an IT leader, it’s important to step back, sometimes, and view what you can do better with your service desk. Because small issues and inefficiencies can easily add up to day-to-day chaos. In organizations where IT services are aligned with business objectives, they are more likely to make investments in new technologies like AI & ML. Periodic reviews will make sure that the alignment stays.


An Introduction to Web Proxies

Web proxies intercept traffic from your systems as they move to other systems, analyze the packets, then send the data along. There are a lot of reasons why you might want to intercept packets. Originally the main use case for a proxy was as a caching server. In this use case, the first time a person in your network goes to a website, the static content (particularly graphic images) gets downloaded and cached.