Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

What is RMM software?

In this article, we will thoroughly address RMM Software (Remote Monitoring and Management Software) and its essential role for Managed Service Providers (MSPs). We will explain the core functions of RMM, from remote monitoring to efficient management of client devices, highlighting its key advantages such as reducing labor costs and improving productivity.

2023 A year of achievements and transformations at Pandora FMS!

On this exciting journey, we celebrate the successes of our team over the course of an incredibly productive year. From solving 2677 development tickets and 2011 support tickets to spending 5680 hours on projects and operations, each metric represents our shared dedication and success with our valued customers, which are the engine of our growth.

What is the principle of least privilege (PoLP)?

The Principle of Least Privilege, also known as PoLP, is a computer security rule that states that each user or group of users must have only the necessary permissions to perform their corresponding tasks. In other words, the less power a user has, the lower the chances of them having a harmful impact on the business.

What is SSH?

SSH stands for “Secure Shell.” It’s a network protocol used to securely access and manage devices and servers over an unsecured network. It provides an accurate form of authentication as well as encrypted communication between two systems, making it especially useful in environments where security is a concern. SSH is commonly used to access remote servers through a command line interface, but can also be used to securely transfer files (through SFTP or SCP).

What is Cloud Computing? Everything you need to know about the cloud explained

Cloud Computing is a service offered by several software providers paying a rent either by the hour, month or use of said service. They can be virtual machines, databases, web services, or other cloud technologies. These services are on remote servers provided by companies such as Google, Microsoft and Amazon among others that for rental or in some cases free of charge, provide such services.

IT Support Levels: Optimizing the Support Service through Tiers 0 to 4

Information Technology (IT) support, also known as technical support, is essential for the successful and efficient operation of organizations in the digital age. It helps ensure the stability, productivity and security of your systems and those of the people who depend on them.

Unraveling the Dangers of Phishing: From Basics to Effective Prevention

Surely you may have at one time or another received an email warning of an outstanding invoice, a parcel shipment that you did not expect or a warning from the bank about suspicious activity in your account. These messages usually adopt an alarming tone and provide you with a link to a website that you must visit right away to verify your personal information or to complete payment information. Caution! This is a “phishing” attempt, one of the most popular scam methods on the Internet!

What is Service Desk and how does it help IT departments?

Skilled IT leaders understand that consistent and sustainable growth comes with a number of significant challenges. Developing IT growth requires a cohesive strategy that aligns perfectly with the engine of that operation: And that is Service Desk, the undisputed main character of this journey.

What is remote access? An open door to productivity and flexibility

What is remote access and how has it transformed work dynamics around the world? Let’s dive in, explore and discover together how this innovative practice has reshaped conventional work structures and opened up a whole range of possibilities!

9 ChatOps tips your team should adopt today

Pandora FMS is an excellent monitoring system that helps collect data, detect anomalies, and monitor devices, infrastructures, applications, and business processes. However, more than monitoring alone is needed to manage the entire incident lifecycle. ilert complements Pandora FMS by adding alerting and incident management capabilities. While Pandora FMS detects anomalies, ilert ensures that the right people are notified and can take action quickly.