Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

What are MAC addresses? What are they for and how to find them?

At the shadow of the widespread IP addresses, MAC addresses say even more about our devices than its more popular sister. As a kind of “identity document for network devices”, a MAC address informs us about “who is who” when connecting to a network. Of course, remember that the one called “MAC” has nothing to do with Macintosh computers. In fact, you can find it on devices of any brand.

The Benefits and Drawbacks of SaaS: The New Paradigm vs On-Premises Software

SaaS has rapidly become the go-to software and computing solution for businesses and industries across the world. While it’s costly to develop and deploy servers and infrastructure for your business out of pocket, you will be glad to hear that software-as-a-service seems to be a more affordable and more scalable solution for just about everyone. What are the benefits and drawbacks of SaaS?

We achieved ISO/IEC 27001

We live in an uncertain world and monitoring should try to make sure that whatever happens we will always be informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy as a product. Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude. For years we have attended international fairs, events where computer security is offered as specific products.

Monitoring and security: an open marriage

Confidentiality, integrity and availability are the three basic laws of security. Availability is a kind of wayward son who becomes prodigal when he likes to, even if it is just to write eulogies with it when the systems go down, although the truth is that it is the most neglected out of the three of them and perhaps that is why monitoring has become more approached for what it may come from outside than what it is inside.

Pandora FMS Enterprise in High Availability

Pandora FMS is a proactive, advanced, flexible and easy-to-configure monitoring tool according to each business. It gets integrated into all the needs of servers, network computers, terminals and whatever needs to be monitored. This article applies exclusively to Pandora FMS Enterprise and what is exposed cannot be used in Pandora FMS Community.

8 ideas on how to boost your team's productivity

IT teams are essential for many companies to work. And, although due to the nature of their work they have certain features, you should not forget that, after all, they are human teams, so they have similar characteristics to those of any other group. The sensible thing, then, is to remember that if you want your IT team to work to the fullest, you must be able to optimize several of the aspects involved in its performance, both the characteristics of the IT field and more general ones.

What are logs and why monitor them?

What are logs? In computing, when generally speaking of “log”, we refer to information belonging to a more or less low level reported by the operating system or a specific application that helps identify what is being done, including errors, problems or minor warnings, and when that happens, it indicates the date and time. In some cases, the source, the user, the IP address and other interesting fields from the point of view of what has happened can be identified.