Go Beyond Audit: Network Monitoring for BFSI Companies

July 1, 2020 With pandemic’s sudden hitting, most offices and companies had to quickly move their operations and have an apt Work-from-Home policy defined, the technology gap in both the front end and the companies’ back-end operations came in scathing review , While BFSI institutions also had a WFH policy, there services were deemed to be necessary.


How an Oil & Gas conglomerate automated their IT service delivery

Our client is one of the biggest oil and gas conglomerates in India, contributing to around 75% of Indian domestic production. They have been in business for over 60 years, currently employing around 30,000 people. With decades of growth, they have entered into different ancillary companies and expanded globally. The expansion has led to several offices, branches, desks, and teams spread across geographies.


What Does My Website Look Like From China? Test and Monitor Performance from China

In this current age of the Internet, it’s a common practice to build a website to run your online business. With the networks all around the world, theoretically, you can do business boundlessly. However, like each country has its boundary, the world of Internet is not a world without any control. In fact, every country has its own laws and rules toward this virtual world. And the case is especially different, when China’s Internet environment is involved.

pandora fms

Discovery Net Scan: the best network discovery software

Previously, in Pandora FMS blog, we learnt a little about the great revolution that the Discovery feature brought to Pandora FMS. This tool reduces the complexity of certain existing features in Pandora FMS, and also introduces new tools that turn this software into a complete monitoring system. In today’s episode we are going to take a walk through the bowels of one of its tools, Discovery Net Scan, which is an exponential upgrade to recon tasks. Are you ready?


Kuma 0.6.0 Released With Hybrid Universal Support for Service Mesh and CNCF Donation

We are happy to announce the much-anticipated Kuma 0.6 release! This new release ships with major improvements, especially when it comes to supporting service meshes that can span across multiple clouds, multiple Kubernetes clusters and hybrid platforms (Kubernetes + VMs) in enterprise environments. Kuma has also been donated to the CNCF as a Sandbox project: the first Envoy-based service mesh to ever be donated to the foundation. Let’s unwrap these announcements.


Why a Zero-Trust Network Is More Desirable-and Achievable-Than Ever

A few years ago I wrote a blog article about the zero-trust network security model and why I thought it was something every organization should be thinking about implementing. While I still believe that to be true—probably more true than ever, in fact—the landscape since then has changed a great deal, particularly because of the increase in cloud-based services, and zero-trust is now an extremely achievable goal.


WPA security explained: what is Wi-Fi Protected Access?

WiFi signals can be put into two different categories, unencrypted and encrypted. Unencrypted WiFi, sometimes known as open WiFi, can be connected to without a password. Anyone with a phone, tablet, PC, video game system, or Internet of Things device within range of the open WiFi signal can use it as long as there aren’t more devices connected to the wireless access point than it can handle. But the data being sent to and from your device through the open WiFi signal is unencrypted.


What's New in DX NetOps 20.2 Network Monitoring Software

On behalf of the Broadcom DX NetOps Product Team, we appreciate your business and the opportunity to provide you with high-quality, innovative software and services. As part of our ongoing commitment to customer success, we regularly release updated versions of our products. Today, we are pleased to announce the general availability of our DX NetOps 20.2 software.


Internal Applications: Monitoring from Behind Your Firewall

As companies decide whether or not to move ahead with an “everything in the cloud” strategy for providing consumer-facing applications, enterprise applications are also getting a new shape with web-based applications to support internal business operations. These applications live inside the private network of the organization and often have role-based access.


Overcoming VPN bandwidth and capacity complications using Firewall Analyzer

As companies move towards a flexible, remote work environment, the demand for VPN services has increased considerably. This need to ramp up VPN infrastructures in such a short time comes with its fair share of operational problems and security concerns. Over purchasing VPN capacity would put a dent in the IT budget while under purchasing would result in loss of productivity.