Operations | Monitoring | ITSM | DevOps | Cloud

Pandora FMS

Sancho Lerena: "I think 2021 is going to be a historic year"

This year, no sector has been spared from the business changes caused by the Covid-19 pandemic, which have almost always been painful ones: millions of dollars in losses for theaters, which still do not know where or when they will premiere their films, a dying tourism sector, the world of hospitality ruined, parents who fear taking their children to school, bankrupted real estate companies… and a lot of glances towards heaven waiting for an answer, from the Most High above or from the extraterre

What are MAC addresses? What are they for and how to find them?

At the shadow of the widespread IP addresses, MAC addresses say even more about our devices than its more popular sister. As a kind of “identity document for network devices”, a MAC address informs us about “who is who” when connecting to a network. Of course, remember that the one called “MAC” has nothing to do with Macintosh computers. In fact, you can find it on devices of any brand.

The Benefits and Drawbacks of SaaS: The New Paradigm vs On-Premises Software

SaaS has rapidly become the go-to software and computing solution for businesses and industries across the world. While it’s costly to develop and deploy servers and infrastructure for your business out of pocket, you will be glad to hear that software-as-a-service seems to be a more affordable and more scalable solution for just about everyone. What are the benefits and drawbacks of SaaS?

We achieved ISO/IEC 27001

We live in an uncertain world and monitoring should try to make sure that whatever happens we will always be informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy as a product. Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude. For years we have attended international fairs, events where computer security is offered as specific products.

Monitoring and security: an open marriage

Confidentiality, integrity and availability are the three basic laws of security. Availability is a kind of wayward son who becomes prodigal when he likes to, even if it is just to write eulogies with it when the systems go down, although the truth is that it is the most neglected out of the three of them and perhaps that is why monitoring has become more approached for what it may come from outside than what it is inside.