Operations | Monitoring | ITSM | DevOps | Cloud

What Does Application Performance Monitoring (APM) Involve?

Nowadays, regardless of what type of business you run, you probably rely on a number of applications to make it through the day. Applications are key components of many computer networks, meaning it’s important that they function properly and don’t crash or lag. For this reason, many companies invest in application performance monitoring to prevent costly application issues and downtime.

Network traffic analysis tools for 2020

Galaxy: Milky Way. Planet: Earth, Solar System. Date: Year of the Rat, number 4718 from Huangdi, the Yellow Emperor. Spaceship: Pandora FMS Enterprise. Voyager 2 spaceship reports that its older twin sister is 20 hours, 46 minutes, and 19 seconds away from the blue planet at light speed. Radio waves travel almost at that speed, and although its plutonium reserve is depleted and the electronic components are almost frozen, despite all that, we receive signals from them.

Developing a Dedicated Log Collection & Management Plan

When it comes to your network and server processes, one of the key ways your IT team will collect data and insight is through event logging. Collecting the right event data will help inform both essential processes and services, as well as your network security measures, which is why having the proper collection plan in place is key. At Pandora FMS, we offer a host of comprehensive log collection and network monitoring solutions designed to be easily customized.

What life after COVID-19 has in store for us in the world of technology

This 2020 we are living a time of change. In fact, it would not be that crazy to guess that this pandemic will be a turning point, especially due to the obvious fact that such a pandemic has unfortunately turned out to be something with connotations on a global and historical scale.

Docker Compose, introduction to container orchestration with Pandora FMS

We continue with our series of articles on containers. First, we started with creating our own images with Docker Build and saw how to run them with Docker run. But today we will learn what Docker Compose is and start our journey into the world of container orchestration. Up to now we have managed containers manually and separately, which for some specific test may be valid and functional. But when the number of containers to manage starts growing, this method becomes infeasible.

Data Security for Big Data

Big data security is a term used for all collective measures taken to protect both data and analytical processes from theft, attacks or all other malicious activities. Just like other forms of cybersecurity, big data security is about attacks originating from every online or offline sphere. Companies operating on the cloud face multiple challenges including online information theft, DDoS attacks and ransomware.

Pandora FMS vs Centreon vs Nagios XI

Centreon is a solution for monitoring applications, systems and networks, based on Nagios source code. On 1st August, 2005 the company Merethis (now Centreon) was founded and began working on “their” Nagios version, calling it Oreon. In July 2007, the Oreon software changed its name to Centreon due to a name conflict with Orion (a component of the SolarWinds monitoring suite).