Network Blind Spots: Total Visibility or Not
Network blind spots study is framed within a field controlled by three well interconnected elements: monitoring, security and visibility.
Network blind spots study is framed within a field controlled by three well interconnected elements: monitoring, security and visibility.
You may have heard on many occasions that this technology will change the world forever. And if you’re old enough, you’ll have seen that on some occasions, indeed, it has been like that, but on others, things have gone on as usual and that technology that was going to wipe everything out has ended up in the drawer of forgetfulness.
Christmas is here! Have you decorated your Christmas tree yet? Have you made gingerbread cookies? The people behind Pandora FMS love Christmas! Merry Christmas Pandora FMS 2018! The truth is that we are more Christmassy than Santa Claus and, during these days, we become more tender than ever, and we love to look back and remember all the good things that have happened in this year 2018.
When we think about WAN monitoring we usually start from the basics: the behaviour of remote communication links will directly affect the performance of our applications. Therefore, we understand that if traffic over the communications link experiences high levels of latency this will negatively impact the response time that our users observe when accessing the applications.
Among the new features of the latest Pandora FMS 730 update package, new functionalities have been incorporated such as the incorporation of heat maps, the synchronization of inventory and server plugins in the Meta Console and new calls to the Pandora FMS API.
April 7, 1969. This date marks the beginning of the Internet Engineering Task Force (IETF) Request for Comments (RFC), which in its RFC 1 defined the Interface Message Processor (IMP) and laid the foundation for the computer world as we know it. What place do free server monitoring tools occupy in all of this?
In a previous post we introduced anomaly detection as a group of techniques used to identify unusual behavior that does not comply with expected data pattern. In this article we will find out how we can apply anomaly detection within monitoring.
In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer anomaly detection from data collected by monitoring tools.
As we all know, Pandora FMS allows the monitoring of practically any device or application. Let’s talk about web content servers. Even the very popular applications or “apps”, made for the Android operating system of our phones, generally use API commands, which are also hosted on web servers to take advantage of the secure protocol (HTTPS).
The concept “Wireless Monitoring” is quite broad. In fact, it covers all wirelessly instrumented communications platforms and the monitoring we can do on them. We are talking about everything from the short-range signal of a Bluetooth device to sensors connected to a wide area wireless network.