Skip to content

WHAT’S NEW Pandora FMS 754

What’s new in Pandora FMS latest release, Pandora FMS 754

Let’s take a look together at the features and improvements included in this new Pandora FMS release: Pandora FMS 754.

NEW FEATURES AND IMPROVEMENTS

Metaconsole Dashboards

Dashboards can now be used within the Metaconsole, to be able to centrally manage all the information more visually.

New AWS monitoring. Amazon S3

The possibility of monitoring Amazon S3 cubes has been added to be able to monitor the files they include, the size of each file, the number of items in each cube, permissions, etc.

New installers for Cloud

In previous versions, we prepared a remote script to install Pandora FMS in any environment: virtual, cloud or physical, by just having access to the internet. In this version, we have done the same to install Pandora FMS agents, in a customized way with just one click.

Check out the documentation or try it yourself:

curl -Ls https://pfms.me/agent-deploy | bash

Improved event widget in Dashboard

It now allows you to incorporate saved filters, so that the widget will show events using those custom filters.

Release-754

Visual enhancements to console settings

Pandora FMS console setup display has been improved to not show anymore all the options in a single column and thus be able to see it more easily and quickly.

Release-754

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Scale Computing and Parallels RAS Collaborate to Deliver Improved End User VDI Experience for Post-Pandemic Workforces

INDIANAPOLIS, April 28, 2021 Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, today announced that Parallels® Remote Application Server (RAS) 18 is now available and optimized on Scale Computing HC3. When combined with Parallels RAS, Scale Computing HC3 enables administrators to rapidly provision and manage virtual machines (VM) along with RDSH sessions and applications centrally from the Parallels RAS Console to make Virtual Desktop Infrastructure (VDI) solutions faster, more affordable and easier to use.

Parallels RAS automatically generates and deploys VDI desktops on demand, enabling administrators to create and deploy guest VMs on the fly and create a master virtual desktop once and rapidly clone hundreds of virtual desktops on their HC3 Cluster. They can quickly and securely deliver Windows applications and desktops, and Parallels RAS integrates with Windows Virtual Desktop to provide unified workload and resource management. Parallels RAS provides a simple, consistent user experience on any device (including smartphones and laptops), from any location.

“Parallels Remote Application Server (RAS) makes VDI solutions quick to deploy, easy to manage and affordable—improving security, centralizing management and reducing IT workloads,” said Nick Dobrovolskiy, Senior Vice President of Engineering and Support at Parallels. “The combination of Parallels RAS 18 and Scale Computing HC3 autonomous infrastructure delivers increased options, customizations and resources to IT organizations for new levels of infrastructure flexibility and employee productivity.”

Scale Computing HC3 is a hyperconverged and edge IT infrastructure platform that combines servers, storage and virtualization capabilities into a single solution to make IT infrastructure easier for organizations of every size. The platform works exceptionally well in VDI environments across all verticals and organizations requiring simple, secure and low-maintenance IT infrastructure options.

“The ability for administrators to deploy, manage and grow their VDI environments easily is more important than ever in today’s work-from-anywhere environments,” said Craig Theriac, VP Product Management at Scale Computing. “The integration of Parallels RAS 18 with Scale Computing HC3 advances the ability to provision VDI VM’s easier and faster than legacy VDI solutions at a cost-effective price point that meets our customer’s needs.”

Availability:

Parallels® Remote Application Server (RAS) 18 optimized on Scale Computing HC3 is now available in the Americas, Asia, and Oceania. For more information about Scale Computing and Parallels RAS visit, https://www.scalecomputing.com/parallels.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Parallels RAS
Parallels® Remote Application Server (RAS) is an all-in-one application delivery and virtual desktop infrastructure (VDI) solution that enables users to work remotely from anywhere, on any device, at any time. This cloud-ready software empowers organizations to centralize IT infrastructure management, integrate with Windows Virtual Desktop, streamline multi-cloud deployment, reinforce data security and improve IT process automation. Its flexible and scalable architecture enables organizations to quickly adapt to critical business demands.

Be prepared: How anti-ransomware can save you from potential financial loss

If you think that you’ll never be hit by a ransomware attack, think again. The Cyber Security Agency of Singapore (CSA) received 61 reports of ransomware attacks in 2020, almost twice what was reported the year before. One of the possible reasons for the spike is the rise in Work From Home (WFH) arrangements, where many Singaporeans may be working with poorly secured set-ups.

Unless proper safeguards are put in place, no one is immune to the risk of ransomware. To avoid any invasions of your personal data and potential financial loss from a ransomware attack, prevention is your best digital security strategy. This guide will take you through the basics of ransomware, how it spreads, and how best to guard yourself against it.

What is ransomware?

There are two main types of ransomware, namely locker ransomware, which locks your device or computer, and crypto ransomware, which restricts access to personal data and files through encryption. The objective is the same: preventing access to your personal files.

After holding a victim’s personal files hostage, the attacker then demands a ransom from them to regain access to the data, with instructions on how to pay for the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals often through untraceable cryptocurrency such as Bitcoin. This kind of malware can also have a built-in timer with a payment deadline, where the price to unlock the data increases with time.

How ransomware infections happen and spread through the web

One of the most common delivery systems for ransomware is spam email. It all begins with a seemingly well-intentioned email that contains malicious links or attachments. Once you click the link or download the attachment, a ransomware downloader is stored on the computer without your knowledge.

This ransomware downloader then copies the ransomware program to your system network through backdoor entry. When a device is successfully compromised, malware blocks the screen or encrypts data stored on the disk and a ransom demand with payment details is displayed to the victim.

How to prevent ransomware

Ransomware is a constantly evolving global threat in the cybersecurity landscape and digital hubs like Singapore are particularly vulnerable. A report from CSA showed an emerging trend of more sophisticated and targeted ransomware attacks. Do not risk financial loss by becoming a victim of ransomware. Here are a few tips that will keep you protected:

  • Do not store important data in only one location. Create regular backups of it on another hard drive and in the cloud.
  • Always keep your software and OS updated. These updates usually contain patches for novel security vulnerabilities that could be exploited by malicious ransomware.
  • Adjust your browser’s security and privacy settings for increased protection. Remove outdated plugins from your browser and use an ad-blocker to prevent the threat of malicious ads.
  • Avoid opening spam or suspicious emails from senders that you do not know. Also, never open or download any unverified links or attachments.
  • Always turn to trusted and verified websites for credible download sources. Such websites have trust markers that help you determine their authenticity.

How anti-ransomware can help you avoid ransomware attacks

With ransomware becoming more prevalent in Singapore, the need for protection against it has never been greater. It is essential to employ a top antivirus that has a comprehensive in-built anti-ransomware security feature like ESET Internet Security or ESET NOD32 Antivirus.

An anti-ransomware feature performs an inhibitory function, by monitoring the system for suspicious behaviour common to all ransomware such as file encryption. It promotes system security by scanning the system for unexpected behaviour, such as a new software attempting to encrypt your files. ESET Advanced Memory Scanner lets you monitor the behaviour of malicious processes without any compromise in processing speeds.

Anti-phishing also restricts emails that contain redirects to malicious websites designed to steal your personal data. Robust content scanning and email filtering serve to prevent any ransomware scams from reaching you and your family.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The importance of Gartner’s Magic Quadrant

 width=

Gartner is a company recognized for providing impartial, high-quality consulting and research on the IT market, as well as providing valuable information and insights to the entire technology community.

Through its more than 15,000 employees, Gartner also contributes to determining the IT standards in place and the market trends that will become a reality in the future. Its reach is global, being located in more than 100 countries.

Also, they have become a benchmark in the industry for maintaining high ethical standards and conducting meticulous research, while remaining independent.

Are you interested in the subject? Find out below the relevance of Gartner’s work and the importance of its Magic Quadrant and Critical Capabilities for PAM report for the technology market.

Gartner Relevance

Gartner not only provides important research for the technology market but also tools to help CIOs and IT leaders navigate an ever-changing world. In addition, it promotes conferences to help bring together leaders to talk about strategic actions for making commercial and technical decisions.

Among the extensive research documentation that Gartner provides to the community, there is a chart comparing competitors in many IT industries. They call it the Magic Quadrant.

What is the Gartner Magic Quadrant?

The Gartner Magic Quadrant uses a uniform set of assessment criteria with results plotted in a graphical form showing the competitive positioning, facilitating the verification of how vendors of digital products and services are meeting requirements and working in relation to Gartner’s market vision.

The Magic Quadrant is the first step in understanding what these vendors and their associated technology do. This tool helps you understand visions, strategic roadmaps, and all their ability to operate according to your specific needs.

Moreover, the report is an excellent tool for:

  • discovering the relative competitive positions of digital services and technology vendors that compete globally;
  • reflecting on individual business goals, needs, and priorities;
  • contextualizing the assessment through the perspectives of the industry, region, and company size.

 width=

To fully understand the results of the Magic Quadrant, one needs to understand the meaning of each category or quadrant of the graph:

  • Challengers: These are companies with excellent ability to execute. However, they are not yet able to direct the market in one direction.
  • Leaders: These are companies that, in addition to offering a comprehensive set of tools, also have a vision and guide the market with new products and features.
  • Visionaries: These are innovators with a strong understanding of current and future market trends, but still do not have the ability leaders have to execute;
  • Niche Players: Here are the vendors that perform well in specific tasks, but their solutions are still quite limited in other aspects and functionalities.

What are Gartner’s Critical Capabilities?

As an essential companion to the Gartner Magic Quadrant, this methodology provides an insight into the capabilities of the vendors’ products and services, adding value to the assessment offered by the Magic Quadrant.

This research is used to better investigate the classifications of products and services based on key resources defined for important and differentiating use cases.

Gartner’s Critical Capabilities document is a comparative analysis that scores competing products or services against a set of critical differentiators identified by Gartner.

It shows which products or services are best suited in various use cases to provide actionable advice on which products/services you should add to your vendor lists for further evaluation.

Gartner’s Critical Capabilities and Magic Quadrant together offer powerful information such as:

  • Deeper insights into product and service offerings from different vendors.
  • Understanding of which products and services are best suited for common usage scenarios.
  • Assistance in strategic planning and development of different value propositions with a comparative analysis of the main software, technology, or service offerings.

How important are Gartner’s Critical Capabilities for PAM?

Privileged Access Management (PAM) tools help organizations provide secure privileged access to critical assets, as well as meet compliance requirements by managing and monitoring privileged accounts and access.

According to Gartner in its Magic Quadrant and Critical Capabilities reports, PAM tools offer features that enable security and technology leaders to:

  • Discover privileged accounts on systems, devices, and applications for subsequent management.
  • Automatically manage and protect passwords and other credentials for administrative, service, and application accounts.
  • Control access to privileged accounts, including shared and emergency access accounts.
  • Isolate, monitor, record, and audit privileged access sessions, commands, and actions.

To qualify for inclusion in the PAM quadrant, vendors must deliver a service that has the following characteristics:

  • Tools to discover, map and report on any privileged accounts across multiple devices, applications, terminals, and systems.
  • A reinforced, secure, and highly available vault to store secrets and credentials.
  • User interfaces for reviewing privileged credentials.
  • Tools to automatically rotate and manage credentials for service, administrative, device, system, and application accounts.
  • Support for role-based administration, including centralized policy management.
  • Privileged account reporting and analysis tools.

As mentioned, Gartner is an institution that indicates the best technologies in its consulting services, so the better a solution is placed in its reports, the greater the chances of it being recommended.

Because of this, companies constantly invest in the development of their solutions, significantly increasing the quality and growth speed of their market.

senhasegura in The Gartner Magic Quadrant

Senhasegura has participated in the last two Gartner Magic Quadrants in the field of PAM (Privileged Access Management) solutions.

In 2018, the senhasegura solution was in the Visionaries category, and in 2020, it was included in the Challengers category, receiving recognition for all the work done.

According to Gartner, senhasegura stands out in aspects such as:

  • Very efficient RDP proxy function.
  • Excellent performance for session management.
  • Advanced account discovery and mapping features.

Also, it received recognition for its great progress in the area of DevOps and the analytical resources in its PAM solution.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×