Skip to content

Pandora ITSM 105: New Tools for More Efficient IT Management

With the new Pandora ITSM version 105, you now have features designed to improve your workflow and optimize ticket and project management.

 

Key Enhancements in Pandora ITSM 105

New Filtering System

You can now filter and view results more efficiently in Tickets, Users, Project Board, Contracts, and Invoices. This system will expand to more sections in future versions, allowing for greater flexibility in daily management.

Enhanced Ticket View

The layout of fields in tickets has been reorganized to improve visibility and ease of use. Additionally, a new contracts section has been included to streamline access to relevant information, ensuring a better user experience.

Customizable Ticket Design

You can now rearrange, add, or remove fields in the ticket view according to your needs, with real-time editable settings through the new filters. This flexibility allows each team to tailor Pandora ITSM to their specific workflow.

Mobile Timetracker Optimization

The mobile version of the timetracker has been redesigned to be more intuitive and functional. All options available in the web console have been incorporated, ensuring that users can efficiently manage their time anytime and from any device.

ChatGPT Support in Chat

ChatGPT has been integrated into Pandora ITSM’s chat feature, providing quick and accurate responses to technical or support inquiries. This integration enhances user assistance and facilitates real-time issue resolution.

Tags in Tickets and Projects

It is now possible to add tags to tickets and projects, making it easier to categorize and search for relevant information. This feature allows for quicker access to work items and improves internal organization.

New Project Management View

With a visual interface similar to Trello, this new view simplifies task and project management with tags, custom statuses, and greater organizational flexibility. Additionally, it enables easy task movement between columns for more dynamic tracking.

New Workflow for Timetracker

The timetracker workflow has been optimized, allowing the configuration of alerts and automated reminders to improve workday tracking. It is now possible to schedule notifications that warn about work-hour limits or forgotten check-ins.

Improvements in Management and Security

New Licensing System

Starting with this version, clients who update will need to request a new license through the Warp Update > License menu. This change ensures greater security and control over active licenses on the platform.

Database Update

To optimize performance and compatibility, upgrading to Pandora ITSM 105 requires migrating from MySQL 5 to MySQL 8. This update ensures greater stability and performance in data management, improving the overall operation of the platform. Refer to the official documentation for more details.

Other Improvements and Fixes

  • A new notification section has been added for super administrators.
  • Enhancements in data export and report customization.
  • Optimized interface for work unit management.
  • Updated integration with third-party systems for better compatibility.

Explore all the new features of Pandora ITSM 105 and optimize your team’s management.

Visit our official Wiki or check the technical documentation for more details on this version.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Regulatory Compliance and NordPass

What is regulatory compliance?

Regulatory compliance refers to various processes and procedures of adhering to the laws, regulations, and standards set by various governing bodies. The regulations can come from numerous sources such as local, state, federal, or even international agencies, industry groups, and professional associations. The intention behind various regulatory compliance is to protect consumers and other stakeholders.

Importance of regulatory compliance

The aim of regulatory compliance is to make sure that businesses and organizations operate in a secure, responsible, and ethical manner. Regulatory compliance can also provide businesses and organizations with a competitive advantage by helping to create a culture of transparency and credibility with customers, employees, and other involved parties. Furthermore, adhering to regulatory compliance can improve internal processes, risk management procedures, and mitigate potential legal issues, which in turn lays a great foundation for a sustainable organization.

However, it’s critical to remember that most regulatory compliance is mandatory. Failing to comply with any of the mandatory regulations can result in hefty fines. For instance, LinkedIn Ireland has been fined more than $300 million by the Irish Data Protection Commission (DPC) for violation of the General Data Protection Regulation (GDPR). Met —the company formerly known as Facebook—was also recently fined over $250 million by the Irish DPC as well for a security breach that exposed the sensitive data of over 28 million users worldwide.

Besides financial losses, non-compliance can cause major damage to the organization’s reputation as clients may lose trust in the organization. This can even lead to serious legal issues.

Below are some of the most common regulatory compliance standards.

National Institute of Standards and Technology (NIST)

The National Institute of Standards and Technology (NIST) is a US federal agency that develops technology, metrics, and standards to drive innovation and ensure operational security within a business environment. NIST compliance is mandatory for all US-based federal information systems except those related to national security. However, the standard can be adopted by any organization.

To be NIST-compliant, a company needs to implement access controls to limit the risk of unauthorized access, develop a comprehensive incident response plan, and devise audit procedures and schedules.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a data protection law that applies to businesses and organizations operating within the European Union (EU) and the European Economic Area (EEA). It sets out rules for how organizations can collect, use, and store personal data, and provides individuals the right to access and control their personal data.

To adhere to the GDPR, organizations and businesses need to implement measures such as obtaining consent from individuals before collecting their data, providing clear and concise information about their data collection practices, and implementing appropriate security measures to protect personal data.

Health Insurance Portability and Accountability Act (HIPAA)

The Health Insurance Portability and Accountability Act (HIPAA) is a US law that sets out standards for the protection of personal health information. The law applies to healthcare providers and all other entities that handle personal health information in the US.

To meet the requirements set out by the HIPAA, organizations need to implement secure systems for storing and transmitting personal health information, providing training to employees on HIPAA requirements, and implementing access controls to prevent unauthorized access to personal health information.

Payment Card Industry Data Security Standard (PCI DSS)

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards that apply internationally to organizations that handle credit card transactions. The regulatory standard sets out requirements for protecting cardholder data and preventing unauthorized access to such data.

The PCI DSS regulations require businesses and organizations that process payment card information to implement secure systems for storing and transmitting cardholder data, conduct regular security assessments, and implement further security controls to prevent unauthorized access to cardholder data.

ISO/IEC 27001

The ISO/IEC 27001 is an international standard that outlines best practices for an information security management system (ISMS). The standard has been developed to help organizations protect their information assets and manage risks related to information security. The ISO/IEC 27001 is not a mandatory requirement.

To meet the ISO/IEC 27001 compliance, organizations need to conduct regular risk assessments, implement controls to protect against unauthorized access, and regularly review and update their information security management systems.

California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) is a privacy law that in many ways mimics its European counterpart — the GDPR. However, the CCPA applies to businesses operating in California and it provides California residents with the right to access and control their personal data, and imposes certain requirements on businesses that collect and handle personal data.

For an organization to be CCPA compliant, it needs to implement security measures to protect customer data. Furthermore, companies are also required to provide clear and concise information about data collection practices, allowing California residents to request access to and deletion of their personal data.

Gramm-Leach-Bliley Act (GLBA)

The Gramm-Leach-Bliley Act (GLBA) is a US law that applies to financial institutions within the US. Like many of the regulatory compliance standards we already discussed, GLBA requires financial institutions to implement safeguards that would protect personal information as well as to disclose their data collection and sharing practices to customers.

To comply with the GLBA regulatory standards, financial institutions may need to implement secure systems for storing and transmitting personal financial information, providing customers with information about their data collection and sharing practices, and implementing access controls to prevent unauthorized access to personal financial information.

Center for Internet Security (CIS)

The Center for Internet Security (CIS) is a nonprofit organization that provides cybersecurity guidance and best practices to help organizations protect their systems and data. The CIS comprises 18 Critical Security Controls for identifying and protecting against the most common cyber threats.

To be CIS compliant, companies and organizations need to establish a comprehensive cybersecurity perimeter to ensure protection of their data and information management systems.

For a detailed guide on how NordPass can ease compliance with CIS controls, make use of our comprehensive CIS compliance guide.

Opinion 498

The Formal Opinion 498 outlined by the American Bar Association (ABA) provides guidance for US-based lawyers and law firms with regard to virtual practice. While the ABA Model Rules of Professional Conduct permit virtual practice, the Formal Opinion 498 provides an additional set of guidelines for virtual practice.

To follow the guidelines set out by the Opinion 498, organizations or individuals are urged to establish secure information management systems and protect them with complex passwords to ensure secure storage and access to client data.

Agence nationale de la sécurité des systèmes d’information (ANSSI)

ANSSI compliance combines a set of security standards set by the French National Cybersecurity Agency. The ANSSI has been developed as a regulatory standard in France to protect sensitive information and systems from cyber threats such as hacking, malware, and data breaches. Companies that store and handle sensitive information may be required to comply with the ANSSI standards in order to ensure the security of that information.

Compliance with the ANSSI standards may involve regular audits, penetration testing, and other security measures to identify and address vulnerabilities in a company’s systems.

Network and Information Security Directive 2 (NIS2)

The Network and Information Security Directive 2 (NIS2) is an updated cybersecurity directive issued by the European Union to make the critical sectors like energy, healthcare, finance, and digital infrastructure more resilient. The updated directive extends the scope of cybersecurity obligations for organizations through enhanced risk management measures, incident reporting procedures, and supply chain security. More specifically, under the NIS2, organizations are expected to implement security measures, conduct periodic cybersecurity training sessions, and introduce a stricter timeframe for reporting security incidents.

Digital Operational Resilience Act (DORA)

The Digital Operational Resilience Act (DORA) is an EU regulation developed to help raise the cyber resilience of financial institutions, such as banks, insurance companies, and investment firms. DORA provides a framework for managing IT risks by requiring organizations to adopt tight security controls, regularly assess their cybersecurity posture, and ensure that third-party vendors are in compliance with resilience standards. The regulation also dictates detailed incident reporting and response mechanisms to improve the financial sector’s resilience to cyber threats.

How can NordPass help with regulatory compliance?

Meeting regulations and staying compliant can be a complex and time-consuming process, as businesses and organizations must stay up-to-date with the latest regulatory requirements and implement appropriate policies, procedures, and tools.

However, with the right tools at your disposal compliance can be less of a hassle than you might think. One such tool is NordPass — a secure and easy-to-use password manager designed for business use and it can help your organization comply with the security guidelines and requirements outlined in the regulatory compliance standards listed above. But how exactly can it help?

Strong passwords and secure password storage

Most regulatory compliance standards require organizations to implement some sort of security measures to limit the possibility of unauthorized access.

For instance, PCI DSS, GLBA, GDPR, and CIS Controls all have outlined guidelines for ensuring the security of personal data processing and storage.

This is where NordPass comes in as a tool that can help. Designed by the principles of zero-knowledge architecture and equipped with an advanced XChaCha20 encryption algorithm, NordPass offers a secure way to store and access business passwords and other sensitive information in line with regulatory requirements.

Password Policy — a NordPass feature — can also play a critical role in compliance. Using Password Policy, companies can set certain specifications for password complexity for the entire organization, which can significantly fortify the overall security of the organization.

To easily follow Password Policy rules and specifications, users can use our very own Password Generator — a tool that can generate a password adhering to all the specifications outlined in the Password Policy in just a few clicks.

On top of that, NordPass can ensure that all of your organization’s passwords are stored securely and in line with the regulatory requirements.

Secure access management

Some compliance standards require organizations to implement secure access management solutions. For example, this is the case with ANSSI compliance as well as with HIPAA and NIST.

Here NordPass and its Admin Panel can play a major role because it is designed to provide organizations a way to effectively and easily manage access privileges across the entire organization.

Via the Admin Panel, solution Owners and Admins can grant or revoke access to systems as well as monitor member activity within the organization. The Admin Panel is also the place where you can set the Password Policy for the organization, ensuring that passwords throughout the company adhere to certain specifications.

Additionally, NordPass comes equipped with a feature called Activity Log, which allows organization Admins to review user action such as system access and item sharing. For advanced monitoring and security analysis, NordPass integrates directly with Splunk. Organizations that use other Security Information and Event Management (SIEM) solutions can still transfer or audit logs by exporting them in JSON format. 

Sharing Hub is another integral feature that provides organization Owners with a detailed overview of all shared items and folders within the organization. Leveraging the Sharing Hub, Owners get details on who shared what and with whom, ensuring transparency and oversight of data.  

Breach Monitoring

Regulatory compliance standards also tend to outline best practices for responding to a security incident such as a data breach. This is explicitly outlined in the GDPR’s Article 33, which states that data breach including personal data breach should be reported within 72 hours to the supervisory authority. Failing to do so may result in a fine of 10 million or 2% of annual revenue.

NordPass is equipped with a Data Breach Scanner — a tool that can scan the entire company’s domain list for potential breaches. Because the Data Breach Scanner issues a notification to all members of the organization, the company potentially affected by a breach can act quickly and efficiently to contain it.

The NordPass Password Health tool can help you detect potentially, weak, old, or reused passwords throughout the organization and significantly reduce the risk of unauthorized access. On top of that, NordPass offers the Exposed Passwords feature, which scans your organization’s saved passwords against a database of known compromised credentials found on the dark web. If any of the passwords have been leaked in a breach, the Exposed Passwords feature will notify you of that, allowing you to promptly update them to maintain proper account security. 

Bottom line

These days, regulatory compliance is an inseparable part of running a business. Fail to comply and be ready to face hefty fines and serious reputational damage. However, compliance is never easy. But with the right tools at your disposal, the whole process can be a lot smoother.

NordPass can be a tool to assist organizations in meeting various requirements in an easier and more efficient way. By staying compliant, organizations can not only avoid costly fines and legal issues, but also gain a competitive advantage by building a culture of transparency and credibility with their customer base or investors.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Technology scalability & simplified app management on Apple devices

Summary: Jamf makes it simple to manage the NordLayer app on Apple devices, giving teams the flexibility to grow—without the usual IT headaches.

As businesses grow, so do their tech needs. More people, more devices, and more locations mean IT teams have to keep everything secure and running smoothly without slowing anyone down. For remote-first companies, that challenge is even bigger. Managing security and apps at scale can feel overwhelming, like juggling too many balls at once.

That’s where smart integrations, like Jamf and NordLayer, come in. Jamf makes it easy to manage the NordLayer app on Apple devices, giving teams the flexibility to grow without the usual IT headaches. This means your business can scale efficiently while keeping security tight and IT workloads manageable.

In this article, we’ll examine why technology scalability matters, the challenges of managing security at scale, and how NordLayer and Jamf collaborate to make it easier.

Technology scalability in IT and security

Technology scalability is the ability to expand your IT setup without compromising on performance or security. As companies grow, so does the need for flexible, secure solutions that work across remote and hybrid teams.

For remote-first or hybrid teams, scalability means easy access to tools, the ability to manage security from anywhere, and the flexibility to adapt to changing needs. It also ensures smooth collaboration across different locations. However, growth brings challenges, particularly in terms of security and managing an increased number of devices.

In short, IT scalability is about staying flexible, adapting to change, and maintaining strong security as your business grows.

Challenges of managing security at scale

We’ve already mentioned that when a business grows, so do the complexities of managing technologies. An increasing number of people, devices, and locations adds to the IT teams’ plate. The pressure is on to keep everything secure and running smoothly. For remote-first companies, it’s even trickier. Securing apps and devices at scale can quickly become overwhelming.

For teams scaling quickly, the challenge is onboarding and offboarding employees across multiple devices. IT teams need to keep security consistent across Apple devices, ensure compliance, and stay on top of updates without constantly doing it manually. On top of that, finding the right balance between strong security and a smooth experience for both IT teams and employees adds complexity.

These challenges show why automated solutions are key. They simplify device management and improve security without adding more work. With streamlined processes, businesses can grow faster while keeping everything secure.

How Jamf simplifies NordLayer app management on Apple devices

Managing security shouldn’t feel like a chore. Yet, for many IT managers, keeping apps updated and configured across Apple devices is an endless loop of manual work. That’s where Jamf, a leader in Apple Mobile Management (MDM), and NordLayer step in, offering a seamless, automated solution that cuts the hassle and boosts security.

IT teams need tools that operate in the background rather than adding extra work. Jamf integration with NordLayer makes security effortless, keeping Apple devices protected without IT constantly stepping in.

Managing NordLayer is simple with Jamf Cloud. Here’s how to set up centralized distribution in just a few easy steps:

  • Automated deployment: Roll out NordLayer to all Apple devices in a few clicks without complex setup.
  • Automatic updates: Ensure devices always have the latest security features, with no manual updates needed.
  • Security policy enforcement: Keep NordLayer security policies in place automatically, reducing compliance risks.
  • Centralized management with NordLayer’s Control Panel: Easily handle deployments and security updates of all Apple devices from one dashboard.
Quote_Arturas

This automated approach enables IT teams to work smarter, spending less time on NordLayer app management and more on strategic priorities.

“As more businesses rely on Apple devices, security needs to be both strong and simple. The NordLayer and Jamf integration delivers just that—seamless protection without extra complexity,“ says Artūras Bubokas, Product Manager at NordLayer.

Benefits of using Jamf and NordLayer

By combining Jamf’s seamless Apple device management with NordLayer’s strong network security, businesses get an automated, hassle-free solution. The result? Stronger security, less manual work, and more time for IT teams to focus on what truly matters.

Stronger network security, less hassle

Now, let’s break down the key benefits of this integration.

  • Saves IT time: Cuts down on manual configuration and troubleshooting
  • Boosts security: Ensures consistent, up-to-date security across Apple devices
  • Reduces costs: Lowers IT overhead with automated management
  • Improves user experience: Integrates security seamlessly without disrupting workflows
  • Supports growth: Scales easily as teams and devices expand

How to deploy NordLayer via Jamf

Here is how you can set up NordLayer on Apple devices in a few steps:

  • Download NordLayer package (.pkg for macOS, App Store link for iOS)
  • Upload it to the Jamf Cloud and configure policies
  • Automate installation and updates for all Apple devices
  • Ensure compliance with security policies using Jamf’s management tools

For more information on how to integrate Jamf and NordLayer, please check our mini-guide.

How NordLayer can help

A strong, scalable security strategy is essential for modern businesses, especially with the growing number of Apple devices in the workplace. The NordLayer & Jamf integration makes security simple, giving IT teams full control while keeping users productive. With easy deployment, automated updates, and centralized management, businesses can protect company resources without disrupting workflows.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×