Cybersecurity corporation ‘Penta Security’ is actively accelerating its entry into the Middle East security market by participating in key IT events in the region, including the recently held ‘GITEX 2024’ in Dubai.
In October, Penta Security showcased its innovative solutions at GITEX 2024, the largest IT exhibition in the Middle East, and Expand North Star 2024 in Dubai, UAE. Most recently, the company took part in the Dubai Police-KOTRA Global Startup Week, held from November 11 to 14 at the Dubai Police Headquarters R&D Center. This four-day event, co-hosted by the Korea Trade-Investment Promotion Agency (KOTRA) and Dubai Police, featured 19 Korean companies across various sectors, all specially invited by Dubai Police to present their cutting-edge technologies and explore opportunities for future collaboration.
At the event, Penta Security introduced its advanced cybersecurity solutions to an audience of 500 attendees, including key stakeholders from Dubai Police and other related organizations. The company showcased its collaborative security projects with the Korean national police as well as its international initiatives, such as its work on Advanced Metering Infrastructure (AMI) for smart city and smart transportation security across various regions.
Penta Security showcased its advanced solutions designed to address the increasing demand for data encryption and web security in the UAE’s smart city initiatives. These include D’Amo, an encryption platform; Cloudbric, a cloud security SaaS platform; and iSIGN+, an authentication security platform. Together, these solutions provide the foundational security infrastructure essential for driving smart city innovations.
Taegyun Kim, CEO of Penta Security, stated, “The Ministry of Science and ICT has designated the Middle East cybersecurity market as an emerging strategic market in its 2023 ‘Global Competitiveness Strategy for the Information Security Industry.’ The government is providing robust support to help Korean security companies expand into the region. Based on thorough market analysis, Penta Security aims to use the UAE as a launchpad for further expansion into the broader Middle East and Africa markets.”
About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.
As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
In a world where every click and connection is quietly observed, how much of your true identity can still be yours?
Once accessible, it wasn’t just a system that’s been breached — it was the very fabric of what makes you you. 400,000 rows of personal data, 75,000 unique email addresses, full names… all scraped as though identities were little more than code to be harvested and manipulated. But who, or what is watching, and what are they after?
How right IAM solutions can safeguard identity breaches
This is just one version of an identity breach, where personal information is reduced to data points, quietly stripped away, leaving nothing but the same data to be twisted and controlled by unseen hands.
An identity privacy breach often exposes deep vulnerabilities in identity and access management (IAM) systems. If you don’t assess the solution as a whole — how it’s deployed, aligned with your priorities, and the potential risks — the consequences can be far more perilous than you ever imagined.
The situation serves as a wake-up call to businesses, individuals, and regulatory bodies about the critical importance of improving data security measures and ensuring that IAM systems are foolproof.
What Went Wrong and Its Impact
A major contributor to security breaches is the presence of gaps in identity and access management infrastructure. Many organizations struggle with integrating legacy systems that don’t meet modern security standards, leaving vulnerabilities that attackers can exploit to gain unauthorized access to sensitive data.
Misconfigured access controls, lack of multi-factor authentication (MFA), or absence of single sign-on (SSO) solutions only amplify these risks. These gaps can often be addressed with proper safeguards, preventing or at least mitigating potential breaches.
Also, compliance failures are a significant issue, particularly for organizations operating across multiple jurisdictions with varying data protection regulations. Failing to meet standards like GDPR can lead to costly fines and reputational damage.
Employees also remain a critical vulnerability, often falling victim to phishing or social engineering attacks due to a lack of cybersecurity awareness. Even the best security measures can be undermined if employees aren’t trained to recognize threats or follow best practices. Ensuring strong safeguards, compliance, and employee awareness are all essential to reducing the likelihood of a breach.
Why a Wake-Up Call is Necessary
Identity and security breaches highlight the urgency of taking action on identity security. Organizations and individuals alike need to rethink their approach to protecting personal and corporate data. As cyber threats become more sophisticated, organizations must adapt by adopting stronger IAM practices, investing in continuous monitoring, and fostering a culture of cybersecurity awareness.
Rising Personal Responsibilities
As individuals, everyone too must become more vigilant about how they manage and protect personal information. The rise in identity theft and fraud means that personal data is constantly under threat, and it’s no longer enough to rely on organizations to safeguard it. Individuals need to adopt security best practices, such as using strong passwords, enabling multi-factor authentication (MFA) on accounts, and being cautious about the information they share online.
The concept of shared responsibility in cybersecurity is gaining ground. While companies must invest in strong security frameworks and IAM solutions, individuals must also take proactive measures to protect their personal information. As digital identities become integral to every aspect of our lives, personal responsibility will play a pivotal role in reducing the risks associated with data breaches.
Legal and Financial Implications
The legal and financial consequences of a data breach can be devastating. For large organizations, a breach can result in substantial fines for non-compliance with data protection regulations like the GDPR or the California Consumer Privacy Act (CCPA). Additionally, the cost of mitigating a breach, including legal fees, remediation efforts, and customer compensation, can run into millions of dollars.
The long-term reputational damage is equally severe. Customers lose trust when a company fails to protect their personal information, and this can result in a loss of business, a tarnished brand image, and ongoing customer churn.
For individuals, security breaches can lead to identity theft, financial fraud, and the significant emotional burden of restoring one’s identity and reputation. Victims of data breaches often have to spend months, or even years, undoing the damage caused by identity theft, which may include monitoring credit reports, securing new accounts, and filing legal claims.
Best Practices to Prevent Identity Breaches
Implementing Single Sign-On (SSO) and Multi-Factor Authentication (MFA)
One of the most effective ways to prevent unauthorized access to sensitive data is through the implementation of Single Sign-On (SSO) and Multi-Factor Authentication (MFA). SSO allows users to log in once and access multiple applications, reducing the risk of password fatigue and simplifying user management.
When combined with MFA, these practices provide an additional layer of security, ensuring that even if an attacker compromises a password, they cannot easily gain access without passing through the extra verification step. Contextual authentication further strengthens security by considering factors such as device signals (e.g., whether the device is encrypted, up-to-date, or compliant with security policies), device posture (assessing whether the device is secure or compromised), and location-based risk (e.g., logging in from a high-risk country or unfamiliar IP address).
By layering MFA with these contextual checks, organizations can ensure that only authorized users, using trusted devices, and operating in low-risk environments, are granted access to sensitive systems. This holistic approach minimizes the likelihood of unauthorized access and significantly enhances overall security.
Secure Identity Federation
Companies that rely on third-party service providers should ensure secure identity federation protocols are in place. Using standards like SAML, OAuth, and OpenID Connect, organizations can securely manage user identities across different platforms without exposing sensitive data. This reduces the chances of a data breach while maintaining ease of access.
Contextual Access Control
Contextual access goes beyond just the user’s credentials, taking into account their environment, including factors like location and device posture. It evaluates device signals—such as whether the device is compliant with security policies, whether it’s rooted or jailbroken, and whether it’s encrypted—and considers the device risk, which assesses the overall security posture of the device in real-time.
By factoring in these elements, contextual access ensures that only trusted users, operating from secure devices and trusted locations, are granted access to critical data. Even if a user successfully passes through other authentication mechanisms, these additional checks act as a final layer of protection, reducing the likelihood of unauthorized access.
Strong Password Policies
A strong password policy is an essential part of an organization’s IAM strategy, particularly for maintaining the security of personal and organizational data. Complex passwords, which combine uppercase and lowercase letters, numbers, and special characters, are crucial for protecting accounts from brute-force attacks. It’s important to avoid reusing older passwords, as they may have been compromised in past breaches. Regularly changing passwords further minimizes the risk of unauthorized access.
To simplify password management and ensure password complexity, using a reputable password manager is highly recommended. Password managers securely store and generate strong, unique passwords for each account, reducing the likelihood of weak or reused credentials that could lead to a security breach.
Honeypotting and Deception Technologies
Honeypotting and deception technologies are advanced techniques that create fake environments to lure attackers. They can offer a proactive layer of security in Identity and Access Management (IAM) by creating decoy accounts, devices, and environments designed to lure attackers away from critical systems.
These fake assets—such as deceptive user-profiles and credentials—serve as traps that mimic real systems, attracting malicious actors and allowing security teams to monitor their activities in real time. When integrated with IAM, these deceptive techniques can help detect unauthorized access attempts early by alerting security teams as soon as attackers engage with the decoys, enabling rapid responses to contain threats before they escalate.
By combining deception technologies with the previously mentioned contextual checks, IAM systems can enforce stricter controls when suspicious behavior is detected, such as requiring multi-factor authentication (MFA) or blocking access from untrusted devices or locations.
This multi-layered approach not only helps identify attackers quickly but also ensures that only trusted users and devices are granted access to sensitive resources, significantly reducing the risk of a successful breach.
Bug Bounty Programs
Finally, bug bounty programs incentivize ethical hackers to find vulnerabilities in an organization’s systems. Independent security researchers can identify vulnerabilities in an organization’s authentication and authorization systems. By offering rewards for discovering bugs or weaknesses in IAM systems—such as flaws in multi-factor authentication (MFA), privilege escalation vulnerabilities, or issues with role-based access controls—organizations can tap into a global pool of experts who might uncover issues that internal teams may overlook.
Bug bounty programs foster a collaborative approach to cybersecurity, enabling real-time identification and resolution of IAM vulnerabilities, which is crucial for protecting sensitive data and preventing unauthorized access. Integrating these findings into IAM practices can lead to stronger, more resilient systems. Once vulnerabilities are identified through the program, security teams can quickly address these issues by patching flaws, refining authentication methods, and improving access controls.
Moreover, bug bounty programs help ensure that IAM solutions are continuously tested against evolving attack strategies, keeping organizations one step ahead of potential threats. As IAM solutions become increasingly complex with cloud environments, third-party integrations, and mobile access, the role of bug bounty programs becomes even more critical in identifying potential vulnerabilities that could compromise an organization’s security posture.
Closing Thoughts
Identity and security breaches serve as a stark reminder of the critical need for effective identity and access management solutions. The new norm is that data is constantly under active threat, and organizations and individuals must take shared responsibility for overall security. Implementing robust IAM practices, such as SSO, MFA, and strong password policies, is essential to preventing breaches and minimizing their impact.
Selecting a resilient IAM partner, such as OneIdP, is crucial to ensuring that your organization’s data is protected against evolving cyber threats. Only through a comprehensive, proactive approach to cybersecurity can we ensure the safety of our personal and organizational data.
In the end, the responsibility for protecting identities is a collective one—leaders, employees, and individuals must all contribute to a safer digital environment.
About Scalefusion Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Juggling while riding a bike is tough but not impossible. Just like that, managing Mac devices in a hybrid work environment is a hassle but possible.
IT teams know this struggle all too well. Keeping everything running smoothly can be quite the adventure with team members working from home, the office, or some coffee shop.
And hybrid work isn’t just a trend, it’s what people want. Did you know that 81% of workers around the world prefer a hybrid or fully remote setup?[1] That’s a huge number. Also, more companies are using Macs for their reliability and security. Apple’s Mac shipments have jumped by 20.8%.[2] This means IT teams have some serious challenges to face.
Understanding the Hybrid Work Model
So, how do you make sure every Mac is secure, updated, and ready to roll, no matter where your team is working from? Let’s explore some best practices that can help you manage Mac devices effectively.
Let’s get started and walk through these challenges together.
Understanding the Hybrid Work Model
To grasp how to effectively manage Mac devices in a hybrid work environment, we first need to understand what this hybrid work model really entails.
In a nutshell, it’s a blend of remote and in-office work. Employees have the flexibility to choose where they want to work, whether that’s at home, in a shared workspace, or back in the traditional office. This model has gained immense popularity because it caters to the needs of a diverse workforce.
But with great flexibility comes great responsibility. For IT teams, this means creating a seamless experience for users, ensuring that devices are secure, and providing the necessary support regardless of where the employee is located. It’s a balancing act that requires careful planning and effective technology solutions.
So, what strategies can help us thrive in this new way of working? Let’s dive into the best practices for managing Mac devices effectively.
Best Practices for Managing Mac Devices in a Hybrid Work Model
Grasp the Power of Unified Endpoint Management (UEM) Solutions
Unified Endpoint Management (UEM) is essential in a hybrid work environment as it allows IT teams to manage all devices from a single interface. This centralized approach simplifies administrative tasks such as device configuration, application management, and policy enforcement. By utilizing UEM, IT teams can ensure that all Mac devices are set up consistently, adhering to company standards.
This practice saves time and reduces the risk of errors, leading to a more efficient deployment process. Furthermore, UEM solutions enable remote management, allowing IT teams to push updates and resolve issues without needing physical access to devices, which is crucial for a dispersed workforce.
Magic in a Box: Experience Zero-Touch Enrollment
Zero-touch enrollment for Mac devices significantly streamlines the onboarding process, especially in a hybrid work environment. This feature enables IT teams to configure devices remotely, allowing employees to unbox and start using their Macs right away, without the need for extensive setup.
In a hybrid setting where employees may be working from various locations, this approach eliminates the need for IT to physically handle each device, reducing logistical challenges. With zero-touch enrollment, companies can ensure that every device comes pre-configured with the necessary apps and settings, delivering a seamless user experience that enhances productivity from day one.
Shield Your Assets: Enforce Ironclad Security Protocols
Implementing security protocols is crucial for protecting sensitive company data, especially in a hybrid work environment. Enforcing strong password policies requires employees to use complex passwords that are regularly updated, significantly minimizing the risk of unauthorized access. This practice is vital in a setting where employees are accessing company resources from various locations.
Disk encryption—like FileVault on Macs—secures data at rest, ensuring that even if a device is lost or stolen, the information remains protected. Further, utilizing VPNs for secure remote access creates encrypted connections, shielding data from potential threats while employees work from outside the office.
Together, these measures establish a comprehensive security posture that effectively mitigates risks, enabling organizations to confidently support their workforce in a hybrid model while safeguarding sensitive information.
Refresh and Revive: Regular Software and OS Updates
Regular software and operating system updates are essential for maintaining both the security and functionality of Mac devices, particularly in a hybrid work environment. Keeping systems updated ensures that all security patches are applied promptly, safeguarding against known vulnerabilities that cybercriminals could exploit. In a scenario where employees are working from various locations and networks, this vigilance becomes even more critical.
Automating the update process can significantly lighten the administrative burden on IT teams while ensuring that devices remain secure and current. This proactive approach allows IT to manage updates efficiently without interrupting employees’ workflows. Additionally, regular updates often introduce performance enhancements and new features, contributing to a better overall user experience.
Swift Support: Remote Troubleshooting for Macs
IT teams must be equipped with tools that enable them to diagnose and resolve issues without needing to be on-site. macOS remote troubleshooting minimizes downtime for employees and streamlines support processes, ensuring that technical challenges don’t disrupt productivity.
Features such as remote desktop access empower IT to take control of a user’s device, troubleshoot problems directly, and provide real-time guidance. This capability is especially valuable when employees are dispersed across various locations, as it eliminates the delays associated with in-person support visits.
Track with Precision: Asset Management for Mac Devices
Maintaining an accurate inventory of all Mac devices is important for IT teams in a hybrid work environment, as it allows them to monitor device status, track locations, and manage software licenses efficiently. Implementing an asset management system enables organizations to clearly identify which devices are assigned to which employees, facilitating better support and maintenance practices.
This level of visibility is essential for ensuring compliance with software licensing requirements and minimizing the risk of penalties associated with unlicensed software usage. Regular inventory audits can reveal underutilized devices, providing valuable insights for strategic planning regarding upgrades or reallocations. By optimizing device usage, organizations can enhance resource allocation and ensure that all employees have the tools they need to be productive, regardless of their working location.
Your Safety Net: Crafting Backup and Recovery Solutions
Automated backup systems play an important role in ensuring that data is regularly saved, significantly minimizing the risk of data loss due to accidental deletions or hardware failures. By utilizing cloud-based backup solutions, organizations can streamline this process, allowing employees to easily access their backups from any location. This flexibility is beneficial in a hybrid work environment, where team members may work from various sites.
Additionally, implementing a comprehensive disaster recovery plan ensures that organizations can swiftly restore operations in the event of a data loss incident. This preparedness is essential for maintaining business continuity and minimizing downtime. By proactively managing backups and recovery processes, organizations safeguard their data and enhance employee confidence in their operational resilience, knowing that they are protected against potential data loss scenarios.
Compliance Made Easy: Steer the Regulatory Maze
Organizations must establish clear policies regarding data protection and device usage that align with regulations such as GDPR and HIPAA, especially in a hybrid work environment where employees may access sensitive data from various locations. Conducting regular compliance audits helps identify potential gaps and ensures that practices meet regulatory standards.
Educating employees about compliance requirements promotes a culture of security awareness and responsibility. By actively managing compliance, IT teams can mitigate risks and protect both the organization and its clients from potential legal issues, ensuring smooth operations across all working environments.
Crystal Clear Insights: Monitor Devices with Real-Time Analytics Tools
Monitoring Mac devices with real-time analytics tools enhances security and performance management in a hybrid work environment. These tools enable IT teams to track device usage patterns, identify potential security threats, and analyze performance metrics.
By setting up alerts for unusual activities—such as unauthorized access attempts—organizations can respond quickly to mitigate risks. Tracking performance metrics allows IT teams to ensure that devices are functioning optimally and identify any areas requiring attention.
Empower Your Hybrid Workforce with Scalefusion UEM Features
With Scalefusion UEM, IT teams can efficiently oversee all Mac devices from a single interface, ensuring consistent configuration and application management across the board. The zero-touch enrollment feature simplifies onboarding, allowing employees to start working with their Macs immediately without extensive setup, regardless of their location.
Scalefusion’s robust security features, including strong password policies, disk encryption with FileVault, and secure VPN access, provide a stronghold for sensitive data. Regular software and operating system updates can be automated, relieving the administrative burden on IT while keeping devices secure and up to date.
The platform’s remote troubleshooting capabilities empower IT teams to resolve issues swiftly, minimizing downtime for employees scattered across different locations. Scalefusion also facilitates seamless backup and recovery solutions, safeguarding critical data and ensuring business continuity.
Transform Mac Device Management in Hybrid Work Environments with Scalefusion UEM
Managing Mac devices in a hybrid work environment presents unique challenges that require innovative solutions. Scalefusion UEM can significantly enhance your approach by offering a comprehensive platform that streamlines device management and bolsters security protocols.
By integrating Scalefusion UEM into your hybrid work strategy, you can enhance productivity and create a more resilient and agile IT framework, ready to support your organizational needs.
About Scalefusion Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Among the many cloud platforms available, Canonical OpenStack is notable for its open-source foundation, cost efficiency, and scalability. Unlike many proprietary solutions, it gives companies complete control over their cloud infrastructure and flexibility in network, compute, storage, and network administration. This article explores why Canonical OpenStack is a leading choice, covering its components, key advantages, use cases, and more.
What is Canonical OpenStack?
Canonical OpenStack is a leading open-source cloud computing platform. It is meant to help with distributed compute, network, and storage resource administration. Canonical OpenStack combines these resources into pools, allowing companies to offer virtual resources on demand via a self-service portal.
Because of its capacity, it is a reasonably priced substitute for proprietary virtualization solutions. As a result, companies can maximize their cloud expenditures and compete with hyperscale service providers.
How Does OpenStack Work?
OpenStack aggregates physical resources into a big pool from which it distributes virtual resources when customers request them through a self-service portal or application programming interfaces (APIs). It does not handle virtualization directly, but instead, it capitalizes on existing virtualization technologies. As a result, it can facilitate the rapid deployment and management of cloud-native services.
Key Components of OpenStack
OpenStack was designed based on a modular architecture. It has several main features, which include:
Nova: The main compute running instance scheduling, creation, and termination. It supports Hyper-V, Xen, QEMU/KVM, and VMware ESXi among other hypervisors.
Glance: An image service that controls, uploads, and retrieves cloud images for instances running on the platform.
Neutron: Provides networking capabilities between instances, allowing multi-VM deployments to take place.
Cinder: Manages block storage by provisioning, managing, and terminating persistent block devices.
Swift: Offers scalable object storage services that retrieve and store unstructured data objects using a RESTful API for OpenStack services and instances running on the Cloud.
Keystone: Handles authentication and authorization functions for users in multi-tenant environments.
Advantages Over Competition
Canonical OpenStack offers several advantages compared to other cloud platforms:
Focus on Performance and Simplicity
The implementation of a small-scale private cloud can be complex and costly, especially for organizations without the necessary expertise. Sunbeam, an OpenStack project, offers a solution by simplifying the adoption process and providing a more accessible platform. MicroStack, a Sunbeam-based distribution, is specifically designed for small-scale environments and can be self-deployed without requiring professional services. This provides organizations with a cost-effective option for building their own private cloud infrastructure. Additionally, MicroStack is supported by Canonical, a leading provider of cloud infrastructure solutions. With the support of Canonical, MicroStack offers a robust and reliable option for organizations looking to deploy a small-scale private cloud.
Cost Efficiency
Although the initial capital expenditures (CapEx) for implementing OpenStack can be somewhat high, the operational expenses (OpEx) are far lower than the cost of using hyperscalers. This results in a reduced total cost of ownership (TCO) over time, making it an attractive option for long-term cloud operations.
Full Cloud Functionality
Unlike traditional virtualization platforms like VMware vSphere, OpenStack provides a complete cloud environment that resembles public clouds. Users can request resources programmatically through APIs, enabling rapid infrastructure automation and cloud-native operations.
Community Support
There are thousands of contributors and organizations involved in its development, including Red Hat, IBM, Huawei, and Cisco. As a result, Canonical OpenStack benefits from continuous enhancements and community-driven support.
The Canonical OpenStack Distribution
The Canonical Distribution of OpenStack is designed to be the most straightforward and efficient way to deploy and manage OpenStack private clouds. It acts as an “autopilot” for creating reference OpenStack clouds in minutes and provides full management, monitoring, and scaling capabilities.
This distribution automates the entire process of building a fully managed private cloud from bare metal. It offers high performance, allowing users to focus on their applications rather than the underlying infrastructure. The Canonical OpenStack is currently in public beta. It is free for small-scale deployments of up to 10 physical and ten virtual machines.
This approach significantly reduces the time and costs associated with deploying private clouds. As a result, enterprises can optimize their resources effectively while maintaining a focus on innovation and application development.
Key features of the Canonical Distribution of OpenStack
Automated Cloud Creation
Users can simply point the distribution at their physical hardware and specify their preferences for storage, software-defined networking, and hypervisors. The system will then automatically create, manage, and monitor the cloud environment.
Integration with MAAS and Landscape
The distribution utilizes MAAS (Metal as a Service) for physical hardware detection and provisioning, combined with Canonical’s Landscape for systems management. This integration allows for easy addition of machines to the cloud and ensures high availability through physical isolation zones.
Web-Based User Interface
It offers a simple web-based UI in Landscape that enables users to select compatible components for their cloud, streamlining the setup process.
OpenStack-Aware Monitoring
Once the cloud has been built, Landscape provides monitoring tools that track the health of cloud resources. Landscape doesn’t only monitor the running cloud environment. It also provides real-time predictions based on current utilization trends. This helps in capacity planning to determine when additional compute nodes or storage will be needed.
Vendor Flexibility
The Canonical Distribution supports a wide range of vendor components for network, storage, and compute resources, ensuring that organizations can choose solutions that best fit their needs.
Canonical continuously tests thousands of configurations of Canonical OpenStack built with third-party hardware and software in its OpenStack Interoperability Lab (OIL) to find more compatible cloud components, giving customers a wider range of options and allowing them to make flexible choices.
Markets and Sectors
Canonical OpenStack is utilized across diverse industries due to its versatility:
Telecommunications: Service providers leverage OpenStack for network function virtualization (NFV), allowing them to implement efficient virtualized networks.
Public sector: Canonical OpenStack is a popular choice for public sector organizations due to its open-source nature, scalability, and security features. Governments worldwide are increasingly adopting OpenStack to modernize their IT infrastructure, reduce costs, and improve efficiency.
Financial Services: Banks and financial institutions adopt Canonical OpenStack to manage data securely while complying with industry regulations.
Education: Universities use OpenStack for research projects requiring substantial computational resources without incurring prohibitive costs.
Healthcare: The healthcare sector benefits from the stability and security of Canonical OpenStack for managing sensitive patient data.
Use Cases for Canonical OpenStack
Organizations can leverage Canonical OpenStack in various ways:
Private Cloud Deployment: Businesses can establish their own private cloud infrastructures, optimizing costs while maintaining control over their data.
Public Cloud Services: Using Canonical OpenStack, local service providers can create public clouds offering options in countries where main hyperscalers might not be present.
Network Function Virtualization (NFV): OpenStack provides a basis for telecommunications companies to implement NFVI solutions. This allows these companies to have flexible and reasonably priced software-based telecom infrastructure.
Container Management: By extending OpenStack environments with container orchestration solutions like Kubernetes, organizations can improve workload granularity for cloud-native applications.
Data Protection for Canonical OpenStack
The integration of Storware Backup and Recovery with Canonical OpenStack and Canonical KVM ensures seamless operations within this cloud infrastructure, catering to the growing demand for robust cloud solutions. Storware offers a comprehensive backup and recovery solution specifically tailored for OpenStack environments, providing granular control, automation, and efficient data management. Its integration with Canonical’s offerings simplifies the backup and recovery process, allowing organizations to protect their critical data and ensure business continuity in the face of potential challenges.
Additionally, Storware Backup and Recovery integrates with the OpenStack Horizon plugin, providing a user-friendly interface for managing backups and recoveries directly within the OpenStack dashboard. Storware is also actively working on integrating with the OpenStack Skyline plugin, which will enable advanced monitoring and analytics of backup and recovery operations.
Canonical OpenStack is a robust solution for organizations seeking to build flexible, cost-effective cloud environments. Its automated deployment capabilities, modular architecture, and strong community support position it as a leading choice in the open-source cloud landscape. From telecoms to healthcare, Canonical OpenStack keeps becoming more and more popular as companies try to use open-source technology in their cloud plans based on its track record across several sectors.
About Storware Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
“We all agree that data is fundamental to an organization today. Without data, we lack the ground,” said João Arriaga, Country Manager at SealPath, in his speech on the Technical Tracks stage, where he also stressed the central importance of data for the operation and survival of companies.
In an insightful session at the annual IT Security Conference in Lisbon, SealPath once again demonstrated its commitment and leadership in innovative data protection solutions. Entitled “The Importance of Identifying the Most Risky Data in an Organisation”, our expert Joao’s presentation highlighted the emerging challenges and dynamic strategies for achieving robust data security in today’s business environment.
This year’s conference, which brought together top professionals and thought leaders in cybersecurity, provided the perfect backdrop for SealPath to articulate how advanced, data-centric security measures can profoundly shield and protect organizational data across all platforms. Our session, particularly noted for its depth and clarity, was also featured in the IT Security’s magazine article.
Reflecting on the event, Luis Ángel del Valle, CEO of SealPath, noted, “Our participation in this year’s IT Security Conference was yet another opportunity to share insights with our peers and demonstrate SealPath’s deep commitment to evolving data protection standards. We are pleased to provide thought leadership that resonates within the cybersecurity community.”
IT Insight Security appears in a context of accelerated digital transformation and, at the same time, growing vulnerability to cybercrime, with a different and innovative perspective. It is a publication born in the digital world, conceived from scratch for this new reality and which will combine a rigorous factual approach with an analysis of the market and the strategic and leadership challenges required to meet this growing challenge.
About SealPath SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath’s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
ProMobi Technologies announced today that Scalefusion, its leading unified endpoint management solution (UEM), introduces Veltar, an innovative endpoint security product. Designed to enhance the enterprise security posture, Veltar combines advanced threat protection with seamless device management, enabling organizations to operate confidently in an increasingly complex digital landscape.
Veltar has been introduced to tackle the critical challenges posed by fragmented security tools and limited visibility into devices and their security. With the addition of Veltar, Scalefusion now seamlessly combines unified endpoint management (UEM), identity and access management (IAM), and endpoint security (EPS) into one comprehensive solution. As the third pillar of the product, Veltar aims to complete the solution so users can now effectively manage devices, access, and security within organizations.
With Veltar, IT admins get a curated set of security tools with the prime goal of protecting data loss, securing data at rest and in motion. Its features include VPN tunneling to secure data transmission to and from on-prem assets, secure web gateway (SWG) to block domains and websites based on categories, application control to ensure only trusted software runs on your devices, and I/O device control, among others.
“Veltar marks a major leap forward in endpoint security and management, bringing crucial security features together into a single platform. It is a critical component that combines endpoint security driven by the insights of device management. We had a goal of enabling enterprises to enhance their security posture while simplifying device, identity and access management and Veltar is the third piece of the puzzle.” — said Sriram Kakarala, Chief Product Officer at Scalefusion
Veltar is designed for organizations looking to streamline operations, and management of devices that hold critical data without compromising security.
About Scalefusion Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
When managing user information and network resources, think of LDAP and Active Directory (AD) as two powerful tools in your digital toolbox. Suppose you’re organizing a large library. LDAP is like a universal cataloging system that helps you find any book from various libraries, regardless of its location. It provides a way to look up and manage the books, but it doesn’t come with the actual shelves or library services.
On the other hand, Active Directory is akin to a well-organized, high-tech library system that not only catalogs books but also manages everything in a library, from checking books in and out to controlling access to special collections.
LDAP or Active Directory: Which to Use and When
It’s a comprehensive system specifically designed to handle all the needs of a Windows-based library or network.
So, what sets these two apart?
Difference Between LDAP and Active Directory
LDAP
Active Directory
Overview
LDAP, or Lightweight Directory Access Protocol, is a protocol used for accessing and managing directory services. It’s like a set of rules that help applications communicate with a directory service. Think of LDAP as a universal language for talking to directories.
Active Directory (AD), developed by Microsoft, is a directory service used mainly in Windows environments. It’s like a giant address book for your network, keeping track of all users, computers, and resources.
Purpose
LDAP’s main job is to organize and retrieve information from a directory. It’s not a directory itself but rather a way to interact with one.
AD is used to manage and organize users, computers, and other resources in a network. It’s more than just a protocol, it’s a full directory service with built-in management tools.
Structure
LDAP directories are often structured as a tree with various branches, which makes it easy to navigate and find information.
In AD, assets are sorted into one of three tiers, domains, trees, and Forests. It includes features like Group Policy and Domain Services, which help manage network resources and user permissions.
Flexibility
LDAP can be used with different directory services and is often employed in various systems like email servers and corporate databases.
AD is specifically designed to work seamlessly with Windows environments, offering a range of tools and features for system administrators.
Use Cases
Ideal for querying and modifying directory information across various environments, including Unix and Linux systems. It’s versatile and can be used in diverse setups where different directory services are involved.
Best suited for managing users and resources in a Windows-based network. It’s commonly used in corporate environments where integration with other Microsoft services is essential.
Integrations
Works with a variety of directory services beyond Microsoft’s ecosystem. Its broad compatibility makes it suitable for integrating with different systems and platforms.
Specifically designed for Windows environments. It integrates deeply with other Microsoft products, offering features like Group Policy and Domain Services that enhance its functionality in a Windows-centric setup.
Similarities Between LDAP and Active Directory
Despite their differences, LDAP and Active Directory (AD) share several key similarities:
Directory Services
Both LDAP and Active Directory are integral to managing directory services. They play an important role in storing, organizing, and retrieving information about users, devices, and other network resources. Whether you’re using LDAP or AD, both systems help keep track of this critical data, ensuring it’s accessible and well-organized.
Hierarchical Structure
LDAP and Active Directory utilize a hierarchical structure to organize information. This tree-like structure makes it easier to locate and manage data within their directories. By arranging data in a hierarchy, both systems allow for efficient data retrieval and organization, simplifying administrative tasks.
Authentication and Authorization
Both LDAP and Active Directory are used to authenticate and authorize users. They ensure that individuals can only access the resources and information they are permitted to use. This process helps secure the network and control access, making sure that sensitive data and resources are protected from unauthorized users.
While LDAP is a protocol used for accessing directory services, Active Directory supports LDAP as one of its communication protocols. This means that LDAP clients can interact with Active Directory servers using the LDAP protocol, providing a level of compatibility and flexibility between the two systems.
Centralized Management
Both LDAP and Active Directory offer centralized management capabilities. This feature allows administrators to manage users and resources from a single location. Centralized management streamlines administrative tasks, making it easier to oversee and control various aspects of the network and directory services.
When to Use LDAP
If your organization needs a flexible, protocol-based solution for directory services, LDAP is a strong candidate. It is ideal when you require a versatile system that can interact with various directory services and platforms, regardless of their specific technology. For example, if you’re managing user accounts across a diverse set of systems, LDAP provides a standardized method for accessing and updating directory information. Its protocol-centric design makes it highly adaptable, allowing integration with different types of directory services without being tied to a particular vendor or technology stack.
LDAP is also suitable for environments where you need to interact with multiple types of directory systems or where a universal directory service is necessary. In scenarios where you are integrating with third-party systems or applications, its flexibility ensures seamless communication and data retrieval.
When to Use Active Directory
Active Directory is often the best choice for businesses predominantly using Windows as their operating system. Designed and developed by Microsoft, AD offers a comprehensive suite of tools and services specifically tailored for Windows environments. If your organization operates within a Windows-based network, AD seamlessly integrates with other Microsoft products, such as Exchange, SharePoint, and Office 365. This integration enhances efficiency by allowing admins to manage users, computers, and resources from a central point.
AD’s built-in features, like Group Policy, Domain Services, and Federation Services, further simplify administrative tasks. Group Policy allows for centralized management of settings and permissions across the network, while Domain Services handle user authentication and resource access. Federation Services enables single sign-on across different systems and applications. AD’s deep integration with Windows platforms and Microsoft services makes it the ideal choice for managing a Windows-centric network environment.
Simplify and Strengthen Access Management
Choosing between LDAP and Active Directory involves understanding your organization’s specific needs and infrastructure. LDAP offers flexibility and cross-platform compatibility, making it a versatile solution for diverse environments and various directory services. On the other hand, Active Directory is modified for Windows-centric setups, providing a comprehensive suite of tools that seamlessly integrate with Microsoft products for network management.
Ultimately, the right choice depends on aligning the solution with your access management goals and technical work-frame.
About Scalefusion Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
NEW YORK – EasyVista, a global SaaS provider for comprehensive IT service management (ITSM), IT monitoring , Enterprise Service Management, and Remote Support, is proud to announce that it has been named a Leader in the 2024 SPARK Matrix™: IT Service Management Tools by QKS Group (formerly known as Quadrant Technologies) for the second year in a row. The EasyVista Platform stood out for its advanced features, low total cost of ownership (TCO), built-in customization options, and comprehensive end-to-end service experience.
Updated and improved authentication in Pandora FMS console using SAML, ensuring compatibility with SAML environments in Azure and with simpleSAML 2.
New General Event Instructions
Just like the instructions for changing the state of events, it is now possible to configure general default instructions that will be displayed when the instructions for changing the state are missing or should not be displayed.
IPAM Plugin Improvements
The IPAM Discovery MS Windows® Agent Plugin has new enhancements that allow you to update all the “Occupied”, “Available”, “Managed” and “Unmanaged” data that was previously only possible to update from Pandora FMS server.
IPAM Tasks from Satellite Servers
It is now possible to configure IPAM tasks in Pandora FMS console so that they can be run from a Satellite server with remote configuration enabled.
Credential Store Improvement in Satellite servers
Pandora FMS Satellite Servers now have the credential store for SSH, WMI and SNMPv3 modules. These credentials can also be encrypted in the configuration files used by Satellites to ensure their privacy.
Improvement in Discovery Plugin: MongoDB®
Included the ability to launch custom SQL queries to generate monitoring modules in the Discovery MongoDB plugin.
Policy Enforcement Priority in Autoconfiguration
To improve performance in monitoring policy enforcement, it is now possible to prioritize agent autoconfiguration rules, so that policies with higher priority are applied before the rest.
New macros for network modules
It is now possible to use “_agentalias_” and “_agentname_” macros as the target IP address in network modules.
Improved SNMP Trap Alerts
SNMP trap alerts can be configured to filter their triggers by the “Subtype” field.
Improved Alert Recovery
Included an option in alert recovery to be performed only upon the change of status to “normal” of a module. This option is configurable on each alert template.
Configuration Options for Collecting Logs
OpenSearch® setup in Pandora FMS Web Console for collecting logs now has more options that allow you to adjust some OpenSearch® configuration parameters for each environment.
Improvements and small changes
Case#
GitLab#
Description
N/A
2361
New feature for credential encryption in monitoring through SSH, WMI and SNMP 3. It includes new tokens that are used globally in the Satellite server or at agent level for their corresponding modules.
10719
6728
By means of the macros _agentalias_ and _agentname_, and if these fields contain a valid IP address, these macros can be added to the Target IP field of the modules for subsequent monitoring.
12514
8092
Related: MR 79
Alerts by SNMP trap can also be filtered by subtype (Subtype trap).
N/A
9669
New audit Information widget.
14567 and 14585
9905
You may add general read-only instructions to any type of event, regardless of the rest of the fields. Included the same mechanism for API 2.0 and PFMS CLI.
N/A
11527
For IPAM discovery tasks, you may now configure PFMS server or the Satellite server to handle said task.
N/A
11748
Added prioritization to agent autoconfiguration when applying monitoring policies.
N/A
12755
New event list report based on saved filter.
N/A
13638
Added the Recovery only on Normal status token to alert templates, so that alert recovery is performed only for normal state.
New feature for Software Agents in MS Windows® performed through Inventory of installed patches and comparison with the list of patches to be installed.
N/A
14193
New custom queries for MongoDB® database monitoring using Discovery PFMS
Known changes and limitations
Case#
GitLab#
Description
N/A
9918
Related: 13642 and 13991
Added support for user authentication with SAML 2.0 (SimpleSAMLphp server) while supporting previous versions.
N/A
12781
Module-based, agent-based, and group-based event reports will be deprecated in the LTS release in 2025.
N/A
13945
Added new index configuration section to the Log Collector, so that, optionally, four important parameters may be defined in OpenSearch.
Fixed vulnerabilities
Case#
GitLab#
Description
N/A CVE-2024-35308 Acknowledgement: i[@]qvq.im
14684
Fixed the arbitrary reading of the operating system file by a user registered in PFMS Web Console (plugins section).
N/A CVE-2024-9987 Acknowledgement: i[@]qvq.im
14685
Fixed access to read-only CSV data for any agent module by a registered user in PFMS Web Console (console extensions section).
Bug Fixes
Case#
GitLab#
Description
N/A
10062
Fixed searches by module name in the Monitor detail view to make literal queries with the following characters: %, _, [, ], {, }, -, ^. The only non-verbatim search character is the asterisk, so it can be searched literally if between quotation marks (and any search that includes quotation marks will be literal).
N/A
12962
Related: MR 79
Fixed special days for leap years.
N/A
13073
Fixed the display and style of the applied updates view (Warp Journal) to the product style.
N/A
13114
Fixed the description of the DNS plugin.
N/A
13250
Fixed the CLI PFMS command update_agent option update_gis_data, to only take values zero and one.
N/A
13255
Fixed the update_group command (PFMS CLI) to avoid hierarchy paradoxes against the same group or with groups related to other groups.
N/A
13442
Fixed the default value and description of token syncserver.
N/A
13511
Related: MR 79
Removed widget “Welcome message to” for failing to function as expected.
N/A
13522
Fixed visual glitches for both dark and light themes in the Credential Store.
N/A
13523
Added a warning message to module template management in case you did not select any Private Enterprise Number (PEN).
N/A
13553
Fixed visual glitches in Permissions Report PDF.
N/A
13747
Fixed the following commands in HTTP 500 errors in API 1.0:
get id_group_agent_by_name
get id_group_agent_by_alias
get group_agent_by_name
17620
13782
Fixed Cron Jobs task editing and/or addition in the Command Center (Metaconsole).
N/A
13792
Fixed the scope of users regarding the special group All in Inventory Alerts, so that they may have access to it only if they have specific permissions on it.
N/A
13794
Fixed the Cluster view so that only users who have permissions on the group to which the cluster belongs may access it.
N/A
13797
Fixed and limited agent deletion in Monitoring Policies for users who do not have permissions on the agent groups.
N/A
13799
Related: 14585
Fixed the display of tasks belonging to group ALL in IPAM if users do not have permission on said group. Fixed other permissions for different types of user profiles.
N/A
13811
Fixed the first uninitialized state in web module creation if applicable.
N/A
13818
Related: 13731, 13783, 14581
Fixed the correct interpretation and execution of macros in custom event responses if the display command option is enabled when running a command (view used for debugging).
N/A
13857
Related: 13803, 13804, 13840, 13848
Fixed a major bug in the Command Center (Metaconsole) that affected centralized services and services on nodes when added as a service element.
N/A
13819
Restricted access to Visual Consoles both in nodes and in the Command Center (Metaconsole) by means of the use of URLs by users without a VM profile.
17738
13826
Fixed the application of Regex conditions for received monitoring data in character string imodules, to detect state changes.
17656
13829
Fixed external alert addition in monitoring policies when extended characters are used in modules. To that end, the exact matching feature in regular expressions was also added.
N/A
13836
Removed repetitive message in HA environment alerting. It is verified that it appears in a timely manner according to the type of detected error and without repetitions.
N/A
13854
Removed the warning message in the event alerts view, which was only valid for versions prior to 779.
N/A
13855
Fixed the operation of basic security monitoring in the installation of the Software Agent for MS Windows® (Windows Server 2022®).
17827
13865
Fixed error HTTP 500 when saving bulk monitoring policy operations without having made any changes.
N/A
13917
Fixed mass operations on agents in centralized environments, specifically in the secondary group description editing.
N/A
13952
Fixed agent group disabling for counting agents in use according to license terms.
17541
14065
Fixed the token to explore all virtual machines and CPU and memory data collecting for monitoring XenServer® with Discovery PFMS.
N/A
14095
Fixed the token generation process for users using the PFMS API 2.0.
N/A
14109
Fixed several errors in the API 2.0 PFMS when paying certain fields with special enumeration.
18329
14137
Fixed image display in base64 in WUX monitoring when generating PDF.
18349
14147
Fixed unsolicited login to Web Console when using PFMS API 2.0.
18362
14152
Fixed inverse threshold application in monitoring policies.
N/A
14163
Fixed the WUX server to stop if the specified IP address to be monitored is out of reach.
N/A
14171
Related: 12374, MR 79
Fixed Oracle monitoring to connect in sysdba, thick and thin mode while maintaining cryptographic compatibility ®.
18394
14189
Related: MR 79
Fixed the use of threads and cores used to streamline data collecting in VMWare monitoring in Discovery PFMS.
18465
14192
Fixed duplicity in agent creation caused by a misconfigured token in VMWare monitoring with Discovery PFMS.
18651
14273
Related: 11815
Fixed the possibility of choosing another agent in synthetic module creation.
18691
14305
Related: 14289
Fixed access to users with ACLs and secondary groups to remote operation with Pandora RC.
N/A
14291
Related: 12941, 13973, MR 79
Interval correction in Dataserver modules.
N/A
14342
Fixed token display in the PFMS API 1.0.
18848
14381
En Fixed graph display in Monitor view in the Command Center (Metaconsole).
N/A
14417
Related: 14418
Fixed inventory enablement (basic options) in Software Agents.
18902
14507
Fixed agent duplication in MySQL monitoring with Discovery PFMS.
N/A
14822
Fixed connection to the nodes for alert display from the Command Center (Metaconsole).
N/A
14521
Fixed the default event filter assignment in every user profile in both Command Center and nodes.
N/A
14533 and 14639
Fixed the use of the Command Center as an update repository for centralized nodes.
N/A
14536
Related: 14164
Fixed the use of double quotation marks (character escape) in event update in PFMS API 2.0.
N/A
14540
Fixed the Discovery server for updating the extra_data field (data received in JSON).
N/A
14651
Fixed Error 500 when accessing the View Map in Recon Task.
N/A
14657
Related: 14256
Fixed filter in event reports for the Command Center and nodes.
N/A
14701
Fixed offline update (version comparison).
N/A
14706
Visually enhanced the agent configuration interface and the module interface.
N/A
14734
Fixed plugin pandora_df_used to always return values in bytes and thresholds in percentages.
N/A
14825
Related: 14844 and 14848
Checked the operation in Visual Consoles of the elements Serialized pie graph, Bars graph, Event history graph and Simple value.
N/A
14867
Related: 14865
Fixed ratings in vulnerability monitoring so that they fit a range of 0 to 10 points.
N/A
14865
Fixed the duplicated addition of the same software with different versions in vulnerability monitoring. Now it only takes into account the next version to the one installed for rating calculation.
N/A
14862
Fixed PFMS server restart for version 780 after an online update. For version 779, Pandora FMS must be manually restarted.