Skip to content

What is Canonical OpenStack and How to Protect it?

Among the many cloud platforms available, Canonical OpenStack is notable for its open-source foundation, cost efficiency, and scalability. Unlike many proprietary solutions, it gives companies complete control over their cloud infrastructure and flexibility in network, compute, storage, and network administration. This article explores why Canonical OpenStack is a leading choice, covering its components, key advantages, use cases, and more.

What is Canonical OpenStack?

Canonical OpenStack is a leading open-source cloud computing platform. It is meant to help with distributed compute, network, and storage resource administration. Canonical OpenStack combines these resources into pools, allowing companies to offer virtual resources on demand via a self-service portal.

Because of its capacity, it is a reasonably priced substitute for proprietary virtualization solutions. As a result, companies can maximize their cloud expenditures and compete with hyperscale service providers.

How Does OpenStack Work?

OpenStack aggregates physical resources into a big pool from which it distributes virtual resources when customers request them through a self-service portal or application programming interfaces (APIs). It does not handle virtualization directly, but instead, it capitalizes on existing virtualization technologies. As a result, it can facilitate the rapid deployment and management of cloud-native services.

Key Components of OpenStack

OpenStack was designed based on a modular architecture. It has several main features, which include:

  • Nova: The main compute running instance scheduling, creation, and termination. It supports Hyper-V, Xen, QEMU/KVM, and VMware ESXi among other hypervisors.
  • Glance: An image service that controls, uploads, and retrieves cloud images for instances running on the platform.
  • Neutron: Provides networking capabilities between instances, allowing multi-VM deployments to take place.
  • Cinder: Manages block storage by provisioning, managing, and terminating persistent block devices.
  • Swift: Offers scalable object storage services that retrieve and store unstructured data objects using a RESTful API for OpenStack services and instances running on the Cloud.
  • Keystone: Handles authentication and authorization functions for users in multi-tenant environments.

Advantages Over Competition

Canonical OpenStack offers several advantages compared to other cloud platforms:

  • Focus on Performance and Simplicity

The implementation of a small-scale private cloud can be complex and costly, especially for organizations without the necessary expertise. Sunbeam, an OpenStack project, offers a solution by simplifying the adoption process and providing a more accessible platform. MicroStack, a Sunbeam-based distribution, is specifically designed for small-scale environments and can be self-deployed without requiring professional services. This provides organizations with a cost-effective option for building their own private cloud infrastructure. Additionally, MicroStack is supported by Canonical, a leading provider of cloud infrastructure solutions. With the support of Canonical, MicroStack offers a robust and reliable option for organizations looking to deploy a small-scale private cloud.

  • Cost Efficiency

Although the initial capital expenditures (CapEx) for implementing OpenStack can be somewhat high, the operational expenses (OpEx) are far lower than the cost of using hyperscalers. This results in a reduced total cost of ownership (TCO) over time, making it an attractive option for long-term cloud operations.

  • Full Cloud Functionality

Unlike traditional virtualization platforms like VMware vSphere, OpenStack provides a complete cloud environment that resembles public clouds. Users can request resources programmatically through APIs, enabling rapid infrastructure automation and cloud-native operations.

  • Community Support

There are thousands of contributors and organizations involved in its development, including Red Hat, IBM, Huawei, and Cisco. As a result, Canonical OpenStack benefits from continuous enhancements and community-driven support.

The Canonical OpenStack Distribution

The Canonical Distribution of OpenStack is designed to be the most straightforward and efficient way to deploy and manage OpenStack private clouds. It acts as an “autopilot” for creating reference OpenStack clouds in minutes and provides full management, monitoring, and scaling capabilities.

This distribution automates the entire process of building a fully managed private cloud from bare metal. It offers high performance, allowing users to focus on their applications rather than the underlying infrastructure. The Canonical OpenStack is currently in public beta. It is free for small-scale deployments of up to 10 physical and ten virtual machines.

This approach significantly reduces the time and costs associated with deploying private clouds. As a result, enterprises can optimize their resources effectively while maintaining a focus on innovation and application development.

Key features of the Canonical Distribution of OpenStack

  • Automated Cloud Creation

Users can simply point the distribution at their physical hardware and specify their preferences for storage, software-defined networking, and hypervisors. The system will then automatically create, manage, and monitor the cloud environment.

  • Integration with MAAS and Landscape

The distribution utilizes MAAS (Metal as a Service) for physical hardware detection and provisioning, combined with Canonical’s Landscape for systems management. This integration allows for easy addition of machines to the cloud and ensures high availability through physical isolation zones.

  • Web-Based User Interface

It offers a simple web-based UI in Landscape that enables users to select compatible components for their cloud, streamlining the setup process.

  • OpenStack-Aware Monitoring

Once the cloud has been built, Landscape provides monitoring tools that track the health of cloud resources. Landscape doesn’t only monitor the running cloud environment. It also provides real-time predictions based on current utilization trends. This helps in capacity planning to determine when additional compute nodes or storage will be needed.

  • Vendor Flexibility

The Canonical Distribution supports a wide range of vendor components for network, storage, and compute resources, ensuring that organizations can choose solutions that best fit their needs.

Canonical continuously tests thousands of configurations of Canonical OpenStack built with third-party hardware and software in its OpenStack Interoperability Lab (OIL) to find more compatible cloud components, giving customers a wider range of options and allowing them to make flexible choices.

Markets and Sectors

Canonical OpenStack is utilized across diverse industries due to its versatility:

  • Telecommunications: Service providers leverage OpenStack for network function virtualization (NFV), allowing them to implement efficient virtualized networks.
  • Public sector: Canonical OpenStack is a popular choice for public sector organizations due to its open-source nature, scalability, and security features. Governments worldwide are increasingly adopting OpenStack to modernize their IT infrastructure, reduce costs, and improve efficiency.
  • Financial Services: Banks and financial institutions adopt Canonical OpenStack to manage data securely while complying with industry regulations.
  • Education: Universities use OpenStack for research projects requiring substantial computational resources without incurring prohibitive costs.
  • Healthcare: The healthcare sector benefits from the stability and security of Canonical OpenStack for managing sensitive patient data.

Use Cases for Canonical OpenStack

Organizations can leverage Canonical OpenStack in various ways:

  • Private Cloud Deployment: Businesses can establish their own private cloud infrastructures, optimizing costs while maintaining control over their data.
  • Public Cloud Services: Using Canonical OpenStack, local service providers can create public clouds offering options in countries where main hyperscalers might not be present.
  • Network Function Virtualization (NFV): OpenStack provides a basis for telecommunications companies to implement NFVI solutions. This allows these companies to have flexible and reasonably priced software-based telecom infrastructure.
  • Container Management: By extending OpenStack environments with container orchestration solutions like Kubernetes, organizations can improve workload granularity for cloud-native applications.

Data Protection for Canonical OpenStack

The integration of Storware Backup and Recovery with Canonical OpenStack and Canonical KVM ensures seamless operations within this cloud infrastructure, catering to the growing demand for robust cloud solutions. Storware offers a comprehensive backup and recovery solution specifically tailored for OpenStack environments, providing granular control, automation, and efficient data management. Its integration with Canonical’s offerings simplifies the backup and recovery process, allowing organizations to protect their critical data and ensure business continuity in the face of potential challenges.

Additionally, Storware Backup and Recovery integrates with the OpenStack Horizon plugin, providing a user-friendly interface for managing backups and recoveries directly within the OpenStack dashboard. Storware is also actively working on integrating with the OpenStack Skyline plugin, which will enable advanced monitoring and analytics of backup and recovery operations.

Learn more about Instant Restore option for OpenStack environments.

Conclusion

Canonical OpenStack is a robust solution for organizations seeking to build flexible, cost-effective cloud environments. Its automated deployment capabilities, modular architecture, and strong community support position it as a leading choice in the open-source cloud landscape. From telecoms to healthcare, Canonical OpenStack keeps becoming more and more popular as companies try to use open-source technology in their cloud plans based on its track record across several sectors.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

SealPath Shines at IT Security Conference 2024, Addressing Critical Data Protection Strategies

“We all agree that data is fundamental to an organization today. Without data, we lack the ground,” said João Arriaga, Country Manager at SealPath, in his speech on the Technical Tracks stage, where he also stressed the central importance of data for the operation and survival of companies.

In an insightful session at the annual IT Security Conference in Lisbon, SealPath once again demonstrated its commitment and leadership in innovative data protection solutions. Entitled “The Importance of Identifying the Most Risky Data in an Organisation”, our expert Joao’s presentation highlighted the emerging challenges and dynamic strategies for achieving robust data security in today’s business environment.

This year’s conference, which brought together top professionals and thought leaders in cybersecurity, provided the perfect backdrop for SealPath to articulate how advanced, data-centric security measures can profoundly shield and protect organizational data across all platforms. Our session, particularly noted for its depth and clarity, was also featured in the IT Security’s magazine article.

Reflecting on the event, Luis Ángel del Valle, CEO of SealPath, noted, “Our participation in this year’s IT Security Conference was yet another opportunity to share insights with our peers and demonstrate SealPath’s deep commitment to evolving data protection standards. We are pleased to provide thought leadership that resonates within the cybersecurity community.”

Read the full article in IT Security Magazine here. (Portuguese).

About IT Security Magazine

IT Insight Security appears in a context of accelerated digital transformation and, at the same time, growing vulnerability to cybercrime, with a different and innovative perspective. It is a publication born in the digital world, conceived from scratch for this new reality and which will combine a rigorous factual approach with an analysis of the market and the strategic and leadership challenges required to meet this growing challenge.

About SealPath
SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath’s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion Launches Veltar: Enhancing Device Management with Endpoint Security

ProMobi Technologies announced today that Scalefusion, its leading unified endpoint management solution (UEM), introduces Veltar, an innovative endpoint security product. Designed to enhance the enterprise security posture, Veltar combines advanced threat protection with seamless device management, enabling organizations to operate confidently in an increasingly complex digital landscape.

Veltar has been introduced to tackle the critical challenges posed by fragmented security tools and limited visibility into devices and their security. With the addition of Veltar, Scalefusion now seamlessly combines unified endpoint management (UEM), identity and access management (IAM), and endpoint security (EPS) into one comprehensive solution. As the third pillar of the product, Veltar aims to complete the solution so users can now effectively manage devices, access, and security within organizations.

With Veltar, IT admins get a curated set of security tools with the prime goal of protecting data loss, securing data at rest and in motion. Its features include VPN tunneling to secure data transmission to and from on-prem assets, secure web gateway (SWG) to block domains and websites based on categories, application control to ensure only trusted software runs on your devices, and I/O device control, among others.

“Veltar marks a major leap forward in endpoint security and management, bringing crucial security features together into a single platform. It is a critical component that combines endpoint security driven by the insights of device management. We had a goal of enabling enterprises to enhance their security posture while simplifying device, identity and access management and Veltar is the third piece of the puzzle.” — said Sriram Kakarala, Chief Product Officer at Scalefusion

Veltar is designed for organizations looking to streamline operations, and management of devices that hold critical data without compromising security.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

LDAP vs. Active Directory: Know the Differences and Use Cases

When managing user information and network resources, think of LDAP and Active Directory (AD) as two powerful tools in your digital toolbox. Suppose you’re organizing a large library. LDAP is like a universal cataloging system that helps you find any book from various libraries, regardless of its location. It provides a way to look up and manage the books, but it doesn’t come with the actual shelves or library services.

On the other hand, Active Directory is akin to a well-organized, high-tech library system that not only catalogs books but also manages everything in a library, from checking books in and out to controlling access to special collections.

LDAP vs Active Directory
LDAP or Active Directory: Which to Use and When

It’s a comprehensive system specifically designed to handle all the needs of a Windows-based library or network.

So, what sets these two apart?

Difference Between LDAP and Active Directory

 LDAPActive Directory
Overview LDAP, or Lightweight Directory Access Protocol, is a protocol used for accessing and managing directory services. It’s like a set of rules that help applications communicate with a directory service. Think of LDAP as a universal language for talking to directories.Active Directory (AD), developed by Microsoft, is a directory service used mainly in Windows environments. It’s like a giant address book for your network, keeping track of all users, computers, and resources.
PurposeLDAP’s main job is to organize and retrieve information from a directory. It’s not a directory itself but rather a way to interact with one.AD is used to manage and organize users, computers, and other resources in a network. It’s more than just a protocol, it’s a full directory service with built-in management tools.
StructureLDAP directories are often structured as a tree with various branches, which makes it easy to navigate and find information.In AD, assets are sorted into one of three tiers, domains, trees, and Forests.  It includes features like Group Policy and Domain Services, which help manage network resources and user permissions.
FlexibilityLDAP can be used with different directory services and is often employed in various systems like email servers and corporate databases.AD is specifically designed to work seamlessly with Windows environments, offering a range of tools and features for system administrators.
Use CasesIdeal for querying and modifying directory information across various environments, including Unix and Linux systems. It’s versatile and can be used in diverse setups where different directory services are involved.Best suited for managing users and resources in a Windows-based network. It’s commonly used in corporate environments where integration with other Microsoft services is essential.
IntegrationsWorks with a variety of directory services beyond Microsoft’s ecosystem. Its broad compatibility makes it suitable for integrating with different systems and platforms.Specifically designed for Windows environments. It integrates deeply with other Microsoft products, offering features like Group Policy and Domain Services that enhance its functionality in a Windows-centric setup.

Similarities Between LDAP and Active Directory

Despite their differences, LDAP and Active Directory (AD) share several key similarities:

Directory Services

Both LDAP and Active Directory are integral to managing directory services. They play an important role in storing, organizing, and retrieving information about users, devices, and other network resources. Whether you’re using LDAP or AD, both systems help keep track of this critical data, ensuring it’s accessible and well-organized.

Hierarchical Structure

LDAP and Active Directory utilize a hierarchical structure to organize information. This tree-like structure makes it easier to locate and manage data within their directories. By arranging data in a hierarchy, both systems allow for efficient data retrieval and organization, simplifying administrative tasks.

Authentication and Authorization

Both LDAP and Active Directory are used to authenticate and authorize users. They ensure that individuals can only access the resources and information they are permitted to use. This process helps secure the network and control access, making sure that sensitive data and resources are protected from unauthorized users.

Also read: Authentication vs. Authorization

Support for Various Protocols

While LDAP is a protocol used for accessing directory services, Active Directory supports LDAP as one of its communication protocols. This means that LDAP clients can interact with Active Directory servers using the LDAP protocol, providing a level of compatibility and flexibility between the two systems.

Centralized Management

Both LDAP and Active Directory offer centralized management capabilities. This feature allows administrators to manage users and resources from a single location. Centralized management streamlines administrative tasks, making it easier to oversee and control various aspects of the network and directory services.

When to Use LDAP

If your organization needs a flexible, protocol-based solution for directory services, LDAP is a strong candidate. It is ideal when you require a versatile system that can interact with various directory services and platforms, regardless of their specific technology. For example, if you’re managing user accounts across a diverse set of systems, LDAP provides a standardized method for accessing and updating directory information. Its protocol-centric design makes it highly adaptable, allowing integration with different types of directory services without being tied to a particular vendor or technology stack.

LDAP is also suitable for environments where you need to interact with multiple types of directory systems or where a universal directory service is necessary. In scenarios where you are integrating with third-party systems or applications, its flexibility ensures seamless communication and data retrieval.

When to Use Active Directory

Active Directory is often the best choice for businesses predominantly using Windows as their operating system. Designed and developed by Microsoft, AD offers a comprehensive suite of tools and services specifically tailored for Windows environments. If your organization operates within a Windows-based network, AD seamlessly integrates with other Microsoft products, such as Exchange, SharePoint, and Office 365. This integration enhances efficiency by allowing admins to manage users, computers, and resources from a central point.

AD’s built-in features, like Group Policy, Domain Services, and Federation Services, further simplify administrative tasks. Group Policy allows for centralized management of settings and permissions across the network, while Domain Services handle user authentication and resource access. Federation Services enables single sign-on across different systems and applications. AD’s deep integration with Windows platforms and Microsoft services makes it the ideal choice for managing a Windows-centric network environment.

Simplify and Strengthen Access Management

Choosing between LDAP and Active Directory involves understanding your organization’s specific needs and infrastructure. LDAP offers flexibility and cross-platform compatibility, making it a versatile solution for diverse environments and various directory services. On the other hand, Active Directory is modified for Windows-centric setups, providing a comprehensive suite of tools that seamlessly integrate with Microsoft products for network management.

Ultimately, the right choice depends on aligning the solution with your access management goals and technical work-frame.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

不到1秒駭客就能破解的密碼,你的密碼安全性強度夠嗎?

根據數位安全領域的翹楚- Nord Security 旗下產品-密碼管理「NordPass
,近期公布今年全球民眾TOP 200最常使用的密碼排行榜,全球最愛用的爛密碼出爐!
「123456」再度蟬聯全球榜首,有超過300萬人使用。第2名的「123456789」有162萬多人使用,第3名的「12345678」約有88萬人使用。後面依序排名為「password」、「qwerty123」、「qwerty1」、「111111」、「12345」、「secret」、「123123」。

由於這前10名密碼過於簡單,駭客皆不到1秒就能破解,密碼管理權威NordPass強烈建議不要再使用,並建議大家多利用不同大小的英文字母、數字及符號,進行多樣化的排列組合,以確保自身的個資。讓您的密碼難以破解,探索>>NordPass/企業密碼管理解決方案

什麼是密碼管理器?
密碼管理器是一種數位保險箱,可加密和儲存您的登入憑證、金鑰、信用卡和個人詳細資料以及機密文件。有了它,還可以幫你產生強度高的密碼並自動填入。

我應該使用密碼管理器嗎?
根據 NordPass 的調查,平均每人擁有 168 個個人用途的密碼 和 87 個工作用途的密碼。對於需要管理多個線上帳戶的人,建議使用 密碼管理工具。

全球信賴的品牌背書
提供全球頂級隱私和安全服務著稱的品牌 Nord Security,旗下產品-密碼管理NordPass是一款功能強大的密碼管理工具,主要幫助用戶安全地存儲和管理他們的密碼。結合零知識架構,確保只有您能存取自己的數據,連 NordPass 的團隊都無法窺探,真正做到隱私至上

選擇 NordPass,就是選擇一款兼具安全性、易用性和靈活性的密碼管理工具。它不僅幫助您節省時間,更讓您在數位世界中安心無憂!現在就加入數百萬用戶的行列,讓 NordPass 成為您的得力助手! 探索>>NordPass/企業密碼管理解決方案

關於 NordPass
NordPass 由領先全球網路安全產品市場的 Nord Security 公司開發。網路已成為一個混亂的空間,網路犯罪和資料保護問題損害了安全和信任。因此,我們團隊的全球使命是為世界各地的人們塑造一個更值得信賴、更和平的線上未來。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

EasyVista Ranked as Leader in SPARK Matrix™: IT Service Management Tools for Second Consecutive Year

NEW YORK – EasyVista, a global SaaS provider for comprehensive IT service management (ITSM), IT monitoring , Enterprise Service Management, and Remote Support, is proud to announce that it has been named a Leader in the 2024 SPARK Matrix™: IT Service Management Tools by QKS Group (formerly known as Quadrant Technologies) for the second year in a row. The EasyVista Platform stood out for its advanced features, low total cost of ownership (TCO), built-in customization options, and comprehensive end-to-end service experience.

Continue reading

Pandora FMS NG 779 RRR 新功能概覽

Pandora FMS NG 779 RRR 新功能概覽
這是一個小更新的版本,帶來了一些新功能。目前穩定性最高的最新版本為 Pandora FMS 777 Andrómeda LTS(長期支援版本)。
LTS 版本每年發布一次,而常規版本(RRR)約每兩個月更新一次。您可以前往我們的網站了解更多有關版本和更新系統的詳細資訊。

新功能與改進

1. 漏洞監控的強化
針對 MS Windows® 代理新增了全新的清單模組,並改進了現有模組,可以監控已安裝的軟件和系統修補程式。此改進大幅拓展了漏洞數據庫,並同時增強對 Windows 和 Linux 系統的可見性與管理能力。

2. 新增報表項目:事件列表
全新報表元素「事件列表」已加入,使用者可像傳統事件視圖一樣篩選和查看事件。未來版本中,此功能將逐步取代現有的事件報表元素。

3. 新增審核資訊小工具
儀表板新增了審核資訊小工具,可顯示當前使用者的詳細資訊,進一步提升系統操作的透明度與可追溯性。

4. 更多更新

Pandora FMS 779 除了推出全新功能外,還優化平台性能與自訂功能的技術改進。SAML 認證已升級,確保與 Azure 和 simpleSAML 2 的兼容性,同時增強安全性並提升企業環境中的整合效率。

另一個重大改進是支援為事件配置通用指令,即使沒有特定的狀態變更指令,也能加速事件回應。Windows® 的 IPAM 外掛現在支援更新例如「已佔用」和「可用」等數據,並可在 Satellite 伺服器上執行 IPAM 任務,進一步提高分佈式環境的操作靈活性。

為了加強系統安全,Satellite 伺服器新增了憑證存儲功能,支援 SSH、WMI 和 SNMPv3,並在配置檔中提供了加密選項。MongoDB® 的 Discovery 外掛新增了支援自訂 SQL 查詢的功能,用戶可據此創建專屬的監控模組,為資料庫管理提供了更大的靈活性。

在代理自動配置方面,Pandora FMS 779 引入了策略優先級功能,優先執行高優先級策略以提升效能。此外,新增的“agentalias”與“agentname”可作為網絡模組中的 IP 目標。現在可以透過「子類型」欄位過濾 SNMP 陷阱警報。在日誌收集中,Web 控制台加入了全新的 OpenSearch® 配置選項,可針對不同環境進行精確調整。

 

SAML Authentication Enhancements

Updated and improved authentication in Pandora FMS console using SAML, ensuring compatibility with SAML environments in Azure and with simpleSAML 2.

New General Event Instructions

Just like the instructions for changing the state of events, it is now possible to configure general default instructions that will be displayed when the instructions for changing the state are missing or should not be displayed.

IPAM Plugin Improvements

The IPAM Discovery MS Windows® Agent Plugin has new enhancements that allow you to update all the “Occupied”, “Available”, “Managed” and “Unmanaged” data that was previously only possible to update from Pandora FMS server.

IPAM Tasks from Satellite Servers

It is now possible to configure IPAM tasks in Pandora FMS console so that they can be run from a Satellite server with remote configuration enabled.

Credential Store Improvement in Satellite servers

Pandora FMS Satellite Servers now have the credential store for SSH, WMI and SNMPv3 modules. These credentials can also be encrypted in the configuration files used by Satellites to ensure their privacy.

Improvement in Discovery Plugin: MongoDB®

Included the ability to launch custom SQL queries to generate monitoring modules in the Discovery MongoDB plugin.

Policy Enforcement Priority in Autoconfiguration

To improve performance in monitoring policy enforcement, it is now possible to prioritize agent autoconfiguration rules, so that policies with higher priority are applied before the rest.

New macros for network modules

It is now possible to use “_agentalias_” and “_agentname_” macros as the target IP address in network modules.

Improved SNMP Trap Alerts

SNMP trap alerts can be configured to filter their triggers by the “Subtype” field.

Improved Alert Recovery

Included an option in alert recovery to be performed only upon the change of status to “normal” of a module. This option is configurable on each alert template.

Configuration Options for Collecting Logs

OpenSearch® setup in Pandora FMS Web Console for collecting logs now has more options that allow you to adjust some OpenSearch® configuration parameters for each environment.

Improvements and small changes

Case#GitLab#Description
N/A2361New feature for credential encryption in monitoring through SSH, WMI and SNMP 3. It includes new tokens that are used globally in the Satellite server or at agent level for their corresponding modules.
107196728By means of the macros _agentalias_ and _agentname_, and if these fields contain a valid IP address, these macros can be added to the Target IP field of the modules for subsequent monitoring.
12514

8092

  • Related: MR 79
Alerts by SNMP trap can also be filtered by subtype (Subtype trap).
N/A9669New audit Information widget.
14567 and 145859905You may add general read-only instructions to any type of event, regardless of the rest of the fields. Included the same mechanism for API 2.0 and PFMS CLI.
N/A11527For IPAM discovery tasks, you may now configure PFMS server or the Satellite server to handle said task.
N/A11748Added prioritization to agent autoconfiguration when applying monitoring policies.
N/A12755New event list report based on saved filter.
N/A13638Added the Recovery only on Normal status token to alert templates, so that alert recovery is performed only for normal state.
N/A

13785

  • Related: 12463, 12489, 13786, 13787, 13790, 14110, 14643.
New feature for Software Agents in MS Windows® performed through Inventory of installed patches and comparison with the list of patches to be installed.
N/A14193New custom queries for MongoDB® database monitoring using Discovery PFMS

Known changes and limitations

Case#GitLab#Description
N/A

9918

  • Related: 13642 and 13991
Added support for user authentication with SAML 2.0 (SimpleSAMLphp server) while supporting previous versions.
N/A12781Module-based, agent-based, and group-based event reports will be deprecated in the LTS release in 2025.
N/A13945Added new index configuration section to the Log Collector, so that, optionally, four important parameters may be defined in OpenSearch.

Fixed vulnerabilities

Case#GitLab#Description
N/A CVE-2024-35308 Acknowledgement: i[@]qvq.im14684Fixed the arbitrary reading of the operating system file by a user registered in PFMS Web Console (plugins section).
N/A CVE-2024-9987 Acknowledgement: i[@]qvq.im14685Fixed access to read-only CSV data for any agent module by a registered user in PFMS Web Console (console extensions section).

Bug Fixes

Case#GitLab#Description
N/A10062Fixed searches by module name in the Monitor detail view to make literal queries with the following characters: %, _, [, ], {, }, -, ^.
The only non-verbatim search character is the asterisk, so it can be searched literally if between quotation marks (and any search that includes quotation marks will be literal).
N/A

12962

  • Related: MR 79
Fixed special days for leap years.
N/A13073Fixed the display and style of the applied updates view (Warp Journal) to the product style.
N/A13114Fixed the description of the DNS plugin.
N/A13250Fixed the CLI PFMS command update_agent option update_gis_data, to only take values zero and one.
N/A13255Fixed the update_group command (PFMS CLI) to avoid hierarchy paradoxes against the same group or with groups related to other groups.
N/A13442Fixed the default value and description of token syncserver.
N/A

13511

  • Related: MR 79
Removed widget “Welcome message to” for failing to function as expected.
N/A13522Fixed visual glitches for both dark and light themes in the Credential Store.
N/A13523Added a warning message to module template management in case you did not select any Private Enterprise Number (PEN).
N/A13553Fixed visual glitches in Permissions Report PDF.
N/A13747

Fixed the following commands in HTTP 500 errors in API 1.0:

  • get id_group_agent_by_name
  • get id_group_agent_by_alias
  • get group_agent_by_name
1762013782Fixed Cron Jobs task editing and/or addition in the Command Center (Metaconsole).
N/A13792Fixed the scope of users regarding the special group All in Inventory Alerts, so that they may have access to it only if they have specific permissions on it.
N/A13794Fixed the Cluster view so that only users who have permissions on the group to which the cluster belongs may access it.
N/A13797Fixed and limited agent deletion in Monitoring Policies for users who do not have permissions on the agent groups.
N/A

13799

  • Related: 14585
Fixed the display of tasks belonging to group ALL in IPAM if users do not have permission on said group. Fixed other permissions for different types of user profiles.
N/A13811Fixed the first uninitialized state in web module creation if applicable.
N/A

13818

  • Related: 13731, 13783, 14581
Fixed the correct interpretation and execution of macros in custom event responses if the display command option is enabled when running a command (view used for debugging).
N/A

13857

  • Related: 13803, 13804, 13840, 13848
Fixed a major bug in the Command Center (Metaconsole) that affected centralized services and services on nodes when added as a service element.
N/A13819Restricted access to Visual Consoles both in nodes and in the Command Center (Metaconsole) by means of the use of URLs by users without a VM profile.
1773813826Fixed the application of Regex conditions for received monitoring data in character string imodules, to detect state changes.
1765613829Fixed external alert addition in monitoring policies when extended characters are used in modules. To that end, the exact matching feature in regular expressions was also added.
N/A13836Removed repetitive message in HA environment alerting. It is verified that it appears in a timely manner according to the type of detected error and without repetitions.
N/A13854Removed the warning message in the event alerts view, which was only valid for versions prior to 779.
N/A13855Fixed the operation of basic security monitoring in the installation of the Software Agent for MS Windows® (Windows Server 2022®).
1782713865Fixed error HTTP 500 when saving bulk monitoring policy operations without having made any changes.
N/A13917Fixed mass operations on agents in centralized environments, specifically in the secondary group description editing.
N/A13952Fixed agent group disabling for counting agents in use according to license terms.
1754114065Fixed the token to explore all virtual machines and CPU and memory data collecting for monitoring XenServer® with Discovery PFMS.
N/A14095Fixed the token generation process for users using the PFMS API 2.0.
N/A14109Fixed several errors in the API 2.0 PFMS when paying certain fields with special enumeration.
1832914137Fixed image display in base64 in WUX monitoring when generating PDF.
1834914147Fixed unsolicited login to Web Console when using PFMS API 2.0.
1836214152Fixed inverse threshold application in monitoring policies.
N/A14163Fixed the WUX server to stop if the specified IP address to be monitored is out of reach.
N/A

14171

  • Related: 12374, MR 79
Fixed Oracle monitoring to connect in sysdba, thick and thin mode while maintaining cryptographic compatibility ®.
18394

14189

  • Related: MR 79
Fixed the use of threads and cores used to streamline data collecting in VMWare monitoring in Discovery PFMS.
1846514192Fixed duplicity in agent creation caused by a misconfigured token in VMWare monitoring with Discovery PFMS.
18651

14273

  • Related: 11815
Fixed the possibility of choosing another agent in synthetic module creation.
18691

14305

  • Related: 14289
Fixed access to users with ACLs and secondary groups to remote operation with Pandora RC.
N/A

14291

  • Related: 12941, 13973, MR 79
Interval correction in Dataserver modules.
N/A14342Fixed token display in the PFMS API 1.0.
1884814381En Fixed graph display in Monitor view in the Command Center (Metaconsole).
N/A

14417

  • Related: 14418
Fixed inventory enablement (basic options) in Software Agents.
1890214507Fixed agent duplication in MySQL monitoring with Discovery PFMS.
N/A14822Fixed connection to the nodes for alert display from the Command Center (Metaconsole).
N/A14521Fixed the default event filter assignment in every user profile in both Command Center and nodes.
N/A14533 and 14639Fixed the use of the Command Center as an update repository for centralized nodes.
N/A

14536

  • Related: 14164
Fixed the use of double quotation marks (character escape) in event update in PFMS API 2.0.
N/A14540Fixed the Discovery server for updating the extra_data field (data received in JSON).
N/A14651Fixed Error 500 when accessing the View Map in Recon Task.
N/A

14657

  • Related: 14256
Fixed filter in event reports for the Command Center and nodes.
N/A14701Fixed offline update (version comparison).
N/A14706Visually enhanced the agent configuration interface and the module interface.
N/A14734Fixed plugin pandora_df_used to always return values in bytes and thresholds in percentages.
N/A

14825

  • Related: 14844 and 14848
Checked the operation in Visual Consoles of the elements Serialized pie graph, Bars graph, Event history graph and Simple value.
N/A

14867

  • Related: 14865
Fixed ratings in vulnerability monitoring so that they fit a range of 0 to 10 points.
N/A14865Fixed the duplicated addition of the same software with different versions in vulnerability monitoring. Now it only takes into account the next version to the one installed for rating calculation.
N/A14862Fixed PFMS server restart for version 780 after an online update. For version 779, Pandora FMS must be manually restarted.

關於 PandoraFMS
Pandora FMS 是一個靈活的監控系統,能夠監控設備、基礎設施、應用程式、服務和業務流程。當然,Pandora FMS 可以控制的東西之一就是您電腦的硬碟。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【產品資訊】企業360°全方位的PAM管理平台─Senhasegura

特權存取管理 (PAM ) 是一種網路安全策略,專注於控制和保護 IT 環境中具有較高存取權限的帳戶。這些帳戶具有特殊權限,如果受到威脅,可能會對組織造成嚴重損害。


為什麼 PAM 很重要?
網路攻擊經常針對特權帳戶,使攻擊者能夠不受限制地存取機密資料和關鍵系統。 senhasegura PAM 解決方案透過以下方式幫助減輕這些風險:

  1. 嚴格的存取控制:senhasegura PAM 解決方案確定誰有權存取帳戶、何時以及出於什麼目的
  2. 監控和稽核:監控並記錄帳戶活動以偵測可疑行為
  3. 憑證保護:憑證被安全地儲存和加密
  4. 代理訪問:允許透過senhasegura 監視帳戶的訪問,記錄所有使用者操作以供以後審核
  5. 命令控制:允許在代理存取期間阻止特定命令,防止執行有害操作


安全第一的解決方案將重新定義您的身分安全性原則
senhasegura 的革命性創新有效防止特權攻擊,使其成為業界最全面的保護人類和機器身分的解決方案。它經濟實惠且全面,可確保為您組織的關鍵資產提供優質保護,同時提供無與倫比的客戶支援。包含:

  1. 安全特權訪問:PAM Core透過集中控制、實施詳細的存取限制、監督使用者活動和建立深入的稽核追蹤來專業的管理特權帳戶
  2. 安全的遠距工作:Domum Remote Access將遠端使用者安全的連結到內部系統、管理詳細的存取控制權、監控使用者會話並採用多重驗證
  3. DevOps秘密管理:DevOps Secret Manager透過存取控制、自動秘密輪調、與現有DevOps工具整合以及全面的報告和分析來安全的保護敏感資料
  4. 證書管理:證書管理器及中並自動化證書管理、監控證書狀態並與證書頒發機構合作
  5. 端點和設備保護:Endpoint Manager透過監督應用程式使用情況、指派特定權限、管理憑證以及提供全面的報表和分析來實施最低權限原則
  6. 個人密碼管理器:MySafe將使用者憑證權的儲存在加密的保管庫中、產生高強度密碼、自動登入並促進安全的資訊共用
  7. 雲端身份和存取管理:Cloud IAM透過多因素身分驗證、基於角色的控制、稽核追蹤和詳細報告以及與目前身份提供者的相容性來簡化身份管理
  8. 雲端權力和基礎設施管理:雲端權利透過基於角色的控制、持續的風險監控、與雲端提供者的無縫整合以及易於報告的審計追蹤來簡化權利管理


Senhasegura 成功的核心在於其 360° 特權平台,這是一個強大且使用者友好的解決方案,旨在保護特權使用者和機器的安全。 Gartner、KuppingerCole 和 ITRG 等產業分析師一致認為 Senhasegura 是 PAM 領導者,因為該平台在保護敏感資料、降低風險和確保合規性方面非常有效。值得注意的是,Senhasegura 還擁有PAM 行業中最快的價值實現時間 (TTV) 和最低的擁有成本,這使其成為尋求全面特權存取安全的組織的有吸引力的選擇。


【 Senhasegura/特權帳號管理解決方案】 https://version-2.com.tw/senhasegura/#products&domum  
✽ 歡迎電話洽詢台灣二版專業資安團隊(02)7722-6899

關於 Segura®
Segura® 致力於確保企業對其特權操作與資訊的自主掌控。為此,我們透過追蹤管理者在網絡、伺服器、資料庫及眾多裝置上的操作,有效防範資料竊取。此外,我們也協助企業符合稽核要求及最嚴格的標準,包括 PCI DSS、沙賓法案(Sarbanes-Oxley)、ISO 27001 及 HIPAA。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【資安快訊】Palo Alto Networks防火牆配置工具Expedition驚傳重大漏洞遭利用



美國網路安全暨基礎設施安全局(CISA)於本週四證實,Palo Alto Networks 的防火牆配置工具 Expedition 出現重大資安 漏洞(CVE-2024-5910),且已遭駭客積極利用。此漏洞可能導致管理員帳號遭到接管,引發資安疑慮。

根據 Synopsys 網路安全研究中心(CyRC)研究員 Brian Hysell 的發現,此漏洞源自關鍵功能缺乏身分驗證機制。具備網 路存取權限的攻擊者可藉此漏洞輕易接管 Expedition 管理員帳號。Palo Alto Networks 已於 2024 年 7 月釋出修補程式,並 建議無法立即升級的用戶務必限制 Expedition 的網路存取權限。

原文出處:https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=11367

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。