IDG security report

Data that circulate through monitoring systems represent by themselves an asset to be protected

Pandora FMS selected by IDG as partner for this exclusive security report
Informe seguridad Pandora FMS
Data Pandora
Data Pandora
An attacker may compromise asset operation on which the critical services operate; in a hospital, it may shut down diagnostic tests, or in the case of public services, it could cause a shutdown in basic supplies (e.g. energy or telecommunications). On the other hand, it can be done with critical or sensitive information; for instance, medical reports or business activity or transaction information.

.01

Importance of security

.02

Monitoring strategy

.03

Asset evaluation

.04

Basic security principles

.05

Architecture outline

.06

Safe base system

The report

This document aims to help organizations make their monitoring systems safer by introducing security into monitoring conversations and decisions.

What topics will you learn about in our report?
Importancia de la seguridad

.01

Security importance

Companies are increasingly aware of the importance of monitoring processes and services to better manage and control them. However, they do not perceive the need to introduce security into monitoring.

.02

Monitoring strategy

As monitoring projects increase, they begin to reveal technological aspects that have not received enough attention, such as the lack of control or ignorance over existing assets, and security deficiencies.
Estrategia de monitorización
Flexibility Pandora FMS

.03

Asset evaluation

A monitoring strategy involves first cataloging and evaluating the organization’s technological assets… If there is no visibility over the assets, it is not possible to have control over the services.

.04

Basic safety principles

The starting point to protect monitoring systems is awareness about the need to incorporate security as a management element, and not as a link in the chain of security of assets and services.
Security Pandora FMS
Esquema de arquitectura

.05

Architecture outline

Security must be part of a monitoring architecture from its design, hence the need for a systematic approach that covers the different architecture layers.

.06

Safe base system

Pandora FMS issues a series of recommendations to safely install all Pandora FMS components (and valid for any other monitoring system), based on a standard RHEL7 platform or its Centos7 equivalent.
Manual de implementación
Informe seguridad

Download our free report and start enhancing the security of your monitoring environments

Start your free Pandora FMS Enterprise trial, fully functional for 14 days