SlideShare une entreprise Scribd logo
1  sur  18
Pandora FMS(Flexible Monitoring System)
Overview Pandora FMS software solution for monitoring computer networks that allows monitoring in a visual way the status and performance of several parameters from different operating systems, servers, applications and hardware systems such as firewalls, proxies, databases, web servers or routers.
Overview cont. Pandora FMS can be deployed in almost any operating system. It features remote monitoring (WMI, SNMP, TCP. UDP, ICMP, HTTP...) and it can also use agents. An agent is available for each platform. It can also monitor hardware systems with a TCP/IP stack, such as load balancers, routers, network switches, printers or firewalls.
Architectures Pandora FMS has a very flexible and versalitedesign and allow to work in several different ways. Pandora FMS works with remote remonitoring and with local agent-based monitoring, and of course, allow to combine both of them.  Pandora FMS is developed in several languages: C++, Perl and VBS in the agents, Perl in the server and PHP5/Javascript in the Web Console.
Pandora FMS Architecture
Architectures cont. ,[object Object],The main idea consist on creating a hierarchical structure that distribute the information from down to top, being the top point the more global one, that collect only an extract of basic information of Pandora FMS installations at the lowest level.
Architectures cont. ,[object Object],Pandora FMS Enterprise version, thanks to the Meta Console, implements a way for distributing the monitoring between different Pandora FMS servers that are physically independent. Each server has its own database, console and server. The Meta Console doesn't process information, it only "reads" the information from its original source
Meta Console
Architectures cont. ,[object Object],supports proxy usage (HTTP/Connect mode), so agents can contact directly with the server using an intermediate standard proxy. We also can use a new tool called Tentacle Proxy Server, which as its name says, is used to centralize all communication between Pandora FMS and the agents, allowing the file management and remote configuration for policy based-monitoring.
Tentacle Proxy
Features ,[object Object],Pandora FMS is able to scan and detect new non monitored systems periodically, detecting its OS and profile, based on TCP ports.
Features cont. ,[object Object],Pandora FMS provides a complete solution for performance & availability, monitoring the key resources across the infrastructure, to ensure that all devices are ready to respond to end user requests.
Features cont. ,[object Object],It is possible to search events, filtering them by group, type, severity, or event status. All this is done from the Web Console.  ,[object Object],allows to each user to define their customized view of the monitoring, this is a customized-defined graph view, based on a representation in the space, selected items, represented status, data, graphs or other visual console status, scaling always the critical event.
Features cont. ,[object Object],It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrators attention. Pandora FMS can monitor any device with SNMP protocol directly from the Pandora FMS Network Server
Open Source Pandora FMS operates on a powerful combination of open source software development and commercial software delivery.
Open Source cont. Benefits of the community-driven approach include: Faster Innovation Open Architecture Transparency Access to code
Open Source cont. Enterprises get the feature-complete solution and vendor accountability they expect when acquiring a commercial product. Benefits realized by our enteprise clients include: Expert Support & Services Lower Costs Feature-Complete Software Legal Protection
...Thank You...

Contenu connexe

Tendances

Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directoryPrince JabaKumar
 
Firewall - Failover & Transparent Firewall
Firewall - Failover & Transparent FirewallFirewall - Failover & Transparent Firewall
Firewall - Failover & Transparent Firewall NetProtocol Xpert
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted ComputingMaksim Djackov
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor10-Strike Software
 
Topic on DCIM - ManageEngine | OpManager
Topic on DCIM - ManageEngine | OpManagerTopic on DCIM - ManageEngine | OpManager
Topic on DCIM - ManageEngine | OpManagerRex Antony Peter
 

Tendances (13)

OpManager - Technical overview
OpManager - Technical overviewOpManager - Technical overview
OpManager - Technical overview
 
Nsm overview
Nsm overviewNsm overview
Nsm overview
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directory
 
Strix nms
Strix nmsStrix nms
Strix nms
 
Firewall - Failover & Transparent Firewall
Firewall - Failover & Transparent FirewallFirewall - Failover & Transparent Firewall
Firewall - Failover & Transparent Firewall
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
Topic on DCIM - ManageEngine | OpManager
Topic on DCIM - ManageEngine | OpManagerTopic on DCIM - ManageEngine | OpManager
Topic on DCIM - ManageEngine | OpManager
 

En vedette

La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2
La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2
La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2Paris Monitoring
 
Séminaire CMS libres octobre 2008 LINAGORA
Séminaire CMS libres octobre 2008 LINAGORASéminaire CMS libres octobre 2008 LINAGORA
Séminaire CMS libres octobre 2008 LINAGORALINAGORA
 
PandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring SystemPandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring SystemEnrique Verdes
 
Do You Really Need A Process?
Do You Really Need A Process?Do You Really Need A Process?
Do You Really Need A Process?Mansoor Adenwala
 
Why Docker
Why DockerWhy Docker
Why DockerdotCloud
 
Problem solving & decision making at the workplace
Problem solving & decision making at the workplaceProblem solving & decision making at the workplace
Problem solving & decision making at the workplaceFaakor Agyekum
 
Docker introduction
Docker introductionDocker introduction
Docker introductiondotCloud
 
Understand Innovation in 5 Minutes
Understand Innovation in 5 MinutesUnderstand Innovation in 5 Minutes
Understand Innovation in 5 MinutesGordon Graham
 
Docker 101: Introduction to Docker
Docker 101: Introduction to DockerDocker 101: Introduction to Docker
Docker 101: Introduction to DockerDocker, Inc.
 
Intro to Design Thinking
Intro to Design ThinkingIntro to Design Thinking
Intro to Design ThinkingMike Krieger
 
Supervision V2 ppt
Supervision V2 pptSupervision V2 ppt
Supervision V2 pptjeehane
 
Design Thinking is Killing Creativity
Design Thinking is Killing CreativityDesign Thinking is Killing Creativity
Design Thinking is Killing Creativitydesignsojourn
 

En vedette (12)

La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2
La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2
La maturité des entreprises avec la supervision OSS - Paris Monitoring meetup #2
 
Séminaire CMS libres octobre 2008 LINAGORA
Séminaire CMS libres octobre 2008 LINAGORASéminaire CMS libres octobre 2008 LINAGORA
Séminaire CMS libres octobre 2008 LINAGORA
 
PandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring SystemPandoraFMS: Free Monitoring System
PandoraFMS: Free Monitoring System
 
Do You Really Need A Process?
Do You Really Need A Process?Do You Really Need A Process?
Do You Really Need A Process?
 
Why Docker
Why DockerWhy Docker
Why Docker
 
Problem solving & decision making at the workplace
Problem solving & decision making at the workplaceProblem solving & decision making at the workplace
Problem solving & decision making at the workplace
 
Docker introduction
Docker introductionDocker introduction
Docker introduction
 
Understand Innovation in 5 Minutes
Understand Innovation in 5 MinutesUnderstand Innovation in 5 Minutes
Understand Innovation in 5 Minutes
 
Docker 101: Introduction to Docker
Docker 101: Introduction to DockerDocker 101: Introduction to Docker
Docker 101: Introduction to Docker
 
Intro to Design Thinking
Intro to Design ThinkingIntro to Design Thinking
Intro to Design Thinking
 
Supervision V2 ppt
Supervision V2 pptSupervision V2 ppt
Supervision V2 ppt
 
Design Thinking is Killing Creativity
Design Thinking is Killing CreativityDesign Thinking is Killing Creativity
Design Thinking is Killing Creativity
 

Similaire à Pandora fms

PandoraFMS: Pasado, presente y futuro.
PandoraFMS: Pasado, presente y futuro.PandoraFMS: Pasado, presente y futuro.
PandoraFMS: Pasado, presente y futuro.Enrique Verdes
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
Loriot Pro V5 Presentation V2 En
Loriot Pro V5 Presentation V2 EnLoriot Pro V5 Presentation V2 En
Loriot Pro V5 Presentation V2 EnLUTEUS
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command linesprincesly
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2CFabrizio Farinacci
 
Pandora FMS: Jboss monitoring
Pandora FMS: Jboss monitoring Pandora FMS: Jboss monitoring
Pandora FMS: Jboss monitoring Pandora FMS
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxsaad504633
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Sandeep Kumar Yadav
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 

Similaire à Pandora fms (20)

PandoraFMS: Pasado, presente y futuro.
PandoraFMS: Pasado, presente y futuro.PandoraFMS: Pasado, presente y futuro.
PandoraFMS: Pasado, presente y futuro.
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Loriot Pro V5 Presentation V2 En
Loriot Pro V5 Presentation V2 EnLoriot Pro V5 Presentation V2 En
Loriot Pro V5 Presentation V2 En
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command lines
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
Pandora FMS: Jboss monitoring
Pandora FMS: Jboss monitoring Pandora FMS: Jboss monitoring
Pandora FMS: Jboss monitoring
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 

Pandora fms

  • 2. Overview Pandora FMS software solution for monitoring computer networks that allows monitoring in a visual way the status and performance of several parameters from different operating systems, servers, applications and hardware systems such as firewalls, proxies, databases, web servers or routers.
  • 3. Overview cont. Pandora FMS can be deployed in almost any operating system. It features remote monitoring (WMI, SNMP, TCP. UDP, ICMP, HTTP...) and it can also use agents. An agent is available for each platform. It can also monitor hardware systems with a TCP/IP stack, such as load balancers, routers, network switches, printers or firewalls.
  • 4. Architectures Pandora FMS has a very flexible and versalitedesign and allow to work in several different ways. Pandora FMS works with remote remonitoring and with local agent-based monitoring, and of course, allow to combine both of them. Pandora FMS is developed in several languages: C++, Perl and VBS in the agents, Perl in the server and PHP5/Javascript in the Web Console.
  • 6.
  • 7.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Open Source Pandora FMS operates on a powerful combination of open source software development and commercial software delivery.
  • 16. Open Source cont. Benefits of the community-driven approach include: Faster Innovation Open Architecture Transparency Access to code
  • 17. Open Source cont. Enterprises get the feature-complete solution and vendor accountability they expect when acquiring a commercial product. Benefits realized by our enteprise clients include: Expert Support & Services Lower Costs Feature-Complete Software Legal Protection