BLOG

Open Source Enterprise Monitoring Icinga2 (examples of Monitoring).

Open Source Enterprise Monitoring Icinga2 (examples of Monitoring). Monitoring plays an inevitable part in any IT infrastructure. It could be argued that monitoring tools are the most essential, providing crucial information that will help you ensure service up time and optimal performance. A well configured monitoring setup will keep track of all the important activities…

ImageMehr erfahren

What is SSL and why is it important for secure web browsing?

What is SSL and why is it important for secure web browsing? Lately, more and more often we hear rumors of numerous identity theft over the Internet, passwords leak, „insertion“ of the virus, and many of the laity is dotted with new concepts and words – such as ransomware. All these security and security posts…

ImageMehr erfahren

What is DNS (Domain Name System)

What is DNS? DNS, an abbreviation of the Domain Name System, makes your Internet browsing without much trouble. The DNS functions as an interpreter between humans, who talk words, and computers, who “talk numbers”. These numbers are functionally similar to telephone numbers and are known as IP addresses. Domain Name System or DNS is a…

ImageMehr erfahren

Information Technology Security Policy and Procedures

What does Security Policy mean? A security policy is a written document in an organization outlining how to protect the organization from threats, including computer security threats, and how to handle situations when they do occur. A security policy must identify all of a company’s assets as well as all the potential threats to those…

ImageMehr erfahren

Network architecture

What is Network architecture? Network architecture is the design of a communications network. It includes the physical and logical layout of the network, the framework of accepted standards and specifications of elements, equipment, services, protocols and functions, growth and change assumptions, and high-level operational principles and procedures. Modern networks encompass a variety of architectural and…

ImageMehr erfahren
Image

Kontaktieren Sie uns

Image
Sichern Sie sich jetzt Ihr spezielles Angebot!

    Wir verarbeiten Ihre personenbezogenen Daten zur Beantwortung Ihrer Anfrage bzw. Bearbeitung Ihrer Kontaktaufnahme und löschen sie, wenn Ihre Anfrage erledigt ist oder Sie der weiteren Verarbeitung widersprechen. Weitere Infos dazu finden Sie in unsere Datenschutzerklärung.