Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Friday, January 11, 2019

Nagios XI Review

Nagios XI Review

Nagios XI (Current Version 5.4.11) is a network monitoring, reporting, and alerting software for network / systems administrators. This article will briefly cover the pricing, main features, system requirements, and official links for the software.

Pricing

Nagios XI has two distinct editions with three options each when it comes to pricing and licensing. They are as such:
  • Standard Edition: This edition costs $1,995 for 100 maximum nodes, $2,995 for 200 nodes, and $4,995 for unlimited nodes. Standard edition includes GUI configuration, reporting, visualizations, custom dashboards / views, notifications and more.
  • Enterprise Edition: This edition costs $3,495 for 100 maximum nodes, $4,495 for 200 nodes, and $6,495 for unlimited nodes. Enterprise edition includes all the above listed features, as well as bulk tools, audit logging, SLA support, automated host decommissioning and more.
Please note that the Enterprise edition requires an annual renewal of the Maintenance and Support or Maintenance Only contract.
The renewal fees are listed below:
  • Standard Renewal (Maintenance and Support): This option costs $1,650 for 100 nodes, $2,000 for 200 nodes, and $4,000 for unlimited nodes.
  • Standard Renewal (Maintenance Only): This option costs $650 for 100 nodes, $750 for 200 nodes, and $1,500 for unlimited nodes.
  • Enterprise Renewal Maintenance and Support): This option costs $2,400 for 100 nodes, $2,750 for 200 nodes, and $4,750 for unlimited nodes.
  • Enterprise Renewal (Maintenance Only): This option costs $1,400 for 100 nodes, $1,500 for 200 nodes, and $2,250 for unlimited nodes.
  • If you would like to add phone support, you can purchase either 5 calls for $995, or 10 calls for $1,495. These expire when the license expires.

Features

Lets Review the Main features of Nagios:
  • Customizable Web Interface:
    Nagios XI includes a dashboard viewed in a web browser, which can be used to monitor and manage network devices. Nagios options and settings can also be configured from the web browser, and the dashboards can be customized to display an overview for easy status updates.
  • Diverse Monitoring Capabilities:
    Nagios XI is capable of performing active / passive host checks, service checks, collecting various types of system information, monitoring applications, network protocols, and more. Third party addons are available, further increasing the monitorable scope of Nagios XI
  • Reporting Services:
    Nagios XI supports custom reports detailing all sorts of events based on user-defined filters. Some of the filtering options include time ranges, hosts, groups, and more. The data is displayed in both pie chart and table format, and these can be added to the dashboard or exported to a JPEG if necessary, with two clicks.
  • Notification Features:
    Nagios XI can send alerts using either Email or SMS. Filtering options are available for only allowing certain types of alerts. The options of statuses listed are acknowledgment, recovery, down, unreachable, flapping, or downtime for hosts. The same options are available for Service, with the addition of warning and critical statuses, and the removal of unreachable status. Notification’s messages themselves can be further customized, and sending test notifications is supported as well.
  • LDAP Support and Custom Users:
    Nagios XI is capable of integrating with LDAP and defining different access levels and views for different users, allowing for departmental use instead of just one admin account.
  • Bandwidth Monitoring via SNMP:
    Nagios provides in-depth analysis of your Network Bandwidth by Monitoring via SNMPv1, 2c, or 3. Get a look into your network interface utilization and the amount of traffic inbound and outbound network interfaces. Easily pinpoint Over trafficked or utilized ports, discover network traffic/bandwidth hogs in your network and quickly identify latency or outages.

OS Compatibility / System Requirements

Nagios XI supports the following minimum requirements:
  • At least 20 GB of free hard drive space.
  • 2 GB Memory or more.
  • Dual Core 2.4 GHz CPU or faster.
  • CentOS or RHEL (Red Hat Enterprise Linux) versions 5, 6, or 7.
  • MySQL, plus PostgresQL if running versions less than Nagios XI 5 or upgrading from pre-5 version.
There are additional hardware minimums depending on monitored nodes / services.
  • 50 hosts, 250 services:
    At least 40 GB disk space, 1-2 cores, and 1-4 GB RAM.
  • 100 hosts, 500 services:
    At least 80 GB disk space, 2-4 cores, and 4-8 GB RAM.
  • More than 500 hosts, more than 2,500 services:
    At least 120 GB disk space, more than 4 cores, and more than 8 GB RAM.
If monitoring over 1000 hosts or 5000 services, a dedicated physical server is recommended.
Please note that the download is available for VMware, VirtualPC, and Source Install, meaning that the only servers that can run the software natively are CentOS and REHL as listed above, unless using a virtual machine.
If you are running windows, you can still use a virtual machine using either the VirtualPC or VMware images available for download. While the server software does not run on native Windows, you can still monitor all windows servers, workstations, and other network devices.
The VMWare image will require an ESX Server, VMWare Workstation, Player or VirtualBox in order to run the virtual machine. The image is running CentOS 6, and networking is set to bridge mode with DHCP enabled. Initial credentials for the machine are listed on the main site, and should be changed as soon as possible.

Screenshots

Nagios XI Monitoring Engine Status
Nagios XI Monitoring Engine Status

nagios xi custom reports
Nagios XI Custom Reports

Nagios XI Demo Dashboard
Nagios XI Demo Dashboard

Official Links

The Nagios XI main site and overview can be found at:
To download the product, please visit:
Note that the product is available for VMWare 64 bit & 32 bit, VirtualPC 64 bit & 32 bit, and as Source Install.
Nagios XI is a powerful / expandable network monitoring, reporting, and alerting software capable of keeping track of various types of nodes and applications / services on your network. We hope this Nagios Review covered all the basics of the software, including price, system requirements and feature set – If nagios doesn’t fit your Needs, then check out some other nagios alternatives for more options!

A comprehensive approach of integrating technology in the design of the city

IoT security is important

Purpose of the brands

CIO emerging technologies wish list

Wednesday, January 09, 2019

ManageEngine Paparkan Tren Teknologi 2019

Jakarta, Biskom – Dalam beberapa waktu terakhir, sudah banyak teknologi baru yang populer dan mulai diterapkan di Indonesia. Dimulai dari Artificial intelligence (AI), data analytics, blockchain, hingga Machine Learning.
Namun, di tahun 2019 diprediksi akan lebih banyak lagi tren teknologi yang menjamur secara global dari sudut pandang korporat. Berikut predeksi ManageEngine yang disampaikan Shailesh Kumar Davey – Vice President, ManageEngine;
1. Proses otomatisasi digital akan dipercepat
Adopsi teknologi otomatisasi proses oleh banyak perusahaan akan terus berkembang dengan teknologi yang diharapkan untuk membuat perusahaan semakin lincah, berbasiskan data serta cepat dalam mengambil keputusan di manapun mereka berada. Lebih penting lagi, otomatisasi proses juga akan membantu perusahaan untuk mencapai keuntungan operasional dan efisiensi sederhana yang dibuat dengan otomatisasi dasar untuk memanfaatkan peluang pendapatan baru.
Sebagai contoh, bank yang merangkul FinTech dapat menggunakan otomatisasi proses digital untuk meningkatkan visibilitas waktu nyata ke dalam data pelanggan dan faktor pandangan yang ditingkatkan menjadi penilaian risiko real-time dari pelanggan. Untuk menjelaskan lebih lanjut, bank dapat menyediakan pelanggan dengan alat digital yang berkaitan dengan akuntansi, peminjaman, dan semua fungsi back office lainnya.
Pelanggan dapat memberikan izin kepada bank untuk menggunakan data yang dipilih untuk mendapatkan visibilitas yang baik pada pergerakan bisnis mereka. Hal ini dapat memungkinkan bank untuk menyediakan layanan keuangan yang lebih cepat kepada pelanggan dan dengan biaya lebih rendah, bukan hanya karena otomatisasi tetapi juga karena visibilitas risiko yang lebih baik dari pelanggan.
2. Pengenalan Karakter Optis (OCR), Pemrosesan Bahasa Alami (NLP), suara, video, pemrosesan gambar akan membantu peningkatan produktivitas
Masalah utama dari otomatisasi proses adalah setiap bentuk web yang harus diisi oleh pelanggan, karyawan, atau mitra ketika organisasi ingin memperoleh data mereka.
Namun, dengan adanya teknologi Artificial Intelligence (AI) serta Machine Learning (ML) yang sudah cukup matang untuk memproses suara, video, teks, dan gambar dengan baik, kegiatan alami melakukan panggilan telepon, mengambil video, atau mengambil gambar akan dapat digunakan untuk mengisi formulir yang diperkaya data secara otomatis.
Oleh karena itu, kedua tujuan akan dipenuhi — mengumpulkan data yang mumpuni serta proses mengisi formulir yang lebih sedikit — dan teknologi ini akan meneruskan perjalanan mereka ke dalam perusahaan.
3. Masalah privasi akan menjadi pusat perhatian
Dengan Regulasi Perlindungan Data Umum (GDPR) menjadi kenyataan dan tuan rumah dari negara lain yang meloloskan undang-undang privasi yang sama, penggunaan data akan dimonitor secara ketat.
Data akan ditandai sehingga asalnya akan diketahui pada titik penggunaan. Alat yang terkait dengan penandaan data dan manajemen data master akan menjadi sangat penting. Masalah privasi dan konsekuensi hukum terkait dapat memperlambat pengambilan keputusan di perusahaan. Sebagai tanggapan, pesan generasi baru, alat konferensi web audio / video akan digunakan oleh perusahaan untuk mencapai tujuan kembar kepatuhan privasi dan pengambilan keputusan yang cepat.
4. Lokasi data akan meningkatkan keragaman
Banyak negara yang mengharuskan data tersebut berada dalam batas-batas geografis. Perusahaan yang menggunakan Perangkat Lunak sebagai Layanan (SaaS) atau Platform sebagai Layanan (PaaS) akan berakhir menggunakan cloud publik khusus negara atau bahkan cloud yang bersifat privat. Akibatnya, data dan aplikasi penting yang perlu dipantau akan tersebar di seluruh geografi. Alat dan teknologi pemantauan yang membantu mengkonsolidasikan tampilan dari aplikasi dan data ini akan melihat adopsi perusahaan yang lebih besar.
Peningkatan lokalitas data ini juga memerlukan Identitas dan Akses Manajemen gabungan (IAM) dengan pertimbangan keamanan Zero Trust. Akses masuk tunggal, otentikasi multi-faktor, dan manajemen mobilitas perusahaan juga akan menjadi tempat umum di perusahaan.
5. Jenis perangkat keras baru di pusat data
Beban kerja data di pusat data meningkat, dan musnahnya hukum Moore tidak membantu CPU untuk mengimbangi beban kerja tersebut. Perangkat keras baru seperti Graphics Processing Unit (GPU), Field-Programmable Gate Array (FPGA), Application-Specific Integrated Circuit (ASIC) akan menjadi hal yang umum di pusat data.
Tim TI Perusahaan harus memiliki pengetahuan tentang teknologi ini dan menggunakan aplikasi dan alat yang tepat untuk memastikan bahwa pengeluaran perusahaan digunakan secara bijaksana untuk perangkat keras yang lebih mumpuni. (red)
sumber: 

Tuesday, January 08, 2019

The Social Media Trends

Top ten retail #banking trends for 2018 and it's actual trends

Personal Data Ecosystem

Smartcity Privacy

Monday, January 07, 2019

Hati-hati SEKSTORSI

Sunday, January 06, 2019

Detecting SYN Flood Attacks with Colasoft Capsa (by Jack Wei)

Detecting SYN Flood Attacks with Colasoft Capsa (by Jack Wei)

Detecting SYN Flood Attacks with Colasoft Capsa!
 Denial-of-service attack (DoS attack) is a malicious attack to make a machine or network resource unavailable to users, usually by temporarily or indefinitely disrupting services of a host connected to the Internet. (US-CERT 2013)
Today, DoS attack is a common cyber-attack on the network. According to the statistics, every three seconds, there is a DoS attack happening on the Internet. The low cost of launching a DoS attack is one of the major causes of frequent DoS attacks.
Some of the most commonly used DoS attack types include:
Ping of Death, Teardrop, WinNuk, UDP flood, TCP SYN flood, IP Spoofing, Land Attack, Smurf, ICMP flood, etc.
In this article, we will show you how to detect SYN flood attacks using a network analyzer named Colasoft Capsa.
You can download some awesome tools here - Including the Freeware Capsa - 
In order to analyze DoS attacks (and Others) , I suggest you follow the three steps below:
  1. Observation
Most hosts which are under DoS attack will show high CPU and memory usage or the network bandwidth is occupied by garbage traffic.
  1. Analysis
We can analyze and locate the attacks by decoding the raw packets. In this way, we will get protocols and behaviors of packets. Compare these information with attack signature, then we can locate the actual attack type.
  1. Locate issues
With TCP/UDP session and chart function, we can more accurately and quickly locate DOS attacks.
Now, I will give you an example to show you the detailed steps using the visual capabilities of Capsa!.


The Dashboard view dynamically displays statistics with various charts. In Dashboard view, the first graph definitely points out our network has the anomaly traffic. Because the utilization of our network almost reached to 100%. Then, go to Summary view to check summary data statistics.
Article 11Figure 1. Statistical charts
Under the Summary view, summary statistics of current capture are displayed. According to these statistics, we can find out there are too many small size packets in the network. In addition, the count of TCP conversations and TCP SYN sent packets are abnormal.
Article 12Figure 2. Summary data statistics
 Then, go to TCP Conversation view to check up abnormal TCP conversations. From this view, we can see this IP address “4.79.142.202” received a lot of packets from random Internet IP addresses. All these random Internet IP addresses sent the same 64 bytes packet to 80 port on the host “4.79.142.202”.
Article 13Figure 3. TCP conversations
 Besides, with Matrix view, it shows that almost 10,000 hosts have conversations with the host “4.79.142.202”.
Article 14Figure 4. Matrix graph
Last, by decoding TCP packets, we can see the Time Sequence diagram of TCP conversations. The host “4.79.142.202” received repeated SYN packets from different Internet IP addresses. But TCP three-way handshake didn’t establish normally in every TCP conversation.
Article 15Figure 5. Time Sequence diagram
Combine with the above information, we can identify that there are SYN Flood Attacks happened in our network. And IP address of the targeted server is “4.79.142.202”. Because of the attack, it caused the abnormal traffic and consumed our network resources.
JackAuthor Profile - Jack Wei is a technical engineer at Colasoft. Jack has more than three years’ working experience in IT and has concentrated in network administration, network security analysis based on packet sniffer software and network troubleshooting. He loves to study new computer technologies and enjoys different challenges.
Colasoft Technical Engineer -  jack.wei@colasoft.com 
Visit us for more information at www.colasoft.com