Performance-Managers

The Ultimate Barrier!

  • Increase font size
  • Default font size
  • Decrease font size

The Barrier

E-mail Print PDF

The Barrier is our response to protect our customers from cyber attacks.

We have build a worldwide chain of high-end computers who detect malicious attacks towards our customers.

 

 

Our customers have place their websites behind us, so our Barrier receives their traffic, filters it, and delivers to our customers' server only filtered traffic, free of malicious attacks.

Read more...
 

Performance Monitoring

E-mail Print PDF

The follow-up of data-processing applications Quality of Service requires powerful tools and accurate competences. The produced and published data must make it possible to appreciate with accuracy the infrastructure Quality of Service total level and the real defects impact on users.

Performance Managers has developed a whole set of tools and competences to quickly implement an application monitoring platform, making it possible to measure data-processing applications Quality of Service, to validate measurements adequacy to the Contract of Service, to provide clear data for the defects resolution, and to even start preventive actions before real users do not feel the impacts of them.

Read more...
 

Monitoring or Monitoring?

E-mail Print PDF

When people come to talk about monitoring, each one has his own understanding of what is Monitoring.

Not so often people know that there are different kinds of monitoring. We will try to give some definitions.

First, you have 2 main kinds of IT systems monitoring: performance monitoring and availability monitoring.

Performance monitoring tries to give an image of the ongoing performances of the system, while availability monitoring only tests if the system is accessible, whatever the performances are.

But within these 2 large categories, there are many kinds of monitoring, each giving more or less information on the monitored system.

The answer to availability monitoring questions is always yes or not while the answer to performance monitoring questions is a time measure or a percentage. Obvious?

Read more...
 

Performance Booster

E-mail Print PDF

Within minutes, you can bring down your website load of up to 60% without losing any user hit.

More easy is difficult!

You just have to enroll in our Performance Booster Program, and we will serve for you all your static content to your visitors.

Images, javascript files, CSS files, HTML static pages will be stored on our servers and send to your visitors on request.

These files represent from 20 to 60% of visitors hits, and if we manage them for you, it will be up to 60% less hits to your servers, 60% less traffic on your connexion links, 60% less CPU, 60% less disk accesses.

Read more...
 

Interpol Calls For Global Effort To Battle Cybercrime

E-mail Print PDF

Original link :

Interpol's Secretary General says the private sector needs to become much more involved in law enforcement investigations to give police the edge they need.

Interpol Secretary General Ronald K. Noble this week called for the creation of an integrated cybercrime investigative to combat the growing threat.

Noble pushed the idea of setting up a network that would enable police anywhere in the world to immediately identify and obtain help from security researchers and investigators in other countries 24 hours a day. He also called for building up information shares called National Central Reference Points and connecting them using Interpol's secure global police communications system, known as I-24/7.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  Next 
  •  End 
  • »
Page 1 of 2
  • Old Android malware still infecting millions of users
    Remember HummingBad ? It’s an “old” malware from early-to-mid 2016, which was discovered and addressed at the time. However, it looks like it wasn’t killed, and a version of it called HummingWhale has been found in the Google Play store, inside over 20 apps that were downloaded several million times by unsuspecting users. HummingWhale comes with “cutting edge techniques” that let it perform fraud better than before, Check Point says . That’s the same group that identified the first strain of the malware, which affected more than 10 million users last year. Check Point also discovered its creators and concluded that the malware was able to generate some $300,000 per month from fraudulent advertising. That’s right, this malware doesn’t steal sensitive data from you. Instead, it hijacks ad views for profit. The new Google Play apps seem to be camera-related apps uploaded under names of fake Chinese developers. Each of these apps has an encrypted file that’s “suspiciously large.” The malware can be used to download and execute other apps. Moreover, the app can use an Android plugin to upload fraudulent apps on a virtual machine. “First, the Command and Control server (C&C) provides fake ads and apps to the installed malware, which presents them to the user,” Check Point writes. “Once the user tries to close the ad, the app, which was already downloaded by the malware, is uploaded to the virtual machine and run as if it is a real device. This action generates the fake referrer id, which the malware uses to generate revenues for the perpetrators.” The malware is more sophisticated than its predecessor in many ways. It can install apps without getting elevated permissions, and it can install an infinite number of fraudulent apps without actually overloading the device. That means the user would not even notice that something is wrong. Additionally. HumingWhale also tries to increase its Google Play reputation using fraudulent comments and ratings. Check Point told BGR that it informed Google About these new malware apps, which were removed from Google Play. This is how you check if your phone or tablet was infected with a HummingBad strain, although the tools might not necessarily detect HummingWhale as well.
  • Saudi Arabia warns on cyber defense as Shamoon resurfaces

    Illustration file picture shows a man typing on a computer keyboard in WarsawSaudi Arabia on Monday warned organizations in the kingdom to be on the alert for the Shamoon virus, which cripples computers by wiping their disks, as the labor ministry said it had been attacked and a chemicals firm reported a network disruption. An alert from the telecoms authority seen by Reuters advised all parties to be vigilant for attacks from the Shamoon 2 variant of the virus that in 2012 crippled tens thousands of computers at oil giant Saudi Aramco. Shamoon disrupts computers by overwriting the master book record, making it impossible for them to start up.


  • Lloyds a victim of cyber attack that hit banking services

    People walk past a branch of Lloyds Bank on Oxford Street in LondonLloyds Banking Group is working with law enforcement agencies to trace who may be behind a cyber attack that caused intermittent outages for customers of its personal banking websites almost two weeks ago, according to a source familiar with the incident. Britain's largest mortgage lender was hit by a distributed denial of service (DDoS) attack on Jan. 11, which carried on for two days, according to the source. DDoS attacks have become common tools for cyber criminals trying to cripple businesses and organizations with significant online activities.