Menu

Poland

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

UK

Grandmetric LTD
Office 584b
182-184 High Street North
London
E6 2JA
+44 20 3321 5276
info@grandmetric.com

US Region

Grandmetric LLC
Lewes DE 19958
16192 Coastal Hwy USA
EIN: 98-1615498
+1 302 691 94 10
info@grandmetric.com

  • en
  • pl
  • se
  • Category: Explained

    ISO/OSI Layers Explained Simply and Technically

    If you work in IT or networks, you’ve probably heard of the ISO/OSI model. It may seem like theory for students, but in practice, it’s the foundation for understanding how network communications work. Even if we talk about TCP/IP every day, the ISO/OSI model is still your guide for designing and troubleshooting. In the 1980s, […]

    Date: 20.08.2025

    Author: Marcin Bialy

    IP addressing and subnetting – a guide for Network Engineers

    Understanding IP addressing, network masks, and subnetting is essential for anyone working with computer networks. In this guide, we’ll cover the fundamentals of IP addresses, subnet masks, address ranges, and how to design efficient IP addressing plans. What is an IP address and network mask? Every IP device with an IP address operates inside a […]

    Date: 05.08.2025

    Author: Marcin Bialy

    MFA vs. Phishing: Why YubiKey is Better than Classic MFA

    In an era of ever-increasing phishing attacks, increasingly sophisticated identity theft methods, and new regulations such as NIS2, the question is no longer whether MFA is worth investing in, but rather whether my organization can afford to continue to rely on outdated authentication methods? In this interview with Marcin Majchrzak, Sales Director for Yubico in […]

    Date: 02.06.2025

    Category:

    MFA and Passwordless. How to Login Safely?

    Have you ever forgotten your company email or VPN password? If so, you understand the frustration of trying to regain access. In a world where every system requires a different password – strong, long, and ideally unique – the average user becomes a credential juggler. The problem is that these juggles often end in… disaster. […]

    Date: 23.04.2025

    Category:

    Firewall Configuration: How to Do It Right? Avoid These Mistakes and Secure Your Network

    A firewall is a key component of an IT security infrastructure. But even the best hardware and most advanced features won’t protect your network if they’re misconfigured. In reality, most threats stem not from a lack of a firewall, but from its incorrect use. In this article, we examine the most common firewall configuration errors, […]

    Date: 25.03.2025

    Traffic generators

    Traffic generators Traffic generators can support the work of administrators in terms of testing and understanding their own network. Traffic generators allow you to find bottlenecks in the network, test new equipment for performance, and test monitoring systems. Traffic generators also allow you to check the behavior of network devices in terms of handling unusual […]

    Date: 19.12.2024

    How to increase network efficiency with Cisco Meraki?

    How can network security be ensured in the retail industry? What should be looked for to ensure even signal coverage? How can a properly designed network help achieve ESG goals? What about connection stability? Who is supposed to implement and operate all this? We will try to answer these questions in the following text on […]

    Date: 10.11.2024

    Author: Piotr Nejman

    Zabbix – Network Monitoring

    Network and server monitoring is the process of overseeing infrastructure and its parameters to gain a complete understanding of how to manage IT infrastructure. Monitoring network devices allows for early identification of issues, prevention of failures, and maintenance of high availability and performance of systems. This gives administrators better insight into the functioning of the […]

    Date: 01.10.2024

    SPOF – the Achilles heel of every IT system

    We all know the feeling when we lose all our unsaved work during a sudden power outage. Data recovery is possible, but businesses cannot afford downtime. Banks or hospitals cannot afford downtime either, where even major failures should not interrupt the continuity of work. It is best to find and strengthen the weakest links, which […]

    Date: 29.08.2024

    How to choose the right data storage?

    We keep photos, videos, and documents on disks, store company data or can run virtual machines. However, when the need for cooperation arises, such a distributed form will not be useful. To ensure 24/7 access to data, file exchange, an appropriate level of control and efficient communication, a centralized solution is necessary. Regardless of whether […]

    Date: 23.08.2024

    Category:
    Load more
    Show all
    Grandmetric