Identification and discovery of new devices on the network. Monitoring service through graphs and control panels, as well as the sending of alarms for the analysis of the performance of the network in real time.
Creation of Network Topologies
Creation of network topologies, which are integrated with alarm information for a managerial visualization of the operational status.
Bandwidth monitoring and detailed analysis of network traffic at the interface level, identifying bottlenecks and issuing automated alerts.
Monitoring of the Operational Status
Designated monitoring of the operational status of the resources of each device in the network in order to prevent failures.
Use of the Bandwidth
Detection of the use of the bandwidth that is being consumed either by user, by applications operating on the network, by the protocols used or by network segments.
It has the ability to receive information on traffic flows through different standards (NetFlow, J-Flow, sFlow, IPFIX.) to ensure compatibility with most networks.
Measurement of the quality of experience (QoE) of users, determining if communication problems are caused by network response times or by the application used.
Creating backup copies of the configurations and generation of inventories of network devices.
Network Device Configuration
Verification that the network device configuration complies with internal best practice policies and international regulations (SOX, HIPAA, CISP).
Fault Diagnosis and Audits
Ability to make comparisons between two configurations of the same device, captured at different points in time, either for troubleshooting purposes or for auditing purposes.
Identification of Access Paths
Identification of access paths for troubleshooting questions. This allows the user to visualize the path (origin / destination) of an application to identify where problems are experienced in the network, such as loss of connection or slowness.
Collection and Analysis of Events
Collection and analysis of the events and logs of the equipment in the network, such as: firewalls, switches, routers, servers, IDS / IPS, and applications. With the ability to correlate these logs and events in real time to detect incidents and be able to solve problems providing security to the network. - Generation of reports with information, parameters and statistics that help analyze network traffic and contribute to the diagnosis of problems.