Network

Monitoring
of network devices
Free Version and updates up to 10 seats/month
DOWNLOAD

Team

Basic features for smaller teams up to 20 persons
5$ net
per seat/month
START FREE TRIAL

Team Pro

Advanced features for medium sized teams up to 50 persons
19$ net
per seat/month
START FREE TRIAL

Enterprise

Custom integrations
for enterprise
Contact us for custom pricing and configuration
CONTACT US

Network

FULL IT INSFRASTRUCTURE MONITORING

  • prevention of costly downtimes by detecting the potential failure reasons
  • humidity and temperature monitoring in server room
  • time saving – transparent reports available immediately
  • more control over system processes
  • better performance of business processes due to comprehensive insight into the operation of crucial services
  • Network scanning, discovery of devices and TCP/IP services.
  • Interactive network maps, user/branch maps, intelligent maps.
  • Simultaneous work of numerous administrators, management of authorizations, access rights.
  • TCP/IP services: response time and correctness, statistics of packets received/lost (PING, SMB, HTTP, POP3, SNMP, IMAP, SQL, etc.)
  • WMI counters: CPU load, memory usage, disk usage, network transfer, etc.
  • Windows performance: service status change (start, stop, restart), event log entries
  • File distribution with use of WMI.
  • SNMP v1/2/3 counters (e.g. network transfer, temperature, humidity, power voltage, toner level and others)
  • MIB file compiler.
  • Support for SNMP traps.
  • Routers and switches: port mapping.
  • Support for syslog messages.
  • Event-actions alarms..
  • Alerts (desktop, by email, by SMS) and corrective actions (program launch, machine restart, etc.)
    Reports (for a device, branch, selected map or entire network)

Inventory

FAST HARDWARE AND SOFTWARE AUDIT

  • improvement in the management of workstations and the easier planning of new resources
  • comprehensive control over even the most extensive IT infrastructure
  • full list of installed/used software, which means fines are avoided
  • reduction in the costs of IT department by detection of redundant licenses (for unused software)
  • quick audits from the level of mobile application assistance for the accounting department – register of fixed IT assets
  • List of applications and Windows updates on individual workstations (register and disk scan)
  • List of Microsoft software keys.
  • Information on register entries, executable files, multimedia files, .zip archives and file metadata on workstations.
  • Pricise hardware configuration of a specific workstation.
  • System information (startup commands, user accounts, shared folders, SMART information etc.)
  • Hardware and software inventory audit.
  • Full history of hardware and software changes.
  • IT asset register database (defining own asset types, their attributes and values, attachments and importing data from CSV files)
  • Alarms: software installation and change of hardware resources.
  • Offline inventory scanner.
  • Android application which enables a physical inventory to be carried out using QR barcodes.
  • Agent for Android, which keeps the inventory of mobile devices (including outside of the corporate network)
  • Audit archiving and comparison

USERS

USERS ACTIVITY MONITORING

  • full user management based on security groups and policies
  • data are gathered and assigned to a specific user, so all access rights, authorizations,
  • application and website policy, and monitoring policy follow them automatically, regardless of the computer on which they are working
  • optimizing the work organization – knowledge of the time spent on specific activities enables the improvement of the business processes
  • minimizing the cyberslacking and improving the employees’ performance
  • Reduced printing costs.
  • Improving corporate security level: blocking of dangerous Web domains
  • Blocking websites.
  • Blocking of launched applications.
  • Monitoring of email messages (headers) – anti-phishing.
  • Detailed working time (start and finish times for activities and breaks)
  • Applications used (in an active and inactive manner)
  • Visited websites (website titles and addresses, number and duration of visits)
  • Print audits (per printer, user and computer),total cost of printing.
  • Link usage: network traffic generated by users.
  • Static remote view of user desktop (without access)
  • Screenshots (user work history, screen by screen)

HELPDESK

INTERACTIVE IT TECHNICAL SUPPORT

  • automation of multiple processes in the technical support department
  • reducing the costs of technical support and saving the time of IT Staff
  • reducing the amount of costly downtime and increasing the employees’ performance
  • personnel education – guides how to handle the most common problems
  • minimizing the risk of cyber-attack through software gaps – remote distribution of software, including updates, to multiple workstations at one time
  • efficient distribution of important information – messages sent to users with option of obligatory confirmation that the message has been read
  • New transparent and intuitive web interface.
  • Automation based on the premise of Condition »Action.
  • Real-time notifications.
  • Event log.
  • Creation and management of service tickets (assignment to administrators)
  • Tickets base.
  • Ticket view updated in real time.
  • Comments, screenshots and attachments to the tickets.
  • Internal messenger (chat)
  • Messages sent to users/machines with the option of obligatory confirmation that the message has been received and read.
  • Remote access to computers with the possibility to request user consent and the blocking of peripheral devices.
  • Distribution of tasks and file executions.
  • Integration of user database with Active Directory.
  • Processing trouble tickets from e-mail messages.
  • Knowledge Base with article categorization and ability to add multimedia (image files or YouTube videos)
  • Expanded search engine for tickets and articles in the Knowledge Base.

DATAGUARD

DATA LEAK PROTECTION

  • automatic assignation of default monitoring and security policy to the user
  • reducing the risk of strategic data leak through the use of portable storage and mobile devices
  • saving money and time required to restore lost data
  • defining the policy of corporate data transfer by employees together with appropriate Authorizations
  • Protecting the company network against viruses automatically installed from flash drives or external storage disks.
  • Information about devices connected to a specific computer.
  • List of all devices connected to networked computers.
  • Audit (history) of connections and operations on mobile devices and network shares.
  • Management of access rights (writing, executing and reading) for devices, computers and users.
  • Central configuration: setting the rules for the entire network and selected network maps and Active Directory groups and users.
  • Integration of user/group database with Active Directory.
  • Alerts: mobile device connected/disconnected, file operation on a mobile device