Network infrastructure requires permanent monitoring and maintenance to function appropriately. Tracking different management solutions for different IT assets is not only costly, but it takes up valuable time and resources for IT departments. GFI Software, a provider of IT software and hosted services, has a solution named GFI EventsManager which equips IT managers with additional tools to manage and monitor the network infrastructure's performance.
In a recent announcement, John Spoor, regional director-MEA at GFI Software, confirmed that a new version of this log management software now includes the established active network and server monitoring capabilities found in the company's popular NetworkServerMonitor solution.
This new functionality, combined with GFI EventsManager's existing log management capabilities, gives IT administrators a holistic view of their infrastructure's performance.
Active network and server monitoring provide real-time, active monitoring of assets, network infrastructure, applications and services. These advanced monitoring checks work in conjunction with GFI EventsManager's log-based monitoring system to track different operational aspects of the IT environment, including the functionality and availability of network protocols, performance of network devices, and usage and performance of server and infrastructure services.
Moreover, this unique combination of features also equips admin group with the information required to quickly and easily troubleshoot incidents reported by the active monitoring system.
Company officials emphasized that with the latest version, IT admin groups can now enforce discretionary data access by assigning specific computers to each EventsManager user. By doing so, IT can grant users admission into the GFI EventsManager console while limiting their access to only the configuration, reporting and log browsing data coming from the computers they manage.
Also, the latest version of GFI EventsManager comes with additional features that include; Flexible storage options, anti-tampering protection, log support by default and import/export functionality.
Small to mid-sized businesses are under attack
Until small to mid-sized businesses (SMBs) take proactive, measurable improvements to IT security, many will succumb to cyber criminals...
The Technology Trap: How your business can break out and step up
Technology management itself can be a time-consuming exercise and requiring a lot of administrative time...
Unlocking the benefits of managing IT services in the cloud
Managing IT can quickly become a logistical and cost headache for organizations of all sizes...
A business case for cloud-based IT management
Cloud computing services have seen rapid adoption among organizations of all sizes...