Intelligent Inspection Solution: timely inspection and system optimization to ensure security and stability of operation.
Higher risks are associated with application components as information systems become an indispensable part of all levels of production and daily life, which comes with more IT equipment and software systems in use and more system interactions. Information system inspection work has become the focus of daily operations. When in charge of thousands of devices and applications, how to obtain relevant data quickly, accurately and regularly according to inspection requirements has becomes an urgent problem to be solved.
The intelligent inspection system provides a complete, convenient, fast, and accurate inspection solution for business applications and their components. It is based on the idea of modularity of inspection tasks, combined with automated inspection and manual inspection, which can effectively improve the accuracy and reliability of inspection.
Supported Application Components
Network border devices, network switching devices, routing devices, servers, databases, middleware, virtualization, storage replication, etc.
FORTINET, CISCO, JUNIPER, RADWARE, TIPPINGPOINT, F5, Tianrongxin, HP-UNIX, LINUX, WINDOWS, AIX, SOLARIS, VMWARE, XENSERVER, DB2, SQL SERVER, ORACLE, IIS, WEBSPHERE, APACHE, WEBLOGIC, TOMCAT, H3C, 3COM
Customized inspection tasks, fast implementation
Supporting multiple detection methods and a variety of devices
Multiple alarms. Abnormal alarms are detected in time
Multiple display effects, supporting topology, SLA view, machine room, and application.
Different types of customizable reports available
Customization of inspection tasks: Enable the creation, editing, and execution of automated inspection tasks for global assets (network devices, security devices, servers, databases, middleware, and physical links).
Inspection Compliance Report: Provide inspection records and inspection statistics reports that meet user requirements.
Monitoring Views and Displays: Provide VISIO-like topology display and editing views, applied SLA views, monitoring views of the equipment room, and applied hierarchical topology monitoring view.
Server Management: Enable automatic monitoring key resources such as Windows, Linux, UNIX, ESXI, and XenServer of the operation system.
Database Management: Directly display changes and trends of key indicators of the database in a graphical manner.
Middleware Management: Monitor key indicators of IIS, WebSphere, Tomcat, WebLogic, and Apache middleware in a graphical presentation.
Applied Service Management: Use various monitoring methods to manage different applications.
Alarm Management: Promptly report all kinds of abnormal events by establishing alarm settings and modes.
Statistical Management: Combining years of operation and maintenance experience and user habits, provide rich lists, icons, charts, graphs, pie charts, histograms, and reporting systems.
Log Audit: Collect SYSLOG information of various types of equipment to analyze the classifications and development trends of events.
Value of the Product.
Ease of use: One-time development of inspection templates and one-click execution of inspection tasks makes the inspection work controllable, usable, and easy to use.
Globalization: Through the global analysis of network management parameters, the bottleneck of the network is located. The network is scientific and systematically managed as an organic entity.
Visualization: The product presents a complex network with an intuitive topology, tracks network changes in real time, and manages the network with the network topology as the center.
Intelligence: The product provides intelligent network management capabilities, dynamic network monitoring, alarm notification, configuration maintenance, and automatic processing to achieve precaution, incident alarm, and post-analysis, greatly reducing the burden on O&M personnel.
Quantifiability: At the same time of network monitoring, the system can automatically conduct multi-dimensional statistical analysis of monitoring data and quantify the quality of network links and equipment operation to provide a basis for network managers' planning decisions.
Bypass access, remote data acquisition.