Network Equipment Performance Monitor 2.0

Network Equipment Performance Monitor 2.0
Publisher: James Eshelman Date added: 04 April, 2008
License: Shareware Size: 2.4 KB
Price: $348.00

NEPM goes beyond polling-based monitoring to true downtime and event detection, tracking, and correction. Unique links reveal downtime or intrusion causes, while performance graphs highlight networked element throughput and error rate.

Advertisements
   

Description:

NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface.

Tags: Network, Monitoring, Performance, Downtime, Events, Alerting, Uptime, Security, Intrusion
Platforms: Linux , Unix , 2000 , 2003 , Windows2000 , Windows2003 , XP , WinXP
Requirements: 6 MB disk, TCP/IP port
Network Equipment Performance Monitor 2.0 - Post Your Review
 * 
 * 
     
 * 
Related Downloads

It allows you to set limits on how much time your child spends on the computer or online. You can share the same computer among your children by setting an individual time table for each child. It allows you to set limits on how much time your child spends on the computer or online. You can share the same computer among your children by setting an individual time table for each child.

The Network Shared Recycle Bin allows you to backup and recover deleted files on the server side. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. The Network Shared Recycle Bin allows you to backup and recover deleted files on the server side. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them.

Secure Browser is a fast, secure and private web browser. With a built-in Security & Privacy Center, Secure Browser has the worlds first browser integrated security and privacy management console. Secure Browser is a fast, secure and private web browser. With a built-in Security & Privacy Center, Secure Browser has the worlds first browser integrated security and privacy management console.

Advanced Task Scheduler is a powerful task scheduler, which allows you to automate all your day-to-day tasks: start applications, batch files, shut down your system, establish network connections and much more. Advanced Task Scheduler is a powerful task scheduler, which allows you to automate all your day-to-day tasks: start applications, batch files, shut down your system, establish network connections and much more.

FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls. FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls.

A simple and powerful classroom monitoring and management application that allows you to monitor live screens of remote computers. You can take control of a remote computer or record student's screens and block internet access. A simple and powerful classroom monitoring and management application that allows you to monitor live screens of remote computers. You can take control of a remote computer or record student's screens and block internet access.

With the ever increasing requirement for stronger passwords, you can use this very simple utility to generate complex passwords with ease. You can select how many passwords you want to generate allowing up to 100 different passwords. With the ever increasing requirement for stronger passwords, you can use this very simple utility to generate complex passwords with ease. You can select how many passwords you want to generate allowing up to 100 different passwords.

Network switch ports identification tool. This tool works with managed network switches and reports what is connected to switch ports, and which ports are not connected. For every connected port, it lists the MAC address, IP address and host names of the computers associated with that port.

Audit and recovery of Oracle Database passwords. Account information import. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Audit and recovery of Oracle Database passwords. Account information import. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks.

Game Fire is a powerful PC games optimization solution that enables you to enjoy playing your favorite games by transforming your personal computer into a powerful gaming box with a mouse click. Game Fire is a powerful PC games optimization solution that enables you to enjoy playing your favorite games by transforming your personal computer into a powerful gaming box with a mouse click.

Put away and save different versions of files Archive&Restore enables you to put away and save different versions of files and folders, search and manage archives including disks and create links to archived objects. Files are stored separately - either compressed or in their original format.

Save web pages to Htmlhelp CHM quickly Offline CHM can download web pages and compile to CHM quickly.Then you can share the CHM files with friends. It can be integrated in IE as a plug-in. Offline CHM supports INDEX and KEYWORDS of CHM and supports URLs and files drag-and-drop.