NEPM goes beyond polling-based monitoring to true downtime and event detection, tracking, and correction. Unique links reveal downtime or intrusion causes, while performance graphs highlight networked element throughput and error rate.
NEPM is a very general, highly configurable, two part software system that monitors any type of logged data from IP networked equipment and reports it via E-mail and web pages. Current conditions and history from systems based on Windows NT/2000 and UNIX can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. Many networks behind separate firewalls can be reported on at one central site, and hard-to-reach isolated nets can be accessed. NEPM itself is system independent and can be hosted on either a UNIX or WinNT system or a combination of these with equal ease. NEPM monitors and reports uptime, critical events such as intrusion attempts, access rates, bytes-transferred rates, and error rates of network nodes. Unique precursor event links drill down instantly to the causes of downtime, intrusion events, etc. Performance graphs highlight element throughput and error rate. Hardware and software sub-systems within nodes are tracked and reported separately but in a common format that makes possible direct comparison. True hardware uptime is reported so that hardware and software performance can be separated from that of the communications links and from each other. Summary reports and alerts aggregate a view of an entire network's status onto a single page. Reports are provided via web pages posted to a web server for instant access to results. E-mailed text alerts provide prompt notification of dangerous conditions. NEPM is managed via a browser interface, providing full local or remote control from anywhere on the network. Use NEPM to increase your network uptime, increase network security, monitor QOS and SLA's, and evaluate new equipment. Equipment monitored can be Windows or Linux/UNIX/FreeBSD servers, or any processor-based system that logs events to non-volatile storage and has a telnet/rlogin/ssh/IP stream-mode interface.
Free Edition is the ideal choice for small to medium sized organizations and individuals looking for an affordable time and attendance solution. Our Free Edition offers an ideal time management solution that is both powerful and easy-to-use.
System Mechanic Pro keeps your PC fast, stable, and secure. It fixes errors and boosts performance, provides online backup, recovers deleted files, securely wipes data, and includes high-performance triple-certified antivirus protection.
Passwords Base will keep all your passwords in a secure database, so you only have to remember one single master password. A user-friendly and intuitive interface makes it easy to manage your passwords.
The Net Monitor for Employees is employee monitoring software that allows you to see screens of remote computers or show your screen to students. This spy software allows you to take control of a remote computer by controlling the mouse and keyboard.
Easy Trinity offers affordable workforce management solution for small to medium sized organizations and individuals. Easy Time Control Workstation Edition Software allows employees to clock in and out using their application from a desktop.
QuickBooks Forensics by Thegrideon Software is a unique data access, analysis, review, export and recovery as well as password recovery and replacement tool for QuickBooks company files (.qbw, .qba, .qbb). It works with most versions and editions.
Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.
The ideal choice for small to medium sized organizations and individuals looking for an affordable photo ID card solution. Express Edition offers an ideal photo ID management solution that is both powerful and easy-to-use.
BestCrypt Volume for Disk Encryption protects all data on fixed and removable disks, plus encrypts RAID, UEFI and Windows 8. Jetico encryption software provides protection from physical threats, such as lost or stolen computers and USB drives.
Watch live screen of all your computers at once by using your PC, Mac, IPhone, IPad, Windows Phone or Android based phone or tablet. Fully control your remote computer's mouse and keyboard, watch processes, stop applications, and much more...
Archive&Restore enables you to put away and save different versions of files and folders, search and manage archives including disks and create links to archived objects. Files are stored separately - either compressed or in their original format.
Offline CHM can download web pages and compile to CHM quickly.Then you can share the CHM files with friends. It can be integrated in IE as a plug-in. Offline CHM supports INDEX and KEYWORDS of CHM and supports URLs and files drag-and-drop.