Web console to control the IT infrastructureThe monitoring service gives you control over your IT infrastructure by monitoring servers, virtual machines and network devices. Using the web console, monitor the appearance of your systems such as performance, system variables and much more. Get a quotation
Keep an eye on every aspect of your IT infrastracture
You can monitor any aspect of your network: server performance and availability, web applications, databases, network devices and much more. You can control your IT infrastructure using performance indicators like CPU, memory, network, disk space and processes.
With or without agents
Measurement of monitored system metrics is extremely simple thanks to the software agents available for Linux, Unix and Windows. Agents use native processes so you will not need to have special environments like Java or .Net. All components of the monitoring architecture can be performed by non-privileged users, which is particularly important for native agents. Also, running monitoring demons on a privileged account requires additional steps. The components communicate with each other and only accept connections from authorized IP addresses, other connections are automatically rejected. Where it is not possible to install the software agents, the service provides agent-less monitoring to check the availability and reactivity of standard services like a mail or web server without installing any software on the monitored devices .
IT Monitoring supports SNMP agents, present on all network devices such as routers and switches. The service is a valid aid for monitoring and capacity planning of your network by providing measurements such as network usage, CPU, memory and status of the logic gates. In addition you can monitor any other device with SNMP agents such as network appliance, storage, cooling and power system.
The VMware virtual machine module allows monitoring of VMware vCenter and vSphere for different types of VMware hypervisors and different virtual machine metrics. Low-level scanning rules can be used to automatically detect VMware hypervisors and virtual machines and monitor them. Pre-configured templates are available to monitor virtual components quickly.
The extreme ability to carry out complex customizations allows you to integrate the solution in any environment and collect data from financial systems, control systems and even sophisticated search devices. There are no limits in the scripting language or programming to be used, it is possible to write the controls in shell, Perl, Python or any other language.
With the IT Monitoring service it is possible to monitor in extreme detail any database including MySQL, PostgreSQL, Oracle and Microsoft SQL Server.
Monitoring of Java applications
It is possible to monitor Java applications using JMX, it is not necessary to use third-party modules or integrations. In fact, it will be possible to monitor JBoss, Tomcat, Oracle Application Server and others through the Java gateway.
Today, more and more information is being distributed through websites or IT web-based systems. To enable continuous monitoring of these systems, the service provides built-in support for web monitoring. With this functionality it will be possible to define sequential steps to be taken to analyze the website. This functionality allows the monitoring of availability, response times and download speed of external sites, e-commerce portals, internal wikis, Service Desk systems and much more.
If the hardware you want to control provides access to IPMI, then it will be possible to collect information such as temperature, fan voltage and disk status by avoiding downtime and 'interruption of the service provided. In addition, with the IT Monitoring service it is possible to execute IPMI commands to switch devices on the network on or off in case of faults.
How it works
After an initial assessment with our network architect, the computer perimeter to be monitored, the level of control and the alert mode will be agreed with the customer. Then our delivery team will take care of installing and configuring agents on systems to be monitored. At the end of the configuration operations the customer will receive a secure access to his Cloud console from which he will be able to check all the monitored metrics, view the system performances and manage corrective actions.Download brochure
Try our demo:
- Red Hat Enterprise Linux
- Oracle Linux
Alerts and notifications:
It manages any type of ICT infrastructure from small to large
Scaling to Large Environments: The monitoring system was designed for both small and large businesses with thousands of monitored devices. To date, there are installations with over 100,000 monitoring devices, proving the fact that each installation can process more than 3,000,000 checks per minute and collect gigabytes of data a day.
Distributed Monitoring: Do you have local offices, data centers or customer sites that you want to monitor but do you want to keep the number of open connections and ports as low as possible? No problem, distributed monitoring is right for you. Thanks to our proxy component it is possible to monitor a large number of devices by decentralizing the calculation and sending data operations.
Optimized for high performance: In addition to powerful agentless monitoring, the ICT monitoring system offers high performance monitoring of the operating system and application metrics. Software agents use minimal CPU resources and memory and are compatible with various platforms including Linux, UNIX and Windows. In addition, the central cloud collector and proxies use different types of data caching solutions, guaranteeing better performance and reducing the load on the network and databases.
High Availability: All components of the Monitoring solution are highly reliable, efficiently managing data buffer control.
Zero-Maintenance: In Enterprise environments, there are many dated agents whose replacement or update is not easy to manage. Forcing agents to update only because the central system is updated is not always acceptable. Our monitoring system supports all previous agent versions since the first release, guaranteeing back-compatibility up to over 10 years before.
IPv6 ready: All components of the monitoring infrastructure supporting both IPv4 and IPv6 addresses, making it possible to monitor mixed or fully IPv6 environments.
What is Disaster Recovery as a Service (#DRaaS)? Disaster Recovery as a Service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide fail over in the event of a man-made or natural catastrophe. https://www.secure-od.com/cloud-products-and-services/baas/acronis-cloud-backup/disaster-recovery-cloud/ #backup #recovery
Acronis Disaster Recovery Cloud protects your customers’ systems in any location and in any environment — on your clients’ premises, in remote systems, and in private and public clouds. https://www.secure-od.com/disaster-recovery-cloud/ #disasterrecovery #backup #DR
Disaster Recovery for Any Workload. Windows and Linux, major hypervisors, applications, virtual appliances. All-in-one backup, disaster recovery, and advanced ransomware protection https://www.secure-od.com/disaster-recovery-cloud/ #DR #ransomwareprotection #backup
DRaaS, we are proud to present you a new service, find out our Cloud Disaster Recovery service https://www.secure-od.com/disaster-recovery-cloud/ #DRaaS #DisasterRecovery #DisasterRecoveryasaService
Cybersecurity: 5 errori ricorrenti fatti dai dipendenti (e come evitarli) - http://cybersecurity.startupitalia.eu/61324-20180621-cybersecurity-5-errori-ricorrenti-fatti-dai-dipendenti-evitarli #CyberSecurity #business #ITSecurity #ActiveProtection https://www.secure-od.com/it/acronis-data-cloud-7-7-tutte-le-novita-della-versione-7-7/
RT @outpost24: The return of Spectre > https://t.co/ZCjs2X3jLr via @ZDNet #Spectre #cyberattacks #threats #vulnerability #cybersecurity
RT @m4r4d4g: Does the Rise of Crypto-Mining #Malware Mean the End of Ransomware?: Crypto-mining #malware activity grew significantly in the…
RT @Acronis: #AcronisSurvey regarding public perceptions of data threats revealed that: 46.4% do not know what #ransomware is 48.1% did no…
Acronis Disaster Recovery Cloud protects your customers’ systems in any location and in any environment — on your c… https://t.co/7uXUn4zqt1