Owny IT Desktop Monitoring Featurelist

281 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
281
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Owny IT Desktop Monitoring Featurelist

  1. 1. Page 1 of 10 Feature List
  2. 2. Page 2 of 10 Can you maintain system security, compliance and configuration integrity from a single, integrated console? Enterprises are faced with a new kind of business pain: maintaining security and compliance while keeping up with the rapid pace of both regulatory and technological change. IT staff is constantly running to manage new security threats and patches, updates and innovations. Business success depends more and more on IT’s ability to establish and maintain control in the face of constant change. OwnYIT is our latest addition in enabling IT professionals to automate systems management tasks and proactively control, update and protect desktops, servers and mobile devices. No management solution is more complete, integrated and easy to use than this. OwnYIT increases enterprise efficiency, enabling IT staff to:  Maintain security and keep up with patches and updates  Efficiently install and maintain software on the desktop  Decrease software-licensing costs and respond to audits  Reduce the cost of helpdesk support  Manage physical, contractual and financial assets  New & enhanced features for better management.
  3. 3. Page 3 of 10 NODE MANAGEMENT FEATURE DESCRIPTION BENEFITS (A) Hardware level Information • Processor, RAM, Network Card details, Drives (Like Hard disk, CD- ROM, Floppy), Keyboard, Mouse, and other PCI cards, Monitor, Printers or any other hardware attached with the node. • Detection of any PNP devices such as USB Pen Drives, Zip drives, Mobile Phone Modems. • Hardware Configuration Change history i.e. each time hardware is attached/removed from the node it generates an alert and logs for the same. Useful for System inventory and Audit trailing; also helps prevent thefts. (B) Software level information • Installed Software/ Patches on node. • Software Configuration Change history i.e. each time software is attached/removed from the node it generates an alert and logs for the same. Useful for checking unauthorized installation/ uninstallation and Software Audits Configuration Change Management This feature includes tracking all the hardware and software changes that has occurred in the network. Logs and reports of all the changes with date and time stamp will be maintained. This feature helps in maintaining the inventory and Audit trails of the organization. Quick flow of information provides the provides helps in reducing events like thefts etc
  4. 4. Page 4 of 10 Inventory Management • Complete inventory management module • Integrated with hardware and software • All information that is brought automatically and added information about assets (with configuration change history) makes it a real-time inventory management module. Single Central database for all types of IT inventory. Useful in tracking the usage of inventory of operational as well as in-store IT related assets. Complete track of all types of IT assets is available. Node Level Monitoring • Operating System, Currently logged on User, Memory usage, Internet Connection availability, etc. • Disk usage • Services and Processes/Applications with statistics of individual process/application. • Shared Shared Folders, etc with details • Network Port information with individual connection details. Monitoring/controlling of Critical process/service (Firewall, Antivirus software, Critical applications, Internet Explorer, etc.). Application / Process Monitoring and Controlling To monitor every application/process on each node in network and display a list of applications used by user along with the duration, etc. Administrator has complete control of suspension and termination of applications/processes. Helps administrator to manage non- responding or resource consuming Processes. Help System Manager to improve the performance of nodes and decrease the cost of ownership of extra investment in the hardware Service Level Management System Manager can manage the services running on the nodes. Rules can be defined for critical services that continuously need to be up and running on the server as well as nodes. It will increase the performance of the server as well as nodes and will help to reduce the downtime server.
  5. 5. Page 5 of 10 Software/Patch Deployment Software deployment is becoming a very costly affair for huge networks since it costs huge time to deploy it. OwnyIT provide remote software deployment of software and patch in the network. Any software even having user interaction can be deployed in the network silently. System provides feature for script recording and execution at the client nodes. Thus it will help to save a lot of time of the system manager and thus help to reduce the total cost of ownership of the product. In Linux : This feature is not available Helps the System manger to save time and increase the efficiency of IT department by providing immediately the solution needed by the user. Rule based Monitoring/ Controlling • Process /Application: Monitoring/controlling of process/service (Firewall, Antivirus software, or any other critical applications, etc…) • CPU/ Memory Usage: Monitor the performance of the Nodes against user defined criteria. • Node Availability: Check the availability of the critical server/node • Disk Usage Monitoring: Monitor the disk usage against defined levels. Helps the System Manager to imply the organizational policies on the users and prevent users from using unauthorized process in the network. Also helps system manager to monitor the performance of critical server, nodes in the network. Shared Resource Monitoring To find out shared folders/resource with their specific details and an administrator can remove those shared folders/resource. It will help the system manager to stop spreading of the virus in the network. It will also help to control the critical information of the company, which is getting shared in the network.
  6. 6. Page 6 of 10 Policy for Shared Resources Configuring the shared folder which will be unshared after particular time like 24 or 48 hours. Folder will be unshared after particular time define by administrator so if user forget to remove share then it will be removed automatically. Ressource Usage Identification • Identify PCs that are idle. • PCs that are not turned off at the end1 of the day. • PCs that are not turned on during the day. • Electricity savings at the end of the day Savings on hardware components, due to component failures due to forced shutdowns. Savings on support infrastructure like UPS and fail-safe static switches used to support these PCs. Application Blocking Allows administrator to block the specific application running by the user. This can be useful in preventing users from using games, messaging programs, P2P applications or any unauthorized software. Software License Monitoring Verify the actual number of license used in the network with the license purchased from the software vendor. Software licenses will be gathered from all the PCs by software. Admin also get intimated of license renewal on 7 days before expiry. License key is available in Linux workstations. Reduce cost through efficient software license usage and monitoring. Leverage consolidated information through enterprise reports.
  7. 7. Page 7 of 10 Remote Desktop The administrator can take the remote of any system. The remote can be taken into three ways 1) Read mode 2) Full mode. 3) Two way communication. 4) RDV with permission from user 5) Blocking RDV of Particular PC This feature is not working in following Linux flavor : 1. Fedora Core 6 above 2. Red Hat Enterprise License 5 and above The problem of remote location can be solved by just sitting at a single place. Managing Removable devices (CD, USB, Sound cards, Floppy drive and Modem) Controlling the usage of these devices according the IT policies of the organization. Note : if admin has blocked Pen drive then other devices like USB mouse can be use in any port but Pen drive will not be used in any port Enhancing the security of network and document. Protection from issues like viruses, unauthorized applications, Trojan Horses etc. USB Port Blocking All the USB port of PC will be disabled so user will not be able to use any USB device. This feature is not available in Linux Desktops Enables administrator to block all the USB port thus possibility of data theft is minimized up to larger extent.
  8. 8. Page 8 of 10 Power Management The major challenge organization is facing is wastage of energy when workstations left running after working hours whereas electricity cost is increasing. With a single click workstation can be Shutdown/Restart/Log off. Admin can set schedule for shutting down workstation. This will save the electricity Expense of the organization. Vendor Management Sys. Admin can manage vendor information, purchase order, invoice, warranty and insurance details for hardware and software license. Enables administrator to simplify the process and activity with vendors Link Assets to Users And Locations Assets can be linked to Users or the Locations/Departments Assets can be linked to Users or the Locations/Departments Database Backup Backup of database can be taken on demand basis or administrator can set scheduler for day, week and month. Protecting data by any man made disaster or natural disaster. Reports OwnyIT has a full fledge reports segment (crystal reports) giving you reports in different ways to meet the requirements of your organizations directly. We will provide 10 reports customizable according to the needs of the organization at the time of installation at no additional cost. The user can directly take the reports for its work and hence, the issue of manually generating reports for every event can be re resolved.
  9. 9. Page 9 of 10 Deployment Architecture
  10. 10. Page 10 of 10 CONTACT US Tectona SoftSolutions (P) Ltd. RAJSI-101, Rajvansh Complex, Opp. Judges Bunglows, Bodakdev, Ahmedabad, INDIA- 380054 Telefax:+91 79 2685 9493

×