Bandwidth Traffic Monitoring and AnalysisBuy Now Download
Analyze, diagnose, monitor, and manage the bandwidth from your computers, servers, printers and other devices, local and remote. Learn where bottlenecks occur. Monitor bandwidth thru SNMP protocol, WMI and remote agents. Collects information about inbound and outbound traffic and displays the dynamic of the changing transferring speed in a map.
DBM can perform specific actions from sending the SMS and email to rebooting the computer and service if critical values of volume were reached.
Monitor and respond when critical values of speed and traffic volume are exceeded. Variety of diagrams, reports and statistics local and remote. Discover who is causing bandwidth problems. Learn more...
Network Mapping, Monitoring, DiagrammingBuy Now Download
Map, Monitor, Scan your entire network, find hosts, place them on a diagram, and monitor their state. Built-in web server for remote access to monitoring stats. Quickly build network diagrams and maps, save or print them and manage all your remote devices quickly and easily, with DNA's visual network map. Monitor and diagram your operations 24/7.
You can shut down, restart, and turn on servers and workstations, access remote services, view remote event logs, access the registry, both local and remote. Export data to a graphic image, Microsoft Visio, or XML scheme. Monitor ICMP, TCP port, monitor ARP and MAC address, SNMP, FTP, HTTP, NetBios, file size and disk space monitoring. Learn more...
Software and Hardware Asset ManagementBuy Now Download
Software and hardware inventory with detailed reports of the software and hardware installed on your computer network. Export your valuable data to a variety of different databases such as MS SQL, MS Access, Postgre, and Linter. View remote computers' hardware and software. Be notified about hardware and software changes via a screen message, sound, or e-mail.
Learn which computers, local and remote, need more RAM, an upgrade to the operating system, a larger disk drive, or a software update. Audit your License Keys and Serial Numbers. Track changes on all your computers. Comes with more than 50 different reports and the ability to customize your own reports. Now with Linux support. Learn more...
Network Device Monitoring and AlertingBuy Now Download
Network monitor that alerts you to all problems that occur via an email message, sound file, SMS message to your cellphone, or event log file. Be notified when a device is available and when it becomes unavailable or out of service, local and remote. Avoid costly downtime. Periodically polls devices and sends them an ICMP packet and tries to connect to the requested TCP Port.
If the check is successful the color green will be displayed and if the check you ran failed the color red will be displayed. DNM stores the results of all the monitoring checks that you run and it monitors computers, servers, switches and several other devices. It monitors databases, services, files, folders, processes, free space on disks, and much more! Learn more...
Network Administration softwareBuy Now Download
DEKSI Network Suite is a set of award winning software tools that allow you to monitor devices and servers on your network, obtain online data when the time a device becomes available and when it times out or goes out of service, ensuring a proactive response to any problems your organization might encounter. The DEKSI Suite consists of four different software programs.
It also allows you to monitor the Internet and local traffic usage on your LAN, to manage devices (switches, workstations, and servers), and to create a database for the inventory of all the software and hardware that is installed on all your companies computers and help you monitor any changes that have occurred on your network and remote computers. Learn more...
USB Security, Port Locking, and Access ControlBuy Now Download
Prevent unauthorized USB devices from being connected to your computers. Disable and lock your USB ports and secure your data. DEKSI USB Security offers password protection and encryption. Protects against lost or stolen data, as well as viruses and malware infections. Operates completely in the background, and is undetectable to computer users.
There are no pop-up windows and warning messages unless you require them. Running without being visible, DEKSI USB Security logs all attempts to connect authorized and disallowed USB devices, allowing administrators to perform comprehensive audits of DEKSI USB Security whenever they want to check to make sure their computer operations are secure. Learn more...