How It Works
You have a lot of IT monitoring tools that give you a snapshot of specific issues within your network environment. Our analysis goes beyond what you are getting to give you the full picture of your IT estate and provides the actionable intelligence you need to transform it. Learn how below.
What You Get
Holistic, vendor-neutral analysis of your core network infrastructure, server, virtualization, unified communication, data center and cloud environments.
Unlike IT monitoring tools or traditional network assessments, our analytics tools are simple to deploy (as little as 15 minutes) and take 7 days on average to analyze your network to get useful results.
Unparalleled documentation across your environment that helps IT leaders operationalize your IT environment, take action and plan for change.
Most network monitoring tools and assessment engagements require considerable involvement of IT resources, consultants and partner resources.
How Our SaaS Architecture Works
In our traditional SaaS model, the virtual appliance runs on site and collects data via various collection methods. The data is communicated to all three layers: Orchestration, Analysis and Presentation. All of this runs in the cloud and is protected by our encryption methods.
How Our On-Premises Architecture Works
The on-premise Collection Layer, gathering data from the various collection methods below (SNMP, WMI, etc.), communicates outbound two ways: to the Orchestration Layer (control plane), and the Analysis and Presentation Layers (data plane). The orange arrows are API calls. No customer data comes through the Orchestration Layer/control plane. Proxy servers are supported at this level.
On-Premises Deployment Options
For organizations who have security concerns prohibiting their data from leaving their respective locations, FLEX Deployment is available. FLEX Deploy differs from our standard deployment method in that the analysis takes place entirely within the customer's environment.
SaaS Deployment (Analysis in the Cloud)
On-Premises Deployment (FlexDeploy)
FLEX Deployment allows the data plane to be run at the customer's site. This way, no data leaves the premises. This ensures extra security for businesses like banks or government agencies who may have data security concerns. There is still some API communication as far as orchestration, but no customer data passes through the Orchestration Layer itself.
Keeping Your Data Secure
We have worked with over 11,000 organizations worldwide including government agencies, hospitals, banks and universities – and their data security has always been a top priority of ours. Working with you will be no different. We focus on keeping our customer's data safe, their interactions with our applications secure and their business protected.
- We work proactively to ensure the highest level of security by using data encryption.
- We also help you find your security vulnerabilities so you can patch them; your security is important to us.
- We do not obtain personal information such as credit cards, health records or financial information. We collect and aggregate component-level data to provide you with an accurate assessment of your infrastructure as well as your IT Score.