Network Evaluation has the facilities and resources to monitor the state of your network from many different points of view, and to take action depending on the nature of the event, which might include fixing the problem directly, or advising you by email, telephone or pager depending on your wants and needs.

Types of Monitoring:

  • General Traffic Monitoring - Network Evaluation will attach a secured, dedicated system to your network, to troubleshoot problems on request.
  • Spyware Monitoring & Reporting - Automated email notification of spyware activity on your network
  • Network Management Monitoring - Get Real-Time performance and availability measurements for all your network equipment.
  • Network Intrusion Detection - Monitor your network for signs of inappropriate activity. This is customized to meet your needs.
  • Network Traffic Profiling - Find out what types of traffic are normal and abnormal on your network
  • Focused System Monitoring - Get automated email reports on particular aspects of your system
  • Total Monitoring Package - Get up/down status, errors, traffic throughput, etc. visually

For information about our monitoring services, please Contact Us

Network Management Monitoring - Network Evaluation will attach a secured, dedicated system to the inside of your network, which will monitor your key equipment for problems.

Case History: One customer had literally hundreds of printers nationwide, and problems in keeping track of the inventory, and maintenance contracts.
Solution: Each printer was set up to report all of its errors to a central system, and a weekly report of the systems experiencing above-normal paper jams (a known indicator of problems) was emailed to the help desk. This enabled a technician to be dispatched before the printer completely broke down, often reducing the severity of the problem, keeping the printer available for use, and allowing for scheduled appointments, as opposed to emergency calls, which lowered operating costs for the customer.

Network Intrusion Detection - Network Evaluation will attach a secured dedicated system to the inside of your network, which will specifically watch for known "signatures" or signs of intrusion, worms, attacks compromises, and other known nuisances that can be identified by the general pattern of traffic. Network Evaluation can set up and monitor these data, to help bring your business into compliance with relevant regulations. Additionally, Network Evaluation can also use the same installation(s) to detect "uncharacteristic" traffic. That is, traffic that fails to match the typical pattern that reflects "business as usual" on your network.

Background: With the existence of Federal regulations such as COPPA (Children's On-line Privacy Protection Act), HIPAA (Health Insurance Portability Accountability Act), FERPA (Federal Education Right to Privacy Act), GLBA (Gramm-Leach-Bliley Act), increasing use of the ANSI 33 standards for data security in general by governmental and private organizations, the Sarbanes-Oxley act (SOX), and the California State Data Privacy Law (SB 1386), Intrusion Detection has become major obstacle for small to medium businesses due to the expense and expertise required to set up, monitor and interpret the data gathered. Network Evaluation will set this up and provide automated reports.

Firewall Log Monitoring - Network Evaluation will either install a dedicated system, or reconfigure your Internet Firewall to report all log entries to a monitoring system for automated analysis and reporting.

Case History: One customer was experiencing an infection of the Blaster Virus/Worm.
Solution: Set up a special monitoring application (5 minutes work) to report on each instance of an attack, and summarize the results so that a technician could be dispatched to the right location to clean the affected system immediately.

Meeting Network Security & Control Requirements: (408) 395-3921