MONITORING
Network
Evaluation has the facilities and resources to monitor the state
of your network from many different points of view, and to take
action depending on the nature of the event, which might include
fixing the problem directly, or advising you by email, telephone
or pager depending on your wants and needs.
Types
of Monitoring:
- General
Traffic Monitoring
- Network Evaluation will attach a secured, dedicated system
to your network, to troubleshoot problems on request.
- Spyware
Monitoring & Reporting - Automated
email notification of spyware activity on your network
- Network
Management Monitoring -
Get Real-Time performance and availability measurements for all
your network equipment.
- Network
Intrusion Detection
- Monitor your network for signs of inappropriate activity. This
is customized to meet your needs.
- Network
Traffic Profiling - Find
out what types of traffic are normal and abnormal on your
network
- Focused
System Monitoring - Get
automated email reports on particular aspects of your system
- Total
Monitoring Package
- Get up/down status, errors, traffic throughput, etc. visually
For
information about our monitoring services, please Contact
Us
Network
Management Monitoring - Network
Evaluation will attach a secured, dedicated system to the inside
of your network, which will monitor your key equipment for problems.
Case
History: One
customer had literally hundreds of printers nationwide, and problems
in keeping track of the inventory, and maintenance contracts.
Solution: Each printer was set up to report all of its
errors to a central system, and a weekly report of the systems
experiencing above-normal paper jams (a known indicator of problems)
was emailed to the help desk. This enabled a technician to be
dispatched before the printer completely broke down, often reducing
the severity of the problem, keeping the printer available for
use, and allowing for scheduled appointments, as opposed to emergency
calls, which lowered operating costs for the customer.
Network
Intrusion Detection - Network
Evaluation will attach a secured dedicated system to the inside
of your network, which will specifically watch for known "signatures"
or signs of intrusion, worms, attacks compromises, and other
known nuisances that can be identified by the general pattern
of traffic. Network Evaluation can set up and monitor these data,
to help bring your business into compliance with relevant regulations.
Additionally, Network Evaluation can also use the same installation(s)
to detect "uncharacteristic" traffic. That is, traffic
that fails to match the typical pattern that reflects "business
as usual" on your network.
Background: With
the existence of Federal regulations such as COPPA (Children's
On-line Privacy Protection Act), HIPAA (Health Insurance Portability
Accountability Act), FERPA (Federal Education Right to Privacy
Act), GLBA (Gramm-Leach-Bliley Act), increasing use of the ANSI
33 standards for data security in general by governmental and
private organizations, the Sarbanes-Oxley act (SOX), and the
California State Data Privacy Law (SB 1386), Intrusion Detection
has become major obstacle for small to medium businesses due
to the expense and expertise required to set up, monitor and
interpret the data gathered. Network Evaluation will set this
up and provide automated reports.
Firewall
Log Monitoring -
Network Evaluation will either install a dedicated system, or
reconfigure your Internet Firewall to report all log entries
to a monitoring system for automated analysis and reporting.
Case
History:
One customer was experiencing an infection of the Blaster Virus/Worm.
Solution: Set up a special monitoring application (5 minutes
work) to report on each instance of an attack, and summarize
the results so that a technician could be dispatched to the right
location to clean the affected system immediately. |