• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

Threshold, Anomaly based, and Bandwidth Alerts

Basic Threshold based and Anomaly based Alerts and Notifications

Firewall Analyzer generates alerts automatically and notifies network administrators, when there is a security breach attempt in the network or abnormal traffic. It detects the anomalous traffic behavior. Alerts can be set up to notify administrators/operators by Email. Alerts can be notified using SMS and a program can be run to initiate other actions (for example: generate an SNMP trap to be directed to Network/Asset management Application). You can also delete the Alert and deleting bulk alert is possible for a particular profile.

Bandwidth Threshold-based Alerting

Firewall Analyzer can trigger alerts for the bandwidth usage in real-time. Just set a threshold bandwidth and if the usage crosses the threshold, alert will be triggered and you will be notified through the notification mechanisms. This alert helps you to catch the bandwidth hog. With this you can quickly find out the source responsible for the bandwidth usage and take appropriate remediation measures to stop the business hindering bandwidth usage.

Threshold-based Alerting

Alerts can be set up for each device that Firewall Analyzer monitors. You can choose the exact criteria to trigger the alert, set the priority of the alert, and finally set up an email notification or any other notification to immediately notify IT when the alert is triggered.

Anomaly-based Alerting

Alerts can be set up for detecting anomalous traffic behavior. Anomaly alert reports can be used for Network Behavioral Analysis (NBA). You can set the filters to detect anomaly, choose the threshold criteria to trigger the anomaly alert, set the priority of the alert, and finally set up an email notification or any other notification to immediately notify IT when the alert is triggered.

Email Notification for Alerts

Firewall Analyzer provides a simple alert notification mechanism for the administrators. It provides Email notification of Firewall Analyzer generated alerts in the administrator's email inbox. You can set up an Email notification to immediately notify any user when an alert is triggered.

SMS Notification for Alerts

Firewall Analyzer provides a convenient alert notification mechanism for the administrators on the move. It provides SMS notification of Firewall Analyzer generated alerts in the administrator's mobile phones. You can set up an SMS notification to immediately notify any user when an alert is triggered.

Run Program on Alert Triggering

Alerts Profiles can be configured to perform customized actions on alert trigger. To achieve this, Firewall Analyzer lets you to configure a program to be executed.

Alerts Notified as SNMP Traps

Firewall Analyzer provides another important alert notification mechanism for the administrators. It provides SNMP Trap notification of Firewall Analyzer generated alerts. You can set up an SNMP Trap notification to immediately notify any application or SNMP device, when an alert is triggered. You can configure other Application Manager, Asset Manager, Network Management applications to listen to this traps for further related processing.

Customer Speaks
 
"The implementation was so easy and the Firewall Analyzer immediately started showing me how much inbound and outbound traffic was passing through our firewalls.I now use Firewall Analyzer daily !"
-Phil Avella,
Manager,Information Systems,
Thunder Bay District Health Unit
 
A single platter for comprehensive Network Security Device Management