Logo_base_banner

>> Powerful:..:Secure:..:Reliable <<

a_support_trans_2

igaming

dual_link

dedicated_hosting

shared_hosting

Virtual_Servers_sidebar

server_colocation

remote_monitoring

remote_backup

firewall_1

Monitoring

End-to-End Network Monitoring

Red Origin Monitor includes three different classes of Monitors -

Quality Assurance Monitors that perform synthetic transactions to test quality of service for critical applications and infrastructure equipment.
Windows® NT/2000/XP/2003 Monitors to monitor key aspects of Microsoft Windows operating systems such as Services and Event logs.
Uptime Monitors based on the IP protocol to test availability and responsiveness of network resources.

Red Origin Monitor's comprehensive network monitoring tools make it easy to monitor all aspects of your key network resources, such as -

  • Windows® NT, 2000, XP, 2003
  • Microsoft® Exchange
  • Microsoft® SQL
  • Oracle® SQL
  • Dell® servers and networking equipment
  • Hewlett Packard® servers
  • IBM® servers
  • Cisco® routers and switches
  • Foundry Networks® switches
  • APC® back-up power protection systems
  • and many more ...


Some of Red Originís Monitoring features -

  • Groups & Dependencies
  • Network Scan
  • Downtime Simulator
  • Monitor Timing Frequencies
  • Recovery Options
  • Filter Interface

Groups & Dependencies

Monitors can be grouped together into a named Group in order to define Dependencies. Dependencies prevent situations where many Monitors would send Alerts when only a single Alert is required.

For example, the failure of a critical router would cause many applications and device Monitors to trigger Alerts, however, with the router defined as a Dependency, redundant Alerts are suppressed and the problem is immediately obvious.


Network Scan

The Network Scan discovery wizard quickly locates applications, services and devices on the network to -

  • Control the discovery method (options include DNS, ICMP/PING, SNMP, and TCP & UDP Port scanning).
  • Control the range(s) of IP addresses that will be scanned.
  • Control the SNMP communities to interrogate.
  • Probe standard and custom ports.

Once your network has been scanned, possible Monitor options are listed for each IP address or NetBIOS name located, which makes it easy to quickly add individual network Monitors or Groups of Monitors.
Scan results are cached, which enables you to return to the list and add network Monitors and Groups for an indefinite period of time.


Downtime Simulator

The Downtime Simulator is used to perform pre-rollout testing for network Monitors. It can -

  • Demonstrate the Alerting / Notification process for a Monitor.
  • Illustrate the Alert coverage for a Monitor during a specified time period, for any day of the week.

The Downtime Simulator works by running a synthetic failure to process every Alert that can be triggered by a Monitor across all Notification Profiles -

  • The Monitor's configuration parameters are applied.
  • Each Notification Profile is scanned to see if the Monitor belongs to it.
  • Range parameters and Schedules are checked for Alerts within the Profile.
  • Any active Alerts are processed.
  • Configuration parameters for any active Alerts are analyzed to report any errors.


Monitor Timing Frequencies

Each Monitor has its own individual timing parameters to control test intervals for each of a Monitor's four testing States: UP, WARN, DOWN and LOST.
This functionality provides the ability to intensify or lessen testing during each of a Monitor's four testing states. For example, you might intensify testing when a Monitor enters a WARN state and reduce testing when a Monitor enters a LOST state.

A Maximum Test Duration parameter is also provided on a per-Monitor basis to provide a timeout mechanism for the test.


Recovery Options
Red Origin Monitor can take corrective action to automatically restore a failed resource using the following Recovery Alerts -

  • External Process
  • Reboot Server
  • Restart Service

Although Recovery Alerts are responsible for executing the corrective procedure, Recovery parameters are defined within the network Monitor that triggers the Alert.

Benefits gained from this system are -

  • Maximum Recovery coverage is possible because a "one to one" relationship exists between each Monitor and the resource it tests.
  • A single Recovery Alert can service many individual Monitors because Recovery Parameters are passed to the Recovery Alert by the Monitor.


Filter Interface

When Red Origin Monitor installations range into hundreds or thousands of network Monitors, Filters make it possible to locate individual Monitors or Groups of Monitors with a high degree of efficiency.

Filters are most often used to organize Monitors or groups of Monitors and quickly perform mass edits such as Delete, Disable, Enable, Suspend, Add Selection to Group or Remove Selection from Group.

Red Origin Monitor supports two different Filter options -

  • Quick Filters let you enter case-insensitive strings and basic RegEx controls to to search on the Name, Address, Tag or ID columns.
  • Savable Filters can be used to create sophisticated Filters which can be saved and reused.

For more information about this service, please contact us.

composite_historic_report

Red Origin Monitor - Sample Report

[Welcome] [Our Services] [i-Gaming] [Corporate] [Residential] [Contact & Info] [Code of Practice]



Red Origin offers a unique combination of hardware, bandwidth, support and services to help companies protect data and ensure business continuity.

Supplied & Powered by

logo_grey_cisco

logo_grey_ibm

Logo_grey_DELL

Logo_grey_Digisec

Logo_grey_Sun

logo_grey_APC