NETWORK MONITORING
OUR NETWORK MONITORING SYSTEM SCANS FOR FAILURES OR IRREGULARITIES 24 HOURS A DAY, 7 DAYS A WEEK.
Network monitoring is one of our managed IT services that offers combined network, server, device and application layer monitoring with traffic analysis functionalities. As a bonus to this option, we will include monitoring of your company website. We can also provide 24×7 rapid support in the event of an alarm, and have the issue resolved for it impacts your business operations.
WHAT HAPPENS WHEN AN ALARM IS PRODUCED?
Client device produces an alarm and immediately alerts monitoring server.
A ticket is created and transmitted to the assigned network administrator(s).
Within minutes the ticket is reviewed and investigated.
The source and severity of the alarm are determined, and necessary steps taken to resolve the issue.
NETWORK MONITORING HIGHLIGHTED FEATURES
Though cloud computing has become ubiquitous, many people still don't know much about it. If you're still hosting your data onsite or using local physical resources to run your digital architecture, there may be many potential cost savings. But if you aren't sure whether you should move to the cloud or need some advice on how to do so, we can help. iTecs offers cloud consulting services to help you make sense of all the different options available to you.
Our team consists of experienced consultants who understand the challenges facing organizations today. We know that there are many different types of clouds, each with unique benefits and drawbacks. We also know that choosing the right cloud solution depends heavily on understanding the pros and cons of each type of cloud.
Rapid Response
In the event of an alarm, we follow strict protocols established in the SLA. Depending on the rules outlined in the SLA, we can: immediately begin troubleshooting the issue remotely, dispatch an engineer on-site if deemed necessary and notify personnel in your company.
Security Management
We will monitor your server uses to identify unauthorized users and inform you about threats to the server/network integrity – whether they are initiated inside or outside your organization.
Event Log Checks
We analyze the server(s) event log, which reports all errors generated by applications, security audits, and fatal operating system messages. A detailed analysis of these records will provide hints of possible future server failures.
Backup Monitoring
We will oversee your backup software and ensure that each scheduled backup job completes successfully. Our system works with brand name packages such as ARCserve/ARCserverIT, Symantec Backup Exec and can diagnose problems easily and efficiently.
Hardware Management
Keeping a detailed log of available memory and hard drive space is crucial. We monitor the usage of your system resources and will notify you when a new hard drive or memory upgrade is needed.
Processor Management
We take a nightly or weekly snap shot of all processes and threads that are running on the server. This provides us with a detailed log of what software is currently running, alerting us of any back door software that may enable remote users unauthorized access.
Virus Scan Management
We monitor scheduled virus scans on the server/devices and verify that the DAT files are always up-to-date to ensure proper and efficient scanning.
LEVELS OF NETWORK MONITORING
Layer one (L1) monitoring is a ping and reply communication process to ensure the monitored device is reachable and active on your network. This layer of monitoring is excellent for routers and connectivity devices; there is no collection of basic statistics (cpu/memory/HD usage etc) and used generally as a “are you there” tool.
Layer two (L2) monitoring provides basic statistical information on the monitored device such as: CPU/Memory/Hard drives and network usage.
Layer three (L3) monitoring provides in-depth application layer statistics. This includes detailed monitoring of Exchange, SQL, Active Directory, proprietary software and much more. This package also includes statistics pulled by L2 data on the hardware that hosts the monitored application.
Rapid support service level agreements are set in place so that in the event of an alarm, iTecs support staff has 20 minutes to acknowledge and begin investigating the issue. This includes providing immediate remote support and if necessary, have a technician dispatched on-site. Time spent providing support is billed separately by either deducting points from a retainer contract or through our hourly program.
Notify only means that in the event of an alarm, notifications are sent to designated parties with no support escalations performed by iTecs staff. This configuration allows you and whomever within your organize you choose to be immediately notified when an alarm is generated. iTecs will not respond or provide support unless requested.
Prices below are per device per month, for a complete list of covered devices please contact us.
View All Our Cybersecurity Experts Will Safeguard Your Network From Evolving Digital Threats
Our managed IT services experts work with numerous companies across all business sectors, which means we have adopted what we consider to be the best set of guidelines, tools, and protocols in today's industry. ITECS serves clients internationally; we have quickly gained momentum and have become a leader in Managed Security Services.
Partners