ITEM |
SPECIFICATION |
SUPPORTED DEVICES |
Workstations, Servers Platform supported :
- Windows XP/Vista/7/8
- Windows Server 2003/2008
- Virtualization - VMWare/Hyper-V
- Mac OS
- Linux OS
Network Devices – Routers, Switches, Printers and other IP-based devices. |
|
AUTOMATION |
Procedure Creation
- Create IT Procedures/Scripts.
- Automatically distribute procedures via user, groups of users within a Local Area Network and Remote systems.
|
|
Automated Remediation
- Automatically run procedures triggered by an alert (via Real-time monitoring of critical applications, services, event logs) offering automated remediation of issues.
|
|
Scheduling
- Schedule procedures to run automatically
|
|
Application Deployment
- Deploy third party applications
- Capability to assign software repository for local sourcing of installers.
|
|
Policy Enforcement/Configuration Management
- Deploy and enforce system policies, configuration, e.g. hide control panel, block USBs via user, groups of users within a Local Area Network and Remote systems.
|
|
File Distribution
- Automatically get and distribute files to and from systems connected locally and remotely.
|
|
MONITORING |
Provides user defined real-time monitoring
- Alerts
- Monitor sets
- SNMP sets
- System check
- Log monitoring
- Monitoring of IP Devices
- Monitors changes in the configuration of IT system and provides alerts if a change has occurred.
- Provides alerts via tickets, email and dashboard.
- Alert on specific file changes and protection violations
- Know if disk space is running low on computers
- Monitor devices online/offline status
- Know when traveling users with notebooks connect
- Alert message and recipient configuration
|
|
Automated Network Discovery
- Automatically discover all devices on the network LAN monitoring alerts when new devices are detected
- View all known and unknown devices
|
|
Dashboard
- Offers view of alerts summary per system (device)
- Ability to group systems together
- Customize alerts
- Offers Multi Router Traffic Grapher (MRTG), Bandwidth consumption.
|
|
INVENTORY AND AUDIT |
Offers comprehensive audit of each system – Hardware, Software and Systems inventory. |
|
Hardware inventory
- Manufacturer
- Bus speed
- Max memory size and slots
- Processor family, maker, max speed, current speed
- System model
- Memory installed, slots
- Chassis type
- Onboard device listings
- System version
- Serial numbers or service tags
- Motherboard maker, version, serial
- Ports (number, type)
|
|
Software inventory
- Application executable name
- Version
- Product name
- File size
- Description
- Manufacturer
- Directory path
- Last modified date
|
|
System inventory
- IP information
- DNS/DHCP server information
- Disk volume information including drive letters, space available, volume labels
- PCI and drive hardware information include models, and user editable notes for each device
- CPU and RAM information with specifics on CPU speeds, models, number, and ram installed
- Printer information from the currently logged on user at the time of audit with Name, Port and Model
- Monitor and alerts for any changes in the configuration of the system via alert summary dashboard, ticket, email.
- Logs hardware, software or system changes
- Logs hardware, software or system changes
- Report on current hardware and software statistics
- Ability to append own fields for customized tracking purposes
- Centralized Network Audit And Inventory Repository
- Supports / conducts audit procedures to ensure systems are in compliance with standards, e.g. Firewall on/off, AV on/off, Updated AV, etc.
|
|
PATCH MANAGEMENT |
Manage Machines
- Offers Scan machine, Patch status, Schedule scan, Initial and automatic updates, Pre/Post procedure, Machine History
|
|
Manage Updates
- Ability to Machine/Patch updates,
- Provides Rollback
- Cancel Updates
|
|
Patch Policy
- Create/Delete Policies
- Approval by Policy
- Knowledge Based Override
|
|
Automatic and recurring patch scans
- Secured or ad-hoc, Scans networks for installed and missing security patches, Detects vulnerability, Determines which patches are needed.
- By computer, group or user defined collections of computers
- Automates the tedious process of researching, identifies which patches are installed and date installed, Monitors and maintains patch compliance for entire enterprise
|
|
Centralized Management of Patches
- Does not require multiple patch servers
- Ensures that all systems are protected, even remote users on laptops and workstations
- Allows implementation across entire network
- Always know what patches and security holes reside on each user’s system
|
|
Patch approval
- Approve or deny selected patches
- Select by user defined computer collections
|
|
Automated patch deployment
- Schedule by time, computer, group or user defined collections of computers
- Simultaneously deploy all required patches across operating systems
- Single rollout strategy and policy enforcement
- Maximize uptime
|
|
Interactive patch management
- Select to deploy by patch or by computer
- Select individual computers, groups or user defined collections of computers
- Ad-hoc simultaneous deployment of selected patches
- Across operating systems
- Across locations
|
|
Flexible configuration
- Patch file location, Patch file parameters
- Reboot actions and notifications, By computer, group or user defined collections of computers
- Saves bandwidth, Security and policy control
|
|
Comprehensive reports
- Graphical with drill-down, User defined
- Scheduled, E-mail notification
- Export to HTML, Excel or Word
|
|
REMOTE ACCESS |
Capability to access remote systems without disturbing the user
- Access to Command prompt
- Access to event viewer
- Access to Audit information
- Access to registry editor like regedt32.exe
- Access file manager for transferring files to and from the remote system
- Access to Task manager to see running processes and agent resource consumption
- Automatically and transparently installs needed remote control software components
- Easy administration of users and policies
- Access computers from anywhere with a standard web browser
- Access host computers from any web browser
- Password protected
|
|
TICKETING |
- Accessible from a web browser
- Automatically creates tickets based on alarm
- Use email to update end users and receive feedback
- Ticketing policies
- Field customization
- Clients can file tickets on their own
- Auto assign tickets to technical personnel
- Email notification of ticket status to client and technical personnel
- Aging of tickets
|
|
REPORTING |
- Detailed list, table and graphic style reports
- Hardware and Software Inventory
- Complete Computer Changes
- Disk Utilization
- License Usage and Compliance
- Network Usage and Statistics
- Server and Workstation Uptime History
- Help Desk Trouble Tickets
- Computer Logs and Status
- Schedule Reports for Automatic Distribution
- Distribute automatically to selected e-mail recipients
|
|
Flexible Report Customization
- Report for all, groups or specific computers
- Detailed filtering and content selection
- Add own logo
- Immediate viewing with hyperlinks for quick data access
- Save reports with selected parameters for reuse
- Saved reports can be designated as private or shared
- Export report data to HTML, Microsoft Word or Excel
|
|
ADMINISTRATION |
- Multi-tenant Capable
- Ability to group systems
- Assign Admin users
- Ability to assign roles, scope and groups to Admin Users
- Logs activities of Admin users
- Ability to access Admin system remotely
|
|
Centralized Management
- Ability to manage, monitor local and remote systems in a single console (without the need for a private connectivity).
- Ability to deploy policies, monitoring definitions to both local and remote systems using a single console.
- Ability to throttle bandwidth consumption used by agents and server to manage bandwidth and network traffic.
|
|
SECURITY |
System Security
- Protected against man-in-the-middle attacks
- All communications between the host and local connection encrypted 256-bit
- RC4 using a key that rolls at least once per day
- No opening of ports on the client side
- No plain-text data packets passing over the network Systems and data are secure when using as remote-access solution
|
|
SYSTEM CERTIFICATION |
- Common Criteria Certified EAL2+
- Federal Information Processing Standards 140-2 9001 and 27001 ISO standards
|
|
SUPPORT |
Competency
Provider should have at least 2 Certified Administrator of the Solution proposed.
Local Support
- 1 year of updates and support
- 9 x 5 Phone, Onsite, E-mail and Chat support, One (1) hour response time upon receipt of call;
|