Device Inventory
AccelOps monitors the configuration and operational states maintained within the integrated CMDB. The solution continuously monitors, trends and alerts on key performance indicators regarding:
AccelOps delivers rapid discovery and continuous monitoring of your network to yield accurate insights and current views of your infrastructure. AccelOps’ integrated asset management functionality dynamically populates the CMDB, automates topology mapping and management reporting, presents asset details and operational status on-demand, and facilitates compliance and policy governance. Network inventory is accomplished without requiring agents, and fully supports virtual environments.
AccelOps discovers, records, monitors, and reports on all your network assets, both physical and virtual. Our solution allows organizations to quickly and easily:
Network inventory covers various kind of nodes such as:
Rather than using a manual approach or employing more isolated inventory systems, the AccelOps network inventory automates the capturing of hardware and software inventories, and resource utilization – as well as continuously monitoring for changes. AccelOps’ intuitive web GUI enables users to define IPs and IP ranges to discover and subsequently monitor their infrastructure. Wizards facilitate the discovery and maintenance process.
AccelOps monitors the configuration and operational states maintained within the integrated CMDB. The solution continuously monitors, trends and alerts on key performance indicators regarding:
As a part of Change Management, AccelOps detects the following scenarios:
As a part of change management, AccelOps discovery module discovers the “start-up” and “running configuration” from the network devices such as routers, firewalls and switches over a historical period. It intelligently detects the difference between the startup configuration and running configuration and differences between various starup configurations over a long period of time.
Whenever a change is detected, it creates a incident and notifies the administrator about the change. With this intelligence, the administrator can keep track of the changes done which are unauthorized configuration changes to their core network devices. The administrator can look at the configuration of any historical time interval, by selecting the revision of that configuration.
It is also possible to view the versioned configuration at any time, and is possible to search for specific keywords in the configuration. Using an intuitive UI, the administrator can also diff between any version of the running configuration. With this feature, it’s very easy to detect changes and to pinpoint each specific change in the configuration.