Other features have also been added to the product's latest version

Jan 22, 2013 21:11 GMT  ·  By

Security solutions provider GFI Software has released an improved version of the EventsManager log management software. The latest variant comes with a number of new features and an active network and server monitoring functionality powered by NetworkServerMonitor.

The new addition to GFI EventsManager allows IT administrators to actively monitor their assets, network infrastructure, services and applications in real time.

These monitoring checks and the log-based monitoring system implemented into EventsManager can be utilized to track various operational aspects, including the performance of network devices, functionality and availability of network protocols, and the usage and performance of server and infrastructure services.

“Network infrastructure requires permanent monitoring and maintenance to function appropriately. The last thing resource-constrained IT departments need is to track different management solutions for different IT assets,” said Calin Ghibu, product manager at GFI Software.

“Not only can this become costly, but it takes up valuable time and resources as well. GFI EventsManager equips IT managers with additional tools to manage and monitor the network infrastructure’s performance – and does so at price point they can afford and with a level of simplicity that allows them to reallocate resources to other pressing tasks.”

Another noteworthy improvement made to EventsManager is the enhanced console security. IT administrators can now assign specific computers to each user to ensure that access is granted only on a “need-to-know” basis.

The latest variant of GFI EventsManager also includes flexible storage options, anti-tampering protection, log support by default and import/export functionality.

The anti-tampering protection refers to the ability to hash log data to enhance protection against outside attempts to damage it.

The flexible storage options are designed to free up disk space by physically deleting logs in a secure manner. In addition, data can be directly logged to remote storage for data centralization purposes.