Powerful software platform of 6 modules for monitoring IT resources and user behavior, IT audit, information security, remote management of IT resources.


Technologies are already indispensable part of our life and we use them in nearly any aspect of our life. They play an important part in our professional life, too, and help us streamline a lot of processes, enhance our efficiency and raise our revenues.

An increasing number of companies are turning towards integrated software solutions allowing for optimization and improvement of the general environment in an attempt to manage and control their business and IT infrastructure. The software products and services Nikrama offers are a tool which any company can use to respond to the business and IT challenges in a modern ad reliable way.

Using the appropriate services and software solutions for your business, you can achieve the necessary level of information security and protect your business, meet international requirements and recommendations, and minimize IT losses. The large number of notifications that tell you of any possible issues in the infrastructure you will be able to resolve these problems faster, more easily and remotely, thereby saving precious time and resources.

What is nVision

The technological progress helps companies develop and improve their products and services, but at the same time it brings about a lot of different threats for their security. In this age of cyber attacks, data leaks, viruses and system crashes, security is a number one priority for many companies. System administrators are the most vulnerable in such a situation, as they are the ones responsible for the company’s IT environment and its protection and must do their best to secure the systems and IT resources.

This is why Nikrama offers you nVision, a software product which is really useful for system administrators, as it enables them to perform constant monitoring, take quick decisions and react promptly to any threats or problems that might arise.

nVision is a complex solution for IT infrastructure management which gives many options to control the IT environment, have an audit at any time and improve the efficiency not only of users but also of network devices.

nVision allows system administrators to remotely monitor and manage IT resources, and more specifically, to monitor the network devices and servers, control the server room environment, help users set up network cards by scanning the devices and enumerating TCP/IP services, as well as deal with all issues remotely.

This complex product can detect anomalies in the network devices and thus help system administrators spot any irregularities in time and promptly correct them.

In addition to network monitoring, nVision includes a series of modules for managing IT resources and monitoring user behavior. By implementing nVision in your company, you will have a complete view of the workings of your entire IT infrastructure and users, including the ability to keep track of any changes to the hardware and software configuration of any workstation.

nVision consists of six modules which are the best solution for your business.

Image module

In short about nVision

Modules in details



When you need to monitor the devices which are present and operating in your network and when you want to be informed in advance about any potential failures in the network.

  • prevention of costly downtimes by detecting the potential failure reasons
  • humidity and temperature monitoring in server room
  • time saving – transparent reports available immediately
  • more control over system processes
  • better performance of business processes due to comprehensive insight into the operation of crucial services
  • network scanning, discovery of devices and TCP/IP services
  • interactive network maps, user/branch maps, intelligent maps
  • simultaneous work of numerous administrators, management of authorizations, access rights
  • TCP/IP services: response time and correctness, statistics of packets received/lost (PING, SMB, HTTP, POP3, SNMP, IMAP, SQL, etc.)
  • WMI counters: CPU load, memory usage, disk usage, network transfer, etc.
  • Windows performance: service status change (start, stop, restart), event log entries
  • file distribution with use of WMI
  • SNMP v1/2/3 counters (e.g. network transfer, temperature, humidity, power voltage, toner level and others)
  • MIB file complier
  • support for SNMP traps
  • routers and switches: port mapping
  • support for syslog messages
  • event-actions alarms
  • alerts (desktop, by e-mail, by SMS) and corrective actions (program launch, machine restart, etc.)
  • reports (for a device, branch, selected map or entire network)


When you need a full list of installed software, license management, records on fixed assets and automation of the computer inventory.

  • improvement in the management of workstations and the easier planning of new resources
  • comprehensive control over even the most extensive IT infrastructure
  • full list of installed/used software, which means fines are avoided
  • reduction in the costs of IT department by detection of redundant licenses (for unused software)
  • quick audits from the level of mobile application
  • assistance for the accounting department – register of fixed IT assets
  • list of Microsoft software keys
  • information on register entries, executable files, multimedia files, .zip archives and file metadata on a workstation
  • detailed hardware configuration of a specific workstation
  • system information (startup commands, user accounts, shared folders, SMART information etc.)
  • hardware and software inventory audit
  • history of hardware and software changes
  • IT asset register database (defining own asset types, their attributes and values, attachments, importing data from CSV files)
  • alarms: software installation, change of hardware resources
  • offline inventory scanner
  • Android application which enables a physical inventory to be carried out using the QR barcodes
  • Agent for Android, which keeps the inventory of mobile devices (also outside of the corporate network)
  • audit archiving and comparison


When you want to prevent problems with company data security and when you need to monitor employee performance and increase their efficiency at work.

  • full user management based on security groups and policies
  • data are gathered and assigned to a specific user, so all access rights, authorizations, application and —website policy, and monitoring policy follow them automatically, regardless of the computer on which they are working
  • optimizing the work organization – knowledge of the time spent on specific activities enables the –improvement of the business processes
  • minimizing the cyberslacking and improving the employees’ performance
  • blocking websites
  • blocking of launched applications
  • monitoring of e-mail messages (headers) – anti-phishing
  • detailed work time (start and end times for activities and breaks)
  • applications used (in an active and inactive manner)
  • visited websites (website titles and addresses, number and duration of visits)
  • print audits (per printer, user, computer), printing costs
  • link usage: network traffic generated by users
  • static remote view of user desktop (without access)
  • screenshots (user work history, screen by screen)


When you need to manage notices of employees and respond to them easily, and you want to quickly provide them with remote help.

  • automation of multiple processes in the technical support department
  • reducing the costs of technical support and saving the time of IT staff
  • reducing the amount of costly downtime and increasing the employees’ performance
  • personnel education – guides how to handle the most common problems
  • minimizing the risk of cyber-attack through software gaps – remote distribution of software, including -updates, to multiple workstations at one time
  • efficient distribution of important information – messages sent to users with option of obligatory -confirmation that the message has been read
  • new, transparent and intuitive web interface
  • automation based on the premise of Condition » Action
  • real-time notifications
  • event log
  • creation and management of service tickets (assignment to administrators)
  • tickets base
  • ticket view updated in real time
  • comments, screenshots, and attachments to the tickets
  • internal messenger (chat)
  • messages sent to users/machines with the option of obligatory confirmation that the message has been read
  • remote access to computers with the possibility to request user consent and the blocking of peripheral devices
  • distribution tasks and file executions
  • integration of user database with Active Directory
  • processing trouble tickets from e-mail messages
  • Knowledge Base with article categorization and ability to add multimedia (image files or YouTube videos)
  • expanded search engine for tickets and articles in the Knowledge Base


When you want to increase the security level in your organization by protecting your data against leaks and network infection from pen drives, and when you want to define security policies for the connected storage media.

  • automatic assignation of default monitoring and security policy to the user
  • reducing the risk of strategic data leak through the use of portable storage and mobile devices
  • saving money and time required to restore lost data
  • defining the policy of corporate data transfer by employees together with appropriate Authorizations
  • information about devices connected to a specific computer
  • List of all devices connected to networked computers
  • audit (history) of connections and operations on mobile devices and network shares
  • management of access rights (writing, executing, reading) for devices, computers and users
  • central configuration: setting the rules for the entire network, for selected network maps and for Active Directory groups and users
  • integration of user/group database with Active Directory
  • alerts: mobile device connected/disconnected, file operation on a mobile device
Image module
Image module

SMARTTIME / Wise use of time

Monitor employee and team activities that take the most time to optimize their performance in key areas.

  • insight into one’s own activity statistics on a selected day
  • manager’s access to activity indicators for subordinates and selected teams
  • verification of time spent in front of and away from the computer
  • list of the most popular websites and applications, with the number of minutes spent on them
  • indicator of the time devoted to productive, non-productive and neutral work
  • view of all applications used by the employee in a selected period of time
  • possibility to divide the employees into any groups and measure the effectiveness for the whole teams
  • independent assignation of statuses to activities – productive, non-productive, neutral
  • adding exceptions for individual groups or employees
  • list of contacts of employees with a built-in search engine
  • definition of the productivity threshold and non-productivity limit
  • alerts on exceeding the non-productivity limit or not achieving the required threshold