nVision consists of 6 modules that represent
the best solution for your business

AdminCenter/SOC

Create your own SOC with nVision and AdminCenter – IT Management and Information Security Center.

Use dashboards to clearly display key parameters and show them to the entire IT team on large screens or using projectors. Turn the IT room into a real IT infrastructure management center.

  • Improved Security – Information in one place
  • Current view of key IT parameters
  • Intuitive interface with attractive widgets
  • Unlimited number of dashboards – two view modes
  • Ability to display on large screens
  • Easy but secure sharing

Module Network

This module is used in cases where you need to monitor the currently operating devices on the network and want to be informed in advance about potential problems, threats and failures.

  • prevents downtime costs by detecting potential causes of problems
  • monitors humidity and temperature in the server room
  • saves time by providing instant, transparent reports
  • greater control over system processes
  • greater efficiency of business processes due to a comprehensive view of the operation of important programs
  • support for AES, DES and 3DES encryption for SNMPv3 protocol
  • network scanning, discovery of devices and TCP/IP services
  • interactive network maps, user/branch maps, smart cards
  • simultaneous operation of multiple administrators, authorization management, access rights
  • TCP/IP services: response time and correctness, statistics on received/lost packets (PING, SMB, HTTP, POP3, SNMP, IMAP, SQL, etc.)
  • WMI counters: CPU load, memory usage, disk usage, network transfers, etc.
  • Windows operation: service status change (start, stop, restart), event list entries
  • file distribution using WMI
  • SNMP v1/2/3 counters (e.g. network transfer, temperature, humidity, electrical voltage, toner level, etc.)
  • MIB file compiler
  • SNMP trap support
  • routers and switches: port mapping
  • system log message support
  • event and action alerts
  • alerts (desktop, via email, via SMS) and corrective actions (program launch, machine reboot, etc.)
  • reports (for device, branch, selected card or entire network)

Inventory

This module serves you when you want to have a complete list of installed software, licenses of all devices and programs, a report on all repairs and corrections of devices and objects in the IT infrastructure, as well as automate the computer inventory. Through this module you have the opportunity to audit the IT resources in your company.

  • better workstation management and easier planning of new resources
  • full control over even the most comprehensive IT infrastructure
  • a complete list of installed/used software, which means avoiding fines
    lower costs for the IT department by detecting redundant licenses (for unused software)
  • quick audit from the mobile application level
  • remote access to the file manager with the ability to delete user files
  • help for the accounting department – ​​registration of long-term IT assets
    the list of applications and Windows updates located on an individual workstation (registry, disk scan)
  • a list of Microsoft software keys
    information about registry entries, installation files, multimedia files, .zip archives and file metadata on a workstation
  • detailed hardware configuration of a specific workstation
  • system information (boot commands, user profiles, shared folders, SMART information, etc.)
  • audit of hardware and software inventory
    history of software changes and hardware
    database for IT asset registration (definition of own asset types, their attributes and values, attachments, import of data from CSV files)
  • alerts: software installation, hardware resource change
  • offline inventory scanner
  • Android application that allows physical inventory taking using QR barcodes
  • Android agent that keeps inventory on mobile devices (also outside the corporate network)
  • archiving and audit comparison

Users

This module is used to anticipate potential threats and prevent data security issues. The module is also used in cases where you need to monitor the performance of employees’ work tasks and want to increase efficiency.

  • full user management based on groups and security policies)
  • data is collected and distributed to a specific user, so all access rights, authorizations, application and website policies, and monitoring policies follow them automatically, no matter which computer they are working on
  • optimizing work organization – tracking the time spent on certain activities allows for improving business processes
  • limiting internet use for personal needs during working hours and improving employee efficiency
  • indicating the specific device on which an activity was performed
  • reduces printing costs
  • improving the level of corporate security: blocking dangerous web domains
  • website blocking
  • blocking running applications
  • email (header) monitoring – phishing protection
  • detailed working time (start and end times of activities and breaks)
  • used applications (actively and inactively)
  • websites visited (website titles and addresses, number and duration of visits)
  • audit of printed pages (per printer, user, computer), printing costs
  • link usage: network traffic generated by users
  • static remote view of a user’s desktop (without access)
  • screenshots (users’ work history, screen by screen)

HelpDesk

This module serves you in cases where you want to manage the flow of notifications from your employees and need to respond quickly to their signals.

  • creating and managing problem requests (assigning to administrators)
  • comments, screenshots, and attachments in problem requests
  • setting up custom fields related to the selected query category
  • assumption-based automations: state » action
  • scheduling replacements when assigning problem requests
  • detailed reporting system
  • remote access to machines with the ability to block mouse/keyboard
  • two-way file sharing
  • managing Windows processes from the device information window
  • file distribution and execution tasks (remote software installation)
  • processing requests from email messages
  • integration of the user database with Active Directory

DataGuard

This module serves you when you want to increase the level of security in your organization by protecting your data from a network failure or preventing information leakage through external information media.

  • automatic default monitoring assignment and user security policy
  • limiting the risk of strategic data leakage through the use of portable storage devices and mobile devices
  • saves money and time needed to recover lost data
  • defining a corporate employee data transfer policy along with the relevant authorizations
  • ability to delete non-existent/liquidated data carriers (e.g. flash drives)
  • external device connection signals (without the “trusted medium” attribute)
  • helps protect the company network against viruses that are automatically installed from flash drives or external storage drives
  • information about devices connected to a particular computer
  • list of all devices connected to computers on the network
  • audit (history) of connections and operations on mobile devices and network shares
  • management of access rights (write, execute, read) for devices, computers and users
  • central configuration: setting the rules for the entire network, for specific network cards, and for groups and users in Active Directory

SmartTime

When you are interested in the employee and team activities that take the most time and want to optimize work efficiency in key areas.

  • a look at statistics about your own activity on a given day
  • manager’s access to indicators of the activity of subordinates and selected teams
  • verifying time spent on and away from the computer
  • a list of the most popular websites and apps with the number of minutes spent on them
  • indicators of time spent on productive, unproductive and neutral activities
  • view of all applications used by the employee over a certain period of time
  • ability to allocate employees into groups and measure the effectiveness of entire teams
  • independent assignment of status to activities – productive, unproductive, neutral
  • adding exceptions for individual groups or employees
  • employee contact list with built-in search engine
  • defining the productivity threshold and unproductivity limit
  • alerts when the unproductive limit is exceeded or the required threshold is reached

Technology is a huge part of our world and we use it in almost every aspect of our lives. It also plays a large role in our work, and thanks to it, we are able to optimize many processes, increase the efficiency of our work, and consequently increase our income.

More and more companies are turning to managing and controlling their business and IT infrastructure through integrated software solutions that enable optimization and improvement of the overall environment. The software products and services that “Nikrama” offers are a tool with which each company will be able to solve and optimize a number of its business and IT challenges in a modern and reliable way.

With the right services and software solution for your business, you can achieve information security and protection for your business, meet international requirements and recommendations, and minimize losses in the IT environment. With the large number of notifications notifying you of a problem in the infrastructure, you can resolve these violations faster, easier, and remotely, thus saving valuable time and resources.

What is nVision?

The nVision software product that "Nikrama" offers to your attention is of great benefit to system administrators, enabling them to perform continuous monitoring, based on which they can make quick decisions and respond promptly to emerging threats and problems.

nVision is a comprehensive IT infrastructure management solution that provides many options for controlling the information environment, performing audits at any time, and increasing the efficiency of both users and network devices.

nVision allows businesses, in the person of system administrators, to remotely monitor and manage IT resources, such as:

Technological progress helps companies develop and improve their products and services, but at the same time it confronts them with many different types of threats to their security. In a time of cyberattacks, data leaks, all kinds of viruses and system crashes, security becomes the number 1 goal of many business companies. System administrators are the most vulnerable in such a situation, since it is up to them to protect the IT environment in the company they are responsible for and to do everything possible to secure the systems and IT resources.

nVision also includes a series of modules for managing IT resources and monitoring user work behavior.

The implementation of nVision provides a complete view of the operation of the entire IT infrastructure and users, including tracking changes in the hardware and software configuration of each workstation.

Изпрати на приятел