Compare Systems Management Software
The C of the FCAPS model for network and systems management. Tasks commonly associated with configuration management include scheduled backups, tracking configuration changes, and setting up and integrating network software.
The chart above displays the percentage breakdown of configuration management capabilities across all Systems Management on SoftwareInsider.
The ability for administrators to automatically detect each device present on the network.
Automated Software Distribution
Administrators are given the ability to distribute software to specific computers across the network.
Backup and Restore
Saved configurations that allow previous settings to be restored at a later date.
Keeps track of changes to network settings and notifies network administrators via system message when they take place.
An option for settings to be transferred from one device to another. A useful consideration when multiple devices across the network use the same configuration.
A comprehensive list of software and hardware components included in the network.
Job Initiation, Tracking, & Execution
Process designed to keep track of each network task from start to finish.
Gives networks the ability to provide services to users.
Allows administrators to change device settings and network configurations from a remote control panel.
The act of installing software on newly acquired network devices.
The A of the FCAPS model for network and systems management. Accounting/allocation management aims to ensure that the network properly implemented and helps determine if any adjustments need to be made in order to provide better service.
The chart above displays the percentage breakdown of accounting/allocation management capabilities across all Systems Management on SoftwareInsider.
Series of system checks that ensures the proper methods for accounting and network data collection are being used.
Figure that determines the total cost of maintaining the network including cost of billing and resource usage.
Reports fraudulent network use to administrators.
Set Usage Quotas
Uses previously collected data to determine the amount of required network usage.
Multiple Accounting Modes
The ability to operate in a variety of accounting modes. This is a useful idea for companies with complex billing methods.
Service/Resource Usage Tracking
A way to track the amount of network usage and determine factors regarding accounting and network resource allocation.
The organization of data usage into easy to access reports.
The P of the FCAPS model for network and systems management. This process helps reduce backups and determines whether any adjustments need to be made in order to boost network performance. During this process, useful traffic statistics are gathered in order to give administrators an idea of where errors may occur and where upgrades may need to be implemented.
The chart above displays the percentage breakdown of performance management capabilities across all Systems Management on SoftwareInsider.
Anticipation of network capabilities and the process of setting limits for each network device.
Consistent Performance Level
Device configuration that keeps power consumption at a constant level.
Performance Data Analysis
An examination of past patterns and correlations to help better plan for future requirements.
Performance Data Collection
Archive of data regarding speed and performance of the network.
A real-time measurement of the level of performance.
Performance Report Generation
Collection of performance statistics organized into easy to follow reports.
System designed to provide alerts to network admins regarding problems with performance.
Utilization & Error Rates
Log generated regarding error rates for each individual network device.
The S of the FCAPS model for network and systems management. This area of networking restricts access to certain parts of the network, protects sensitive information, and prevents breaches.
The chart above displays the percentage breakdown of security management capabilities across all Systems Management on SoftwareInsider.
Collection of data regarding past network usage. This allows administrators to view previous network activity and examine possible areas of weakness.
Process that verifies data being transferred across the network as well as its originating source.
Containment and Recovery
Process of isolating breaches in security and making the necessary changes to ensure that they don’t happen again.
A way to protect sensitive network information, data privacy hides certain information from users without certain permissions.
A way of protecting sensitive data, encryption makes it unreadable to unauthorized users.
Network Element Functions
Allows transfer of data between devices throughout the network.
Uses system data to identify possible breach areas in an attempt to prevent unauthorized access.
Security Alarm/Event Reporting
Sends notifications to administrators regarding security related issues.
Security Audit Trail
Examines the security of the system by tracking data transfer through the network from start to finish.
Security Event Detection
The system’s capability of recognizing when the network is being accessed by unauthorized users.
Security Related Information Distributions
Distribution of security related information only to certain parties in order to limit access.
System/Resource Access Control
Ability for administrators to specify who has access to certain areas of the network.