Tek-Tools Ships DNS/Uptime Monitoring for Mixed Storage Environments

Tek-Tools has announced the availability of version 2.4 of its Storage Profiler application. The new version includes DNS monitoring, Uptime Monitoring, Scheduled Reports, Duplicate Files and Enterprise Reports.

According to the company, Storage Profiler’s new DNS monitor is a “near real-time tool” designed to monitor DNS hosts for availability. It relies on common TCP commands to monitor the hosts and retrieve statistical data. The DNS monitor can be used for any host, even if it’s not a DNS server. The monitor requires no agents on the remote hosts and will display a near real-time console that shows all the hosts’ status via an easy to read color-coded table. The console also displays the trace path information gathered for each host. The DNS monitor is capable of sending email notifications on different formats (email, Web phone, PDA, pager) for different situations, and can run reports such as hosts uptime/downtime, response times, peak times and trace path information.

In addition to the DNS Monitor, Storage Profiler v2.4 offers the following features and business advantages:

  • Uptime reports track how much time a host is up and running
    over a period of time by host or OS in an IT environment.
  • Scheduled reports allow businesses to pre-set times and
    conditions under which a report will automatically be
    generated and delivered via email, pager, PDA or Web phone.
  • Duplicate file capability allows IT organizations to identify
    large duplicated files across the enterprise.
  • Enterprise reports allow managers and administrators to see
    storage, user and file types across hosts, OS and groups.

Storage Profiler v2.4 is available now. Tek Tools will make pricing information and customer references are available upon request. The application runs on Sun Solaris, Microsoft Windows NT and 2000, Linux, Novell NetWare, Network Appliance, HP-UX, AIX and Oracle.

Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter!
Subscribe to Cloud Insider for top news, trends & analysis
This email address is invalid.

Latest Articles

What Is iSCSI? Definition, Components, & Performance

iSCSI (Internet Small Computer Systems Interface) is a transport layer protocol that works on top of the transport control protocol.

What is Memory Swapping? How Memory Swapping Works

Memory swapping is a process of moving data between main memory and secondary storage. Learn more about memory swapping and its applications.

Importance of Vulnerability Scanning & Why You Should Do It

Vulnerability scanning is the process of testing and assessing the state and conditions of computer software, hardware, and networks for known weaknesses and bugs....