Solved

network mapping software

Posted on 2011-03-04
4
435 Views
Last Modified: 2013-12-07
1.      Hello all, I’m searching software that can map our network topology and generate a visual network mapping report, need
Recommendation,

2.      Also I’m still searching a tool that can generate network usage in visual report I post that question in the past but the suggestion was not accurate to my needs, I need an easy and friendly tool that I can provide to manager (not sys admin or technical person) that able to present visual report regarding general network usage like how many time employee spent on facebook, porno, etc….

Regards,
0
Comment
Question by:Robert-Prodigy
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
DewFreak earned 125 total points
ID: 35041036
0
 
LVL 16

Assisted Solution

by:Nenad Rajsic
Nenad Rajsic earned 62 total points
ID: 35041049
might be a long shot but we used Finjan security appliance (proxy) years ago. reporting function was awesome. you could create reports based on username, user's local ip, web address, time started, time finished, bandwidth used, display custom messages to users surfing during work hours etc. My HR dept used those reports in disciplinary hearings and managers were able to request certain data for certain users. Great tool but expensive
0
 
LVL 6

Assisted Solution

by:DewFreak
DewFreak earned 125 total points
ID: 35041103
0
 
LVL 8

Assisted Solution

by:jako
jako earned 63 total points
ID: 35056705
2. If you think about it, downloading static web content now and then does not mean you are spending time on it all that time in between. Because of that one can not have expectations for this report (of employees spending time on smth) to be accurate (and thus would mean diddly squat to any manager with more than air in betwixt their ears).

Otherwise this could be true: let us say the report shows you opening a NSFW (or facebook) URL at January 2nd from a DHCP lease that does not get used again in a year. And some other NSFW URL from the same domain at December 30th with the same lease again. having this data it could very well report that you've been spending all your time whacking your NSFW at the first URL. if the software assumes that employees have to leave at the end of the day adjust data so that it would be true for a day not a year. Still a ridiculous outcome of improperly interpreted data.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
non-domain members are not prompted for credentials 18 60
application access evidence windows 7 5 47
Guest Wireless in a Business Environment 6 99
google exe file 5 73
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question