Avatar of Richard Smithers
Richard SmithersFlag for Guam

asked on 

SNMP Logging Server/Software

I'm looking for a logging software/server which can be used at many remote locations.  Is there a solution which allows a central server to be located at a central site and then remote servers/software be installed at a bunch of remote sites.  The remote logging server/software will then report all the information for the systems it monitors to the main central SNMP software/server.  The reason for the remote servers/software which are located at the local remote sites is in case the sites lose network connectivity to the main central site the remote SNMP server will still be logging the information for all systems at the remote site where it is located, and when connectivity is re-established to the central site the log reports can be uploaded to the central site.
Network OperationsNetwork SecuritySecurityIT Administration

Avatar of undefined
Last Comment
Andrej Pirman
Avatar of arnold
Flag of United States of America image

you can place snmptrap servers in each location with a processes that synchronizes the data.

monitoring tools nagios, opennms, zabbix will alert you to the down event.

The focus on the roll up in hopefully  a rare event ........ shifts the emphasis fr
Avatar of Andrej Pirman
Andrej Pirman
Flag of Slovenia image

Blurred text
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews


IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo