Stealth is a cross-platform, alert based asset management and monitoring solution that provides proactive monitoring and management of network devices in an enterprise environment.
Stealth provides real-time device status, meter readings, consumables level, and remote printer monitoring and management. The data gathered through these processes, as well as data gathered through scheduled tasks, will be transferred to centralize server/command centre for monitoring and asset management improvement.
How It Works
The core engine, which is the heart of every Stealth product, identifies networked printers and Multifunction Printers (MFP) using Simple Network Management Protocol (SNMP). SNMP is an application layer protocol that facilitates the exchange of Management Information Base (MIB) between networked devices .
MIB is a collection of hierarchically organized characteristic of managed device, comprised of one or more object instances, which are essentially values. An object identifier (or object ID) uniquely identifies a managed object in the MIB hierarchy. Based on this technology, Stealth correctly identifies re-branded models.
Once identified, information is extracted using SNMP that combines a mixture of multiple protocols, communicating, and extracting information from a multitude of different areas within a device depending on its architectural design.
Stealth may be launched from a Windows 2000/XP/Vista/7/2003/2008 workstation or server with restricted user permissions to the targeted network. Although SNMP commands support both read and write operations, Stealth only read networked devices and do not modify any default or custom device settings.
St ealth allows discovered/audited information to be sent from the target network to a remote destination as an attachment to an email (default port 25). By default, this information is encrypted in the attachment, and requires a user and password combination for authentication.
Only the information which is extracted during a discovery will be saved locally on targeted server/PC. The end users’ confidential data files are not viewed or saved by Stealth. Stealth does not communicate over the internet except for email access for sending the collected information attachment to an email.
Stealth uses mixtures of algorithms to discover and communicate with the different network elements such as the current workstation or server, routers, hubs switches and other network hardware.
Firewalls and other network hardware may prevent or limit the discovery of the network configuration. Network with multiple physical locations typically have firewalls in between each Local Area Network (LAN) and the public internet that connects these location via Wide Area Network (WAN). The network IP ranges (segments) may be manually added to the Stealth, with the minimum requirement that the targeted devices can be “pinged” from originating location.
We also provide customized industry workflow analysis. Drop us an email, and we'd be happy to get in touch with you!
To download e-Brochure, please click here
|Back to top|