Company adds enhanced network mapping, security features to N-central
SolarWinds, which offers a broad array of IT management software to MSPs, is adding capabilities to its N-central remote monitoring and management (RMM) solution, including network topology mapping and desk encryption features.
The Lowdown: The company this week launched N-central 12.2, the latest iteration of the software that can be run in hosted environment or on-premises data centers, with new capabilities to help MSPs having to work in IT environments that are becoming increasingly complex.
The Details: Key new features in the RMM software offering include:
>Network Topology Mapping: With the new capability, MSPs can get an automatic view of their customers’ environments at their desks, enabling them to create in-depth network assessments and more quickly troubleshoot network connectivity situations with a single probe.
>Disk Encryption Manager: Managed service providers can render customer data by making it unreadable to unauthorized users if an end device is lost or stolen, heightening the security around the information. Through the feature, MSPs and customers can more easily manage, monitor, and report on the status of the encrypted data.
>Automation Manager: Through the new capabilities, MSPs can automate workflows and activities associated with VMware environments.
>Patch Manager: SolarWinds has separated the Patch Manager engine from the main N-central engine, enabling MSPs to more quickly respond to patches and address the fast changes that tend to come with third-party applications.
The Buzz: “As an MSP grows, its IT environments become more complex and the requirements evolve. This is why our partners’ feedback is pivotal to the way we develop our products,” said Mav Turner, group vice president of products at SolarWinds MSP. “After listening to our N-central partners, we got to work on enhancing the solution based on what they need to make their jobs easier. The new features integrated within our N-central platform give users clear visibility of their customers’ networks, enhance automation capabilities, and provide additional layers of protection to help keep their networks secure and their customer data safe – even if that data falls into the wrong hands.”