ThirdEye by LogicVein includes advanced Network Configuration and Change Management (NCCM) capabilities and Network Monitoring System (NMS) for large enterprise data centers.
Several LogicVein customers are offering ThirdEye as a service (SaaS) to their customers via public and private clouds.
Allows SSH into NetLD, followed by “jumping” into inventory devices with automatic login and full session recording. Everything is recorded, indexed, and searchable. This feature is so deceptively convenient, as soon as we implemented it, we found ourselves no longer connecting directly to devices.
For creating configuration drafts from existing device configurations, or importing from text files. Draft configurations can be edited directly and pushed to the device (either running or startup configuration). Drafts can be compared to existing configurations to verify that only the parts you expect to change are affected.
SmartChange templates for running unique commands against devices all-at-once, created with a point and click interface, supporting per-device value parameterization, and Excel spreadsheet import.
Change Adviser can work with existing or draft configurations. Using the Change Adviser, and comparing the configuration with the interface change to the prior configuration, the Change Adviser will generate the list of commands necessary to rollback that change, leaving the password changes untouched.
Manage multiple networks from a “single pane of glass”. Multi-tenancy support for overlapping IP spaces, allowing network operations to occur geographically closer to the devices under management.
Three easy steps:
And you are ready to start configuration management.
Net LineDancer has user-defined roles based on a granular permission system that allows you to easily manage access for each user.
Easily correlate monitored activity with actual changes that have happened on the network in ThirdEye, and it also works with other NMS systems.
Net LineDancer Configuration Recovery allows you to put configurations into replacement devices and restore them.
Set up your rules, templates, policies and where you want alerts/traps to go. In addition, you can monitor new and existing violations.
Incidents allows you to monitor alerts/traps, clear them and assign them
The dashboard allows you to show the location of the device, and any devices that are in an alert state and other paramaters. You can create multiple dashboards.