What is nVision 11?
Powerful software platform of 6 modules:
- information security
- protection
- resource management
- monitoring
- audit
- IT resource management
- user behavior
- help desk
Technologies are already indispensable part of our life and we use them in nearly any aspect of our life. They play an important part in our professional life, too, and help us streamline a lot of processes, enhance our efficiency and raise our revenues.
An increasing number of companies are turning towards integrated software solutions allowing for optimization and improvement of the general environment in an attempt to manage and control their business and IT infrastructure. The software products and services Nikrama offers are a tool which any company can use to respond to the business and IT challenges in a modern ad reliable way.
Using the appropriate services and software solutions for your business, you can achieve the necessary level of information security and protect your business, meet international requirements and recommendations, and minimize IT losses. The large number of notifications that tell you of any possible issues in the infrastructure you will be able to resolve these problems faster, more easily and remotely, thereby saving precious time and resources.
What is nVision?
The nVision software product that Nikrama offers to your attention is of great benefit to system administrators, enabling them to perform continuous monitoring, based on which they can make quick decisions and respond in a timely manner to emerging threats and problems.
nVision is a comprehensive IT infrastructure management solution that provides many opportunities to control the information environment, perform audits at any time, and increase the efficiency of both users and network devices.
nVision allows businesses in the form of system administrators to remotely monitor and manage IT resources, such as:
- to monitor network devices and the server
- to control the environment of the server room
- to help users create network cards
- scanning devices and listing TCP / IP services
- and deal with all problems from a distance
- detects anomalies in network devices, thus helping system administrators to detect irregularities in a timely manner and correct them in a short time.
Technological progress helps companies to develop and improve their products and services, but at the same time faces many different types of threats to their security. In times of cyber attacks, data leaks, all sorts of viruses and system crashes, security has become the number one goal of many business companies. System administrators are most vulnerable in such a situation, as it is up to them to protect the IT environment in the company for which they are responsible and to do everything possible to secure systems and IT resources.
nVision also includes a series of modules for IT resource management and monitoring of user work behavior.
The implementation of nVision provides a complete view of the operation of the entire IT infrastructure and users, including tracking changes in the configuration of hardware and software of each workstation.
AdminCenter/SOC
Create your own SOC with nVision and AdminCenter – IT management and information security center.
Use the table to show clear key parameters and to show the whole IT team on big screens or with the help of projects. Turn your IT room into a true IT infrastructure management center.
- Improved security – Information for one place
- Current view of key IT parameters
- Intuitive interface with attractive gadgets
- Unlimited number of tables – two view modes
- Ability to display large screens
- Easy but secure sharing

Network
When you need to monitor the devices which are present and operating in your network and when you want to be informed in advance about any potential failures in the network.
- prevention of costly downtimes by detecting the potential failure reasons
- humidity and temperature monitoring in server room
- time saving – transparent reports available immediately
- more control over system processes
- better performance of business processes due to comprehensive insight into the operation of crucial services
- network scanning, discovery of devices and TCP/IP services
- interactive network maps, user/branch maps, intelligent maps
- simultaneous work of numerous administrators, management of authorizations, access rights
- TCP/IP services: response time and correctness, statistics of packets received/lost (PING, SMB, HTTP, POP3, SNMP, IMAP, SQL, etc.)
- WMI counters: CPU load, memory usage, disk usage, network transfer, etc.
- Windows performance: service status change (start, stop, restart), event log entries
- file distribution with use of WMI
- SNMP v1/2/3 counters (e.g. network transfer, temperature, humidity, power voltage, toner level and others)
- MIB file complier
- support for SNMP traps
- routers and switches: port mapping
- support for syslog messages
- event-actions alarms
- alerts (desktop, by e-mail, by SMS) and corrective actions (program launch, machine restart, etc.)
- reports (for a device, branch, selected map or entire network)
Inventory
When you need a full list of installed software, license management, records on fixed assets and automation of the computer inventory.
- improvement in the management of workstations and the easier planning of new resources
- comprehensive control over even the most extensive IT infrastructure
- full list of installed/used software, which means fines are avoided
- reduction in the costs of IT department by detection of redundant licenses (for unused software)
- quick audits from the level of mobile application
- assistance for the accounting department – register of fixed IT assets
- list of Microsoft software keys
- information on register entries, executable files, multimedia files, .zip archives and file metadata on a workstation
- detailed hardware configuration of a specific workstation
- system information (startup commands, user accounts, shared folders, SMART information etc.)
- hardware and software inventory audit
- history of hardware and software changes
- IT asset register database (defining own asset types, their attributes and values, attachments, importing data from CSV files)
- alarms: software installation, change of hardware resources
- offline inventory scanner
- Android application which enables a physical inventory to be carried out using the QR barcodes
- Agent for Android, which keeps the inventory of mobile devices (also outside of the corporate network)
- audit archiving and comparis





Users
When you want to prevent problems with company data security and when you need to monitor employee performance and increase their efficiency at work.
- full user management based on security groups and policies
- data are gathered and assigned to a specific user, so all access rights, authorizations, application and —website policy, and monitoring policy follow them automatically, regardless of the computer on which they are working
- optimizing the work organization – knowledge of the time spent on specific activities enables the –improvement of the business processes
- minimizing the cyberslacking and improving the employees’ performance
- blocking websites
- blocking of launched applications
- monitoring of e-mail messages (headers) – anti-phishing
- detailed work time (start and end times for activities and breaks)
- applications used (in an active and inactive manner)
- visited websites (website titles and addresses, number and duration of visits)
- print audits (per printer, user, computer), printing costs
- link usage: network traffic generated by users
- static remote view of user desktop (without access)
- screenshots (user work history, screen by screen)
HelpDesk
When you need to manage notices of employees and respond to them easily, and you want to quickly provide them with remote help.
- automation of multiple processes in the technical support department
- reducing the costs of technical support and saving the time of IT staff
- reducing the amount of costly downtime and increasing the employees’ performance
- personnel education – guides how to handle the most common problems
- minimizing the risk of cyber-attack through software gaps – remote distribution of software, including -updates, to multiple workstations at one time
- efficient distribution of important information – messages sent to users with option of obligatory -confirmation that the message has been read
- new, transparent and intuitive web interface
- automation based on the premise of Condition » Action
- real-time notifications
- event log
- creation and management of service tickets (assignment to administrators)
- tickets base
- ticket view updated in real time
- comments, screenshots, and attachments to the tickets
- internal messenger (chat)
- messages sent to users/machines with the option of obligatory confirmation that the message has been read
- remote access to computers with the possibility to request user consent and the blocking of peripheral devices
- distribution tasks and file executions
- integration of user database with Active Directory
- processing trouble tickets from e-mail messages
- Knowledge Base with article categorization and ability to add multimedia (image files or YouTube videos)
- expanded search engine for tickets and articles in the Knowledge Base





DataGuard
When you want to increase the security level in your organization by protecting your data against leaks and network infection from pen drives, and when you want to define security policies for the connected storage media.
- automatic assignation of default monitoring and security policy to the user
- reducing the risk of strategic data leak through the use of portable storage and mobile devices
- saving money and time required to restore lost data
- defining the policy of corporate data transfer by employees together with appropriate Authorizations
- information about devices connected to a specific computer
- List of all devices connected to networked computers
- audit (history) of connections and operations on mobile devices and network shares
- management of access rights (writing, executing, reading) for devices, computers and users
- central configuration: setting the rules for the entire network, for selected network maps and for Active Directory groups and users
- integration of user/group database with Active Directory
- alerts: mobile device connected/disconnected, file operation on a mobile device
SmartTime
Monitor employee and team activities that take the most time to optimize their performance in key areas.
- insight into one’s own activity statistics on a selected day
- manager’s access to activity indicators for subordinates and selected teams
- verification of time spent in front of and away from the computer
- list of the most popular websites and applications, with the number of minutes spent on them
- indicator of the time devoted to productive, non-productive and neutral work
- view of all applications used by the employee in a selected period of time
- possibility to divide the employees into any groups and measure the effectiveness for the whole teams
- independent assignation of statuses to activities – productive, non-productive, neutral
- adding exceptions for individual groups or employees
- list of contacts of employees with a built-in search engine
- definition of the productivity threshold and non-productivity limit
- alerts on exceeding the non-productivity limit or not achieving the required threshold

Technologies are already indispensable part of our life and we use them in nearly any aspect of our life. They play an important part in our professional life, too, and help us streamline a lot of processes, enhance our efficiency and raise our revenues.
An increasing number of companies are turning towards integrated software solutions allowing for optimization and improvement of the general environment in an attempt to manage and control their business and IT infrastructure. The software products and services Nikrama offers are a tool which any company can use to respond to the business and IT challenges in a modern ad reliable way.
Using the appropriate services and software solutions for your business, you can achieve the necessary level of information security and protect your business, meet international requirements and recommendations, and minimize IT losses. The large number of notifications that tell you of any possible issues in the infrastructure you will be able to resolve these problems faster, more easily and remotely, thereby saving precious time and resources.
What is nVision?
The nVision software product that Nikrama offers to your attention is of great benefit to system administrators, enabling them to perform continuous monitoring, based on which they can make quick decisions and respond in a timely manner to emerging threats and problems.
nVision is a comprehensive IT infrastructure management solution that provides many opportunities to control the information environment, perform audits at any time, and increase the efficiency of both users and network devices.
nVision allows businesses in the form of system administrators to remotely monitor and manage IT resources, such as:
- to monitor network devices and the server
- to control the environment of the server room
- to help users create network cards
- scanning devices and listing TCP / IP services
- and deal with all problems from a distance
- detects anomalies in network devices, thus helping system administrators to detect irregularities in a timely manner and correct them in a short time.
Technological progress helps companies to develop and improve their products and services, but at the same time faces many different types of threats to their security. In times of cyber attacks, data leaks, all sorts of viruses and system crashes, security has become the number one goal of many business companies. System administrators are most vulnerable in such a situation, as it is up to them to protect the IT environment in the company for which they are responsible and to do everything possible to secure systems and IT resources.
nVision also includes a series of modules for IT resource management and monitoring of user work behavior.
The implementation of nVision provides a complete view of the operation of the entire IT infrastructure and users, including tracking changes in the configuration of hardware and software of each workstation.