Everything is easy and straightforward
In Algorius Net Viewer, everything is easy and straightforward! Installation only takes a few seconds. Launching a web server or service is enabled by ticking one checkbox in the settings. We value your time, so we try to make complicated things simple to use.
Our unique algorithms allow each launched application to monitor more than 100,000 devices. For example, high-quality flow control ensures high productivity, and the use of asynchronous operations allows for economic use of system resources.
Only one computer is enough to monitor your entire network. Other users can be allowed to access the results from anywhere. This eliminates network pollution with excessive ICMPs and other packets, which in its turn enhances monitoring quality.
Large organizations composed of multiple branches can perform monitoring from multiple servers. This allows for distributing the load and performing monitoring from the nearest points. On other computers, it is possible to obtain the overall result and to see the status of the entire network as a whole.
Inter-server communication allows servers to exchange monitoring results. All relevant information becomes accessible from local servers. This ensures high scalability and accelerates information exchange.
Algorius Net Viewer makes it possible to organize users' cooperative work. Provisions are made for map updating, capturing of maps for editing, recording and undoing the changes, and displaying who is editing each of the maps. This will eliminate any conflicts and overlaps in case of cooperative map editing.
External database support
The application uses an integrated SQLite database by default. This makes it possible to start using the program immediately. The following databases are supported: Oracle, MySQL, MS SQL, PostgreSQL. They provide for greater scalability and well-developed administration tools.
Launching as a service
Algorius Net Viewer can be launched as a Windows service. The services are launched prior to the user’s login to the system and continue working after their logoff. This makes it possible to perform monitoring 24/7. The service does not require the presence of a user logged in to the system, which is a mandatory security requirement in some cases.