Upgrade to 5G Mobile Viprinet – Multiple Bundled WAN
Manage user access rights effectively, quickly and simply.
Rapid identification and visualization of AD user management by analysis of user authorizations and access rights.
Easily generate reports to demonstrate compliance with internal regulations.
Automated AD user management and reporting
SolarWinds Access Rights Manager (ARM) is your tool for simplified Active Directory provisioning on your ICT network.
Gaining visibility and control over AD and Azure AD user provisioning (and de-provisioning) is essential for effective data loss prevention. SolarWinds ARM instantly identifies credential misconfigurations and triggers alerts for rapid mitigation, such as account deletion.
AD user management and smooth generation of reports to demonstrate compliance with internal regulations is so much easier with the SolarWinds ARM.
Implement automated user provisioning tools to support SLA's, improve security compliance, and reduce costs.
Create, modify, activate, deactivate and delete automated user access to services and files.
Do I still need the SolarWinds ARM?
Absolutely! SolarWinds ARM is specifically developed for MS AD and Azure AD as that is the backbone of your user and authorization structure.
Understanding the rights structure can be quite a task. Especially if it also needs to be assessed whether your environment meets certain compliance standards (GDPR, PCI, HIPAA).
ARM is the tool to greatly simplify the management of these environments with analyses, quick insights and automation of complex tasks.
Audit and Full Edition
SolarWinds ARM has two license types. There is always a solution that fits your organization's needs.
De basis licentie
Audit Edition plus AD-user management en provisioning
License form based on number of active accounts w/in AD.
This basic ARM license supports you in analyzing, monitoring and auditing AD user access rights.
De ARM Audit Edition is the base license of SolarWinds ARM.
WiFi is a wireless network technology that allows you to connect to other devices or the internet. The wireless connection is created by using radio waves in the 2.4GHz and 5GHz bands.
The use of WiFi is license-free. This means there are no costs associated with the use of WiFi frequencies, unlike, for example, 4G/5G.
Thanks to WiFi, you can easily connect more and more different devices with each other and/or the internet. This allows devices such as laptops, tablets, telephones (VoIP), scanners, cash registers, heating installations, cameras, alarm systems, production machines, digiboards, etc. to communicate quickly and easily.
(By the way, the term WiFi was once coined by a marketing agency.)
VoIP stands for Voice Over Internet Protocol (IP). Loosely translated, this means speech over IP (network connection). It is also known as IP telephony or Internet telephony.
In the past, telephony consisted of national cabling. The challenge was that a copper connection was required from A to B to be able to transport speech between two participants. Due to the great distances, all kinds of intermediate stations and amplifiers were needed.
At one point someone came up with the idea of packing speech into very small 'samples' as data and sending that in IP 'packets' over a network connection. This allows speech to be sent over anything that supports IP, such as WiFi, Ethernet, the Internet, etc.
The big advantage is that VoIP makes use of the existing ICT network, so that one technology can transport data and speech. This means less equipment and less cabling.
In fact, cables are not always necessary, because VoIP also works wirelessly with well-designed WiFi networks (hyperlink). The old-fashioned telephone exchanges are being replaced by software on a server. Simplicity, flexibility and mobility - because it also works for WiFi - are key features of VoIP.
With VoIP, it is very important that the network is properly designed and set up for Quality of Service (QoS) so that the calls are of good quality.
SolarWinds Orion is a monitoring system for heterogeneous ICT environments that can monitor ICT systems brand-independently.
Due to the modular design of SolarWinds Orion, it can monitor your complete ICT infrastructure. Think of the network, servers, applications, databases, storage, security and even application and network performance.
The presentation of the collected data is completely flexible and can be individually arranged in the dashboards as desired.
The SolarWinds API is so extensive that you can read all information automatically and perform actions. SolarWinds Orion can therefore be fully integrated with, for example, CMDB and provisioning systems.
SolarWinds Orion is the definition of complete outside-the-box monitoring.
Please contact our specialized SolarWinds employees for:
Our SolarWinds Orion courses usually have the Network Performance Monitoring (NPM) or Server & Application Monitoring (SAM) module as a basis. This depends on your primary network monitoring objective.
If desired, other SolarWinds modules can be included in the training
The training courses at Procyon Networks are given in Dutch or English. Please let us know your preference.
The SolarWinds training courses are generally given in-company. If you do not have the opportunity or space for this, we will arrange a suitable location in consultation with you.
Feedback from people who first followed the virtual classrooms shows that after our SolarWinds training they have a better overview, more in-depth knowledge and a better sense of context. Concepts of what is possible in SolarWinds fit in much better in relation to each other.
In addition, our SolarWinds training courses are more interactive and our training courses are more tailor-made, even during the training.
SCP stands for SolarWinds Certified Professional. This exam is administered by SolarWinds.
Procyon Networks can certainly help you with your preparation for the SolarWinds SCP exam*. We have developed the SolarWinds Master training especially for this.
*SCP stands SolarWinds Certified Professional
WPA3 is a new and stronger security protocol for modern wireless networks (WiFi). The term stands for WiFi Protected Access.
Thanks to modern encryption methods (Simultanious Authentication of Equeals - SAE), increased security is ensured. This encryption prevents passwords for your WiFi network from being tried through with the help of word lists.
Other security functions are also mandatory, such as PMF (Protected Management Frames). This creates a more secure exchange of data during the logon phase between the client and the WiFi network (controller).
WiFi 6 enables MU-MIMO. It stands for “Multi-User Multiple-Input, Multiple-Output”.
Its predecessor MIMO, which stands for “Multiple-Input, Multiple-Output”, is a technology originally introduced with the WiFi 5 standard. Thanks to MIMO, bandwidth can be split so that devices (clients) can communicate with a WiFi Access Point (AP) simultaneously.
With the MU-MIMO technology, the WiFi channels can be used even more efficiently. In addition, MU-MIMO with WiFi 6 is available in both the downlink and uplink, while with WiFi 5 Wave2, the MU-MIMO was only available in the downlink.
With WiFi 6, a total of 12 streams are available (5GHz = 8 streams, 2.4GHz = 4 streams) compared to WiFi 5 where only 8 streams on only the 5GHz band were available.
OFDMA stands for Orthogonal Frequency Division Multiple Access. This channel access method has been available since WiFi 6 (link) and has a double advantage:
On the one hand, a channel can be divided into even more sub-channels than before. Alternatively, the distribution of one or more subchannels can be assigned to one or more clients.
If a client uses little bandwidth, the remaining bandwidth can be used for other clients. Only WiFi 6 has this channel access method.
The choice of brand and type of hardware is determined by the combination of price and quality. The required quality is determined by the ICT-environment, (the number of) expected users, applications en so much more. Please contact our WiFi specialists, they will help you select the best choice.
Please contact Procyon Networks if you:
With code signing, a software developer uses a certificate to certify all code as 'legitimate from this manufacturer'. So with code signing you normally know for sure that something comes from, for example, SolarWinds.
Code signing certificates must be renewed periodically. The software manufacturer normally uses this certificate for all products it releases.
Because of the depth, intensity and interactive nature of our training courses, between teacher and participants and also between participants themselves, we provide our SolarWinds training courses exclusively in class.
Our training courses are tailor-made for customers with a minimum of three participants (in-company). We do not provide SolarWinds training courses with an open registration.