i-Vertix 4.2 - New major release is driving automation and striking the perfect balance between efficiency and agility

Fully Automated Network Discovery and Rule Settings

Introducing i-Vertix 4.2 – The new i-Vertix release introduces advanced automation for network monitoring and operational management. Key features include automated network discovery, device categorization, and real-time performance tracking with customizable templates. Manual configurations are replaced by automated processes like alarm threshold setting and topology mapping, ensuring accuracy and efficiency. 


📢 Automating Network Discovery Processes

From discovery to inventory: Your network, fully mapped

With i-Vertix 4.2, network discovery automation has taken a significant leap forward, making it easier and more efficient to manage your environment. In previous versions, i-Vertix already provided foundational tools for detecting, monitoring, and configuring network devices like servers, switches, and routers. While these features were reliable, they often required manual input to assign categories, set up monitoring templates, and define alarm thresholds. Now these processes are almost entirely automated, ensuring faster, more reliable daily monitoring operations.


The Key Features 

1. 👉 Automated Device Detection and Categorization

As new devices are detected in your network, i-Vertix automatically categorizes them based on pre-defined criteria. No more manual categorization is required — all services are automatically sorted into predefined categories like servers, routers, switches, and end-user devices. Once categorized, the system automatically assigns the relevant monitoring templates to the devices, reducing setup time and minimizing the chances of errors.

When, for example, you introduce a new server into your network, i-Vertix 4.2 recognizes the device as a server, assigns it the correct category, and applies the server-specific monitoring template. This allows you to monitor CPU, RAM, disk space, and network activity without any manual configuration. i-Vertix handles all of this automatically—not just for servers but for all supported devices like switches, routers, and printers. The result: Faster setup, fewer chances for errors, and a comprehensive integration of all services into the monitoring process.

2. 👉 Predefined Monitoring Templates and Automated Assignment Rules

Furthermore templates have evolved beyond their basic function of assigning monitoring settings—they now serve as a dynamic, automated management tool. They are intelligently assigned to newly discovered devices and can be automatically updated based on changes in device configurations or new device categories such as device type, IP range or network protocols.

The Key Benefits:

  1. Automatic Adaptation: New components are automatically detected and assigned relevant monitoring rules without manual intervention.
  2. Tailored Monitoring: Criteria based on specific properties (e.g., interface type, role) ensure only relevant metrics are tracked.
  3. Scalability: This feature is ideal for dynamic environments, like cloud or hybrid setups, where configurations frequently change.
  4. Error Reduction: Standardized, automated rules minimize human error and ensure comprehensive coverage.
  5. Resource Efficiency: Focused monitoring avoids unnecessary performance overhead.


View of the Automated Device Summary and Host Template Assignment

Network synchronization conditions defining the rules for managing interface data within a network discovery process

Template Customization and User-Defined Templates

In addition to automatically applied templates, i-Vertix 4.2 also allows you to create custom templates tailored to the unique needs of your network infrastructure. These templates can be fully customized to monitor specific metrics, define custom thresholds, and set alarm parameters that fit your use case. You can modify existing templates or create new ones from scratch based on specific device categories or applications.

4. 👉 Automated Alarm and Notification Configuration

It doesn’t stop there. Once the automated templates are set and embedded, alarm configurations are automatically linked to the assigned templates. When a device is integrated into the overall monitoring process, the system dynamically configures alarm thresholds based on the device type and the monitoring template applied. This means key metrics such as CPU usage, disk space, and network latency are continuously monitored, with relevant alerts sent when thresholds are exceeded.

Let’s assume you add a web server to your network—i-Vertix will automatically configure alarms for CPU usage and network latency. As soon as CPU usage exceeds 90%, i-Vertix will send an alert to your team, allowing you to take proactive measures before performance starts to degrade.

The effect: You gain instant visibility into potential issues with categorized, prioritized alerts, eliminating the need for lengthy searches. You get proactive monitoring that helps you stay ahead of problems, keeping your network secure and efficient.

Automate Network Configuration with instant alarms, status, and performance insights

5. 👉 Automated Network Topology Mapping with MAC Address Detection & Shadow IT Control

What does this look like from a high-level perspective? That’s part of the new version as well. The automated network discovery process not only simplifies the addition of new services but also provides a comprehensive view of your network’s interconnections through topology mapping.

This new feature autonomously scans your entire network, generates a comprehensive topology map, and analyzes MAC addresses to identify all connected devices—both authorized and unauthorized. It is specifically designed to detect Shadow IT, uncovering unapproved devices and applications within your infrastructure.

The benefit you get:

  1. Instant Network Map:
    You automatically discover and visualize on a high level every device connected to your network. From servers to laptops, all are mapped using their unique MAC addresses, giving you a clear view of your network’s structure and device relationships.

  2. Uncover Shadow IT:
    With MAC address-based identification, this feature helps you spot unauthorized devices that might be silently operating outside your control. You will know exactly who’s on your network, whether you approved them or not!

  3. Gives you Complete Visibility:
    Even with complex or uncertain questions, you have full insight into the relationships within your network. No more guesswork or blind spots. Automatically updated, making network monitoring quicker, seamless, and more accurate.

  4. Cover Security & Compliance:
    Not at lest, by identifying Shadow IT early, you ensure that your network remains secure and that you’re always in line with internal policies and external regulations.

    Automatically mapping all network devices using MAC addresses, spot unauthorized devices, and receive real-time alerts


📌 What else?  A Smarter Resource Status Interface

Working with monitoring tools today means being able to quickly and intuitively configure everything you need within the user interface, making tasks more efficient and less time-consuming. To improve this experience, the GUI in version 4.2. has been significantly enhanced, with upgrades to all filtering and editing options for a easier, more streamlined workflow. For example, the Resource Status interface has been completely revamped. It now doesn’t just highlight assets in Warning or Critical status—it also identifies the root causes, assesses their impact on the network, and provides you with actionable insights so you can respond rapidly and effectively.

Three Views for Full Control

To further enhance this, we’ve improved the views and structure of the interface, making it more intuitive and easier to navigate. Additionally, we’ve introduced two new views, offering flexible options that align with your workflow, ensuring you can work faster and more efficiently, no matter the task at hand.

  • All Resources View: The classic view for an all-in-one look at Hosts and Services.
  • Host View: A focused perspective on Hosts with expandable details for linked Services.
  • Service View: A streamlined option for monitoring service-level performance.

You’ll also enjoy an improved graphical interface for setting filters, with both Basic and Advanced Modes to customize your views.

Status with view by host


Status with view by service

Redesigned Dashboards

Say hello  also to a completely new dashboard experience! We’ve designed an interface that simplifies creating, configuring, and sharing custom dashboards.

The main improvements include:

  • Flexible widget positioning: No more fixed columns—arrange widgets how you like.
  • Responsive design: Dashboards that look great on any device.
  • Streamlined setup: Quickly create and configure widgets with ease.
  • A dashboard library: Manage your dashboards with a clear, tile-based interface.
  • Role-based sharing: Assign admin, editor, or viewer roles for collaboration.
  • Automatic display rotation: Perfect for monitoring walls.

Future updates will include templates, drill-down interactivity, and more exciting features.


📌 Monitoring API Enhancements

Last but not least, i-Vertix now also offers a REST API v2 integration, providing even more flexibility and powerful communication with external applications and tools. This standardized interface allows you to programmatically access and modify monitoring data such as performance metrics, alarms, and configurations.

The i-Vertix REST API v2 integration includes:

  1. Automation: Tasks like retrieving data, adjusting settings, or triggering actions based on alerts can now be fully automated.
  2. Flexibility and Scalability: The API easily integrates with various systems and can scale to handle increasing data volumes and more complex infrastructures.
  3. Real-Time Interaction: i-Vertix enables immediate responses to network issues and faster adjustments to prevent performance degradation.
  4. Easy Integration: The API is cross-platform compatible and can be seamlessly integrated into existing systems and applications.

This means you can now manage and automate:

  • Hosts: Create, delete, update, and assign groups.
  • Host categories and severities: Retrieve and update effortlessly.
  • Services: Add, remove, or modify to match your needs.
  • Templates and commands: Full control over key configurations.
  • Tokens: Create and manage access tokens with ease.

These updates make it even easier to embed i-Vertix in your IT automation workflows.



Ready to Explore i-Vertix 4.2?

With its user-friendly enhancements, advanced automation capabilities, and focus on intuitive network visibility, i-Vertix IT Monitoring 4.2 is here to redefine what IT monitoring can do. But this is just a preview—get in touch to discover all the details and unlock the full power.

Want to see it in action? Contact us at sales@i-vertix.com, and let’s discover how these features can transform your IT operations.

Do you need more info?

We remind you that if you want more information and to get to know i-Vertix solutions better,

you can always contact us at sales@i-vertix.com or, if you prefer, you can call us directly at +39 0471 1430170.

how to find us

NOITechpark – Palazzo D1

Via Ipazia, 2

39100, Bolzano – Italia

sales@i-vertix.com

+39 0471 1430170

Don't miss the last news!

Sign up to our newsletter to always be up to date on promotions, news and much more.

PGUM © 2023.  Credits | Supporto | Condizioni generali