Sunnyvale, California-(September 1, 2020-PRWeb)- Uila Inc., the Application-centric Performance & Cyber Threat Analytics company for the Hybrid Enterprise, today announced its continued innovation in the Application Dependency Mapping solution space, with expanded support for its end-to-end visibility for applications with the ability to visualize the dependency map between the real client IP address running behind a Load Balancer to the connected server. With this visibility for Load Balancers running the X-Forwarded-Proto HTTP Protocol, IT teams have more granular and accurate insight into the dependency chain for the business-critical multi-tier applications.
“In the so-called new normal, with enterprise organizations deploying or further strengthening their business continuity and flexibility measures of their applications, load balancing has become key for efficient and cost-effective scaling up of those applications,” said Chia-chee Kuan, Founder and CEO for Uila. “Being able to get true end-to-end visibility with accurate reporting of the end-user client devices behind a Proxy or Load Balancer is critical for IT teams to quickly isolate the performance hotspots. Uila’s mission is to make problem diagnosis and troubleshooting faster for the already over-burdened IT and under-staffed organizations, making it key to succeed in today’s IT world.”
In addition to the enhanced end-to-end Application Dependency Mapping visibility, the new features of the release include:
- Tracking end-user experience down to the client: With remote working becoming the “new normal”, being able to isolate and troubleshoot end-user performance challenges becomes very important. In this new release, with the end-user experience capability, users can now track down the challenges all the way to the client.
- New Application and Protocol Supported: This release includes support for over 30 new application and protocol classification including Rockwell API, Direct Internet Message Encapsulation (DIME), Moxa, Microsoft SQL Server Analysis Services (MS-SSAS), Distributed File System Replication (DFSR), etc.
- Export Identified Threat list: Uila Cyber Threat Monitoring module users can now export the list of threats that have been identified in their deployment to a CSV file with a single click.
- Many more…
This new capability is available as part of Uila’s solution today and IT teams can put this capability to the test by signing up for a complimentary trial from https://www.uila.com/uila-free-trial .
About Uila
Uila provides Performance and Cyber Threat Analytics in a single pane of glass for the Hybrid Enterprise. With Uila, IT Operations teams can visualize application workload dependencies across cloud platforms, rightsize resources and investments for their workloads and plan workload migration strategies for Hybrid and Multi-Cloud deployments. Uila allows security teams to combat advanced cyber threats by providing immediate and comprehensive application-centric insight into lateral movement-based threats for the Hybrid Enterprise. Businesses use Uila to align themselves with their IT teams and cut time to resolution from days to minutes, keep their application at peak performance and secure at all times and ensure end-user satisfaction to the fullest across cloud boundaries.
Contact Information
Dilip Advani
VP of Marketing
dilip.advani@uila.com
What did Uila win?