Home Applications Goliath Technologies Announces New Application Availability Monitoring Software!

Goliath Technologies Announces New Application Availability Monitoring Software!

0
Goliath Technologies Announces New Application Availability Monitoring Software!
0

[responsivevoice_button buttontext=”Click to Listen”]

Goliath Technologies is proud to announce the release of their Application Availability Monitor; this progressive technology will generate application/desktop availability and failure alerts, identify the root cause of issues encountered, and troubleshoot and resolve these issues prior to end users being impacted. What’s unique is that it actually attempts to logon exactly as an end user would – manually going click by click to provide authentically verifiable accounts of logon success or failure.

The Goliath Application Availability Monitor has been verified as Citrix Ready to support Citrix XenApp and XenDesktop, but also supports VMware Horizon View or Microsoft RDS. The software facilitates continuous and real-time monitoring of the entire delivery infrastructure, including Citrix NetScaler.

“We are pleased to have Goliath Technologies join us in the Citrix Ready program,” said John Panagulias, Director, Citrix Ready. “Citrix Ready makes it easier for customers to select the most suitable virtualization infrastructure products for their specific needs. By taking part in our program, Goliath Technologies has enabled its customers to obtain the highest quality user experience available today, and the simplest means for making an informed product purchasing selection.”

Regardless of where your applications or users are located, the new technology or “Goliath User” can be deployed to preemptively confirm applications are available and performing before end users are impacted. The key is the “Goliath User”, which automates launching real sessions. Then, the Goliath Application Availability Monitor provides visibility into all applications or desktops being launched and whether they are succeeding, failing, or slow. Then it goes a step further by taking a snapshot of the success or failure of each stage so the administrator has objective evidence of whether the launch was successful or failed. For example, documentation that an issue was a client-side error.

“Monroe Clinic uses Goliath to monitor the availability of Epic for our end users”, said Carrie Blum, Chief Information Officer at Monroe Clinic. “The fact that these two vendors are working together helps ensure access for our physicians and healthcare professionals.”

Going beyond the traditional functionality of logon simulation, Goliath’s Application Availability Monitor sets itself apart with detailed screenshotting, flexible scheduling, preemptive alerting, seamless remediation actions, an unmatched ease of use, and an integration with a Performance Monitoring solution – all of which are at the fingertips of the IT administrator.

About Goliath Technologies

Goliath Technologies provides proactive IT operations software to address the challenges associated with managing a hybrid IT infrastructure. Organizations of all sizes are moving to the Cloud in some form, and our products are purpose built to assist in that transition because IT can manage applications, infrastructure and users regardless of where they are located. Customers use our products to monitor, analyze, troubleshoot and report, so performance issues can be resolved before end users are impacted. Because, IT infrastructure is moving. IT accountability is not. Customers include Walmart, Facebook, UHS, the VA, ADP, Verizon Wireless, and Office Depot.

Categories:
Goliath Technologies Goliath Technologies is the only end to end monitoring, troubleshooting, and remediation solution for Citrix that is truly proactive. There isn’t another product that provides the deep metrics and analysis necessary for organizations to get ahead of issues in the three key areas that most often cause pain for end users: logon initiation, logon duration and session performance. Goliath’s one product combines the ability to simulate logons, drill down into the 33 stages of the logon process, isolate each of the HDX/ICA channels by user, and alert in real time if a performance threshold is breached. This, coupled with historical reports and trending analysis makes the product critical to an IT organization responsible for delivering a seamless end user experience.

Share your view, leave a comment below:

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Amazon WorkSpaces – Automatically configured session screen saver Video

          To meet the corporate security requirements and to improve user experience, a secure screen saver within Amazon WorkSpaces is required only if the endpoint doesn’t have a secure screen saver. This video is from the fine folks at deviceTRUST.

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close