Solution Overview
SolarWinds User Device Tracker
Locate users and devices on your network with User Device Tracker
At A Glance
Manage risks and network access requirements associated with the rise of IP-devices, with SolarWinds® User Device Tracker (UDT). UDT delivers automated user and device tracking along with powerful switch port management capabilities so you can stay in control of who and what is connecting to your network. Quickly find a computer or user, as well as track down lost or rogue devices with a simple search on a username, IP address, hostname, or MAC address. And, if the user or device is no longer connected, historical data shows the last known location. You can even create a whitelist, set up a watch list, and be alerted immediately when specific users or devices connect.
Features Overview
- Quickly locate network devices
- Map and monitor WAPs, switches, and ports
- Manage switch and switch port capacity
- Detect rogue devices and users
- Turn ports on and off remotely
- Unified IT administration dashboard
Key Features
Quickly locate network devices
Track endpoint devices by MAC and IP address on wired and wireless networks.
Immediately locate network devices on your LAN and wireless network, and retrieve switch name, port, port description, VLAN, VRF data, vendor information, all from a single console.
Map and monitor WAPs, switches, and ports
Monitor wireless access points, and switches for performance and errors.
Gain knowledge of port status and usage, response time, packet loss, CPU load, memory utilization and more.
Manage switch and switch port capacity
Always know how switches and ports are being used, and which switches are nearing capacity.
Easily identify switches operating at near capacity and see where you can reclaim unused ports. With out-of-the-box reports you’ll also receive current utilization metrics to help forecast capacity requirements.
Detect rogue devices and users
Trace unauthorized users and rogue devices on the LAN or wireless network.
Receive alerts when suspicious devices connect to your network. Create a device watch list by MAC address, IP address, or host name for both your wired and network devices.
Turn ports on and off remotely
Remotely turn switch ports on and off to improve security, or resolve issues such as IP conflicts.
Remotely shutdown a compromised network device port with point-and-click simplicity. Detect rogue devices and shutdown the port to mitigate security risks or prevent network problems.
Unified IT administration dashboard
UDT is part of the Orion® platform enabling a unified IT administration dashboard.
The UDT dashboard integrates with other SolarWinds management products including Network Performance Monitor, IP Address Manager, Network Configuration Manager, and more.
Resources
SolarWinds Helps Combat Industrial Cyber Threats A leading provider of industrial cyber security solutions that focuses on protecting process industry facilities recommends SolarWinds IT management solutions to combat the growing risk of industrial cyber security threats and vulnerabilities. |
|
Modularity, Scalability, and Reporting Helps Marina Bay Sands When looking for a solution to replace PRTG, Marina Bay Sands sought out a modular and scalable family of products with advanced alerting and reporting that could be easily implemented. |
|
How SolarWinds saves Immofori from staff downtime Sven Meinks believes that if the computer systems running financial services companies AG Services Deutschland and Service Advisors Deutschland were to crash, it would take only two hours before their combined staff of 130 were unable to work or serve their customers. Fortunately Sven has implemented SolarWinds solutions which provide critical pre-emptive warning of possible network problems, and as a result there have been no systems failures. |
Datasheet: User Device Tracker SolarWinds User Device Tracker (UDT) makes it easy to instantly find a device and retrieve the switch name, port, port description, VLAN and more. |
|
SolarWinds Overview Brochure SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use! |
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources. |
ebook: Redefining the network Learn to tame your network now and transform it for the future. |
|
Best Practices for Managing IP Resources The proliferation of IP connected devices have created new challenges for network and systems administrators who manage DHCP, DNS and IP Addresses. In this paper, Brien Posey, freelance technology author, Microsoft MVP and former CIO, discusses best practices and what to look for in a DHCP, DNS and IP address management solution. |
|
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources. |
|
The Stand: SolarWinds on Continuous Monitoring Continuous monitoring is recognized as a powerful tool for identifying and mitigating potential threats to an agency’s infrastructure. But that’s just one aspect of its value, says SolarWinds. Continuous monitoring also can provide information technology professionals with invaluable insight into the health of that infrastructure. It’s all about dual use. |
|
SolarWinds Federal Cybersecurity Survey Summary Report SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the results for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources. |
|
SolarWinds in the Enterprise SolarWinds offers enterprise solutions that are the powerful, scalable, extensible and customizable. |
|
Five Priorities for Network Security: EMA Essential IT Monitoring Series Is your network security management strategy complete? Download this detailed assessment of the top ten priorities that ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) advocates for best practices in network security management. |
|
How to Locate and Quarantine Unidentified Systems on Your Network The challenge of finding rogue devices is complicated by two factors. The first is network complexity and the second is the persistence of forensic data. Clearly this is a problem for mobile or intermittent rouge systems and may make it impossible to perform an analysis days after an incident has occurred. Learn how SolarWinds User Device Tracker delivers automated user and device tracking along with port tracker and powerful switch port management capabilities so you can stay in control of who and what are connecting to your network. |
|
Detecting and Preventing Rogue Devices We live in an IP-connected world. Because your IP network is designed to provide distributed access, it’s porous and intended to be accessible by many types of devices. Therefore the objective of IT administrators is to limit access only to authorized devices. Learn how to manage the risks of rogue detection in this free whitepaper. Take an in-depth look at some of the challenges of efficiently tracking endpoints, keeping your network safe from rogue devices, and then offer best practices for keeping everything safe and running at peak performance. |
|
eBook: 3 Simple Steps to Take Charge of Your Network Access Security To help protect and safely resolve high-risk situations on the network, organizations need to take a proactive stance in controlling who and what is allowed on the network. SolarWinds User Device Tracker (UDT) can be tactically deployed to help you manage the onslaught of mobile devices and keep rogue devices from wreaking havoc on your network. UDT can help you set up and take charge of your network access security in 3 simple steps! Read to learn how. |
- Case Studies
-
SolarWinds Helps Combat Industrial Cyber Threats
A leading provider of industrial cyber security solutions that focuses on protecting process industry facilities recommends SolarWinds IT management solutions to combat the growing risk of industrial cyber security threats and vulnerabilities.Modularity, Scalability, and Reporting Helps Marina Bay Sands
When looking for a solution to replace PRTG, Marina Bay Sands sought out a modular and scalable family of products with advanced alerting and reporting that could be easily implemented.How SolarWinds saves Immofori from staff downtime
Sven Meinks believes that if the computer systems running financial services companies AG Services Deutschland and Service Advisors Deutschland were to crash, it would take only two hours before their combined staff of 130 were unable to work or serve their customers. Fortunately Sven has implemented SolarWinds solutions which provide critical pre-emptive warning of possible network problems, and as a result there have been no systems failures. - Data Sheets
-
Datasheet: User Device Tracker
SolarWinds User Device Tracker (UDT) makes it easy to instantly find a device and retrieve the switch name, port, port description, VLAN and more.SolarWinds Overview Brochure
SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use! - Infographics
-
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources. - White Papers
-
ebook: Redefining the network
Learn to tame your network now and transform it for the future.Best Practices for Managing IP Resources
The proliferation of IP connected devices have created new challenges for network and systems administrators who manage DHCP, DNS and IP Addresses. In this paper, Brien Posey, freelance technology author, Microsoft MVP and former CIO, discusses best practices and what to look for in a DHCP, DNS and IP address management solution.Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.The Stand: SolarWinds on Continuous Monitoring
Continuous monitoring is recognized as a powerful tool for identifying and mitigating potential threats to an agency’s infrastructure. But that’s just one aspect of its value, says SolarWinds. Continuous monitoring also can provide information technology professionals with invaluable insight into the health of that infrastructure. It’s all about dual use.SolarWinds Federal Cybersecurity Survey Summary Report
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the results for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.SolarWinds in the Enterprise
SolarWinds offers enterprise solutions that are the powerful, scalable, extensible and customizable.Five Priorities for Network Security: EMA Essential IT Monitoring Series
Is your network security management strategy complete? Download this detailed assessment of the top ten priorities that ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) advocates for best practices in network security management.How to Locate and Quarantine Unidentified Systems on Your Network
The challenge of finding rogue devices is complicated by two factors. The first is network complexity and the second is the persistence of forensic data. Clearly this is a problem for mobile or intermittent rouge systems and may make it impossible to perform an analysis days after an incident has occurred. Learn how SolarWinds User Device Tracker delivers automated user and device tracking along with port tracker and powerful switch port management capabilities so you can stay in control of who and what are connecting to your network.Detecting and Preventing Rogue Devices
We live in an IP-connected world. Because your IP network is designed to provide distributed access, it’s porous and intended to be accessible by many types of devices. Therefore the objective of IT administrators is to limit access only to authorized devices. Learn how to manage the risks of rogue detection in this free whitepaper. Take an in-depth look at some of the challenges of efficiently tracking endpoints, keeping your network safe from rogue devices, and then offer best practices for keeping everything safe and running at peak performance.eBook: 3 Simple Steps to Take Charge of Your Network Access Security
To help protect and safely resolve high-risk situations on the network, organizations need to take a proactive stance in controlling who and what is allowed on the network. SolarWinds User Device Tracker (UDT) can be tactically deployed to help you manage the onslaught of mobile devices and keep rogue devices from wreaking havoc on your network. UDT can help you set up and take charge of your network access security in 3 simple steps! Read to learn how.