AOCC WATCHMAN is the most comprehensive integrated IT Application for managing your entire computing infrastructure. Watchman delivers a complete, easy to use Managed IT Application. With sophisticated Patch Management, Software Deployment, Remote Desktop Management, Monitoring, Computer Inventory, Audit and Reporting features, Watchman can automate day to day IT tasks & network maintenance. From simple single location networks to complex multi-location networks with layered firewalls, NAT, local and remote servers and desktops with notebooks out in the field, Watchman can be deployed rapidly, efficiently and effectively. Thus eliminating the need for a high dollar Network Administrator while giving you all the benefits of having one.
Click Here to see our Service Level Programs Available!
PC Inventory / Computer Audit
Complete computer inventory and software inventory. Scheduled LAN audits.
Fully automated and always up-to-date.
PC Remote Control / Remote Support
Access computers remotely from anywhere. Secure and configurable. Access PCs
behind firewallsand NAT without port mapping or infrastructure changes.
Fully automated security patch scan, patch deployment and history with the click of
a mouse. Scalable, secure, configurable and location independent.
Network Monitoring / Alerts
Instant notification for hardware changes, software changes, policy violations, low
disk space, unapproved network access, new devices on the LAN, etc.
Windows Event Monitoring / Alerts
Remotely monitor Windows system event log, application event log and security event
log with user defined alerts.
Software Installation / Update
Complete software installations and software updates across the organization with a
mouse click. Easier and more flexible than SMS and other solutions.
Help Desk / Trouble Ticketing
Complete integrated trouble ticketing. User and administrator create/update. Policy
based notification. Built in online Chat for support personnel and users.
Network Policy Enforcement
Monitor network usage by machine and by application. Define policies and limit network
access to only corporate approved applications.
Comprehensive integrated management and operational reports. Customizable, always
available. View online or export to HTML, Word or Excel.
Encrypted communication using 256-bit RC4 with rolling keys. No open ports. No plain-text
data packets the network. Nothing for attackers to exploit.
One integrated Web based interface. Accessible from anywhere. Flexible setup of
administrators and users, computer groups, permissions and policies.
Fast and Easy Deployment
Deploy in minutes without downtime. Automatic discovery and deployment to all computers,
local or remote. No long training cycle or learning process.