Cisco Nexus Dashboard unifies data center management by integrating network monitoring, troubleshooting, orchestration, management and automation into a single platform. It allows businesses to configure, operate, and analyze network infrastructures through a simplified interface. Cisco Nexus Dashboard leverages automation, predictive analytics, and security features to enhance operational efficiency, improve scalability, and reduce time to resolution for critical networking tasks.
N/A
N-able N-central
Score 8.6 out of 10
N/A
MSPs
and IT professionals use N-able™ N-central® to monitor and manage devices and complex
networks remotely. N-central provides
visibility and efficiency as the user's needs scale. N-central can help users:
1. Proactively monitor everything on a customer network—not just servers
and workstations—and troubleshoot.
2. Stay on top of threats with features like MFA, antivirus, integrated endpoint
detection and response, data backup, disk encryption, email protection,…
Nexus Dashboard is a vital tool for Cisco data center Nexus deployments, in my opinion. By utilizing multiple applications in the suite, a business can utilize orchestration, monitor services and traffic, test deployment scenarios, verify upgrade processes and readiness, etc. The capabilities of the system can allow for SAN MDS controls, traditional Nexus NXOS integration, and/or essential ACI tools
N-Able is perfect for an MSP environment. It gives all the standard functionality an IT professional needs out of the box and can be configured to show almost anything required. For example, we have configured a dashboard to show when our backups need attention for each customer. This is achieved by running a small script on repeat via N-Central everyday/evening, and the result gives us information on the dashboard to help us identify exactly what is working and what needs looking into.
Remote tasks - entry-level techs can run basic tasks without physically touching a piece of equipment.
Remote support - remote controlling user devices is easy and saves a lot of time with having to initiate a remote session.
Management of devices, particularly patch management and anti-virus management - you can automatically approve and deploy patches and schedule automatic AV scans.
With the latest version release of Cisco Nexus Dashboard to version 3.0.1 I can say that most of the features have already improved but one of the wishlists that I want for ND is the possibility of extracting lists of Anomaly.
Include older versions of Firmware in the list of choices when doing the firmware upgrade analysis, currently only the recommended is in the list of choices.
If possible, include all the prechecks in the Firmware pre-upgrade analysis same in the script provided by Cisco.
Customer support just points to online guides and I feel they aren't helpful.
During the trial they turn on a lot of features. In my experience, if you play around with the features, they charge you for them. Keep this in mind if you move forward with N-Able - they will charge for "trialed" services.
In my experience, some services that you're being charged for can't be disabled or monitored by you or your team. You only see them on the monthly invoice.
In my opinion, the "Scripting Automation" doesn't provide value. You're either going to be writing your own batch or Powershell to make scripting work.
In my opinion, monitoring software deployments is painful.
The default monitoring template can't be duplicated, edited, or referenced. You'll find that the default monitors in an unusual way and will throw needless recurring alerts into your ticketing system. To avoid this, you need to create a template from scratch which takes many hours to set up.
In my opinion, they're more concerned about a quick buck than customer service. "Buyer beware" company.
Overall we have liked our solar winds experience, however, as our company has grown to support larger enterprises, this product does not have the functionality that our teams need in order to fully support them. The lack of granularity with backups and lack of ability to support nutanix environments is slowly drawing us into the use of other tools.
For the end user, it is relatively easy to use. However, some training and practice is a must because the NSO is not as straightforward as the traditional router CLI. For the administrator, Cisco Network Service Orchestrator (NSO) is just like another program running on the Linux system--there is no big difference.
The user interface is fairly straight forward, with logic groupings for objects. I did not deploy this software, but am one of the daily administrators. Once you get the correct agent package (Which can be a challenge) the integration into AD is not bad. The UI could be more customized, but that may have been a design choice.
Great and effective automation functionalities and the tools on network security management are the best and easy data reports building. Cisco Nexus Dashboard Fabric Controller feature for the network monitoring and easy management of various services and even offers the best analytics and also powerful integration tools for easy data migration.
Every time we have reached out to SolarWinds they are quick to respond, even offering support chat 24/7. Their support team is great and works with you to find solutions to issues. They have taken items we had issues with before and used those to create updates so that the issue is handled better in the future.
The Cisco Nexus Series switches perform admirably in our blended distributed system. We have been dealing with any of these sorts of switches for over 5 years and have been exceptionally happy with their functionality. Several of our other computer networks in our data rooms have proved effective with Cisco equipment. Because of the simplicity of maintenance and the high quality of technical support provided by Cisco representatives, there is a high level of trust in these switches.
Our version of SolarWinds was old and running on old hardware, but it was way easier to setup and do things with. It did not do everything N-able does such as patch management, or at least we didn't have a module to do so if one existed. However it definitely seemed easier to use and possibly more stable.
The platform is very well done, and to date, I have had no complaints about the implementation of the platform and no security issues or vulnerabilities. Cisco in all its product releases new versions to resolve security issues or bugs that appear on the platform, this is a big plus.