Power Admin

Sep 20, 2018
Kansas City, KS, USA

Simple Server Monitoring Solutions for even the most complex networks.

PA Server Monitor, our flagship product, is touted as the easiest to install and use server monitoring software. But don't let the easy part fool you. This software ranks right alongside, if not above, its competitors with server monitoring power that IT admins only dream of. It was built by IT administrators who understand first hand what was lacking in other programs, so you can be sure that it was built with you in mind.

PA File Sight is popular among companies that are concerned with HIPAA and PCI compliance, internal corporate compliance, or just want to know who deleted a file. PA File Sight's active file and folder auditing can be an important part of meeting regulatory standards such as Sarbanes-Oxley, ISO and the Payment Card Industry Data Security Standard. With the built in security settings, managers will know if files are tampered with, deleted, or being read by those who shouldn't have access.

PA Storage Monitor is the best solution for monitoring large disk volumes, reporting on the stored content, etc. Using the Satellite Monitoring Service, remote servers are monitored on their local LAN, and then alerts and reporting information are sent back to the central service. The File System Analyzer module in PA Storage Monitor is possibly the most important and powerful of all of the monitors. It catalogs one or more entire disk volumes, including information on directories, files and file owners. This catalog can then be used to generate rich reports.

Power Admin LLC has been building professional grade system monitoring products for many years. Our products are used by Fortune 500 companies, government entities and educational institutions all around the world.

Sep 13, 2018   |  By Zoë Dunning
This week’s topic is monitoring CPU usage using the “\Processor Information(_Total)\% Processor Time” and “\Processor Information(_Total)\% Processor Queue Length” counters.
Sep 11, 2018   |  By Zoë Dunning
Now that the General Data Protection Regulation (GDPR), drawn up by the European Union (EU), has finally come into effect, many of the affected organizations have been scrambling to keep up with the auditing and operational requirements of a compliance regime that’s widely recognized as one of the most str
Aug 28, 2018   |  By Des Nnochiri
Connected or smart homes are becoming more commonplace as people use computer networks to control different aspects of their in-house technology. But how secure are these networks?
Aug 23, 2018   |  By Zoë Dunning
Continuing with last week’s article on Current and Average Disk Queue Length, this week we’ll discuss Pages Per Second and its related counters.
Aug 21, 2018   |  By Des Nnochiri
The term DataOps was coined back in 2015 but only really became a significant force in professional circles during the latter part of 2017. But what is this latest tour de force in software development methodology?
Jul 20, 2018   |  By PowerAdminSupport
See how you can download, install, configure and start using PA File Sight in under 15 minutes. Detect ransomware attacks, users copying files from the server and more. Audit who is accessing files or find out who deleted files on the server.
Jan 6, 2015   |  By PowerAdminSupport
A quick overview and introduction to Power Admin's premiere product, PA Server Monitor.
Jul 25, 2014   |  By PowerAdminSupport
Using the Inventory Alerter monitor in PA Server Monitor can help you monitor for changes in your Anti-Virus software.
Jul 25, 2014   |  By PowerAdminSupport
Is it possible to detect a user copying files?
Jun 3, 2014   |  By PowerAdminSupport
The Event Log Monitor can monitor one or more event logs on the system, including the standard Application, Security and System logs as well as custom event logs. You have complete flexibility in specifying which types of events are important to you and which types you'd like to ignore. In addition, you can manually add dynamic event sources (event sources that register themselves, add an event, and then unregister themselves).