Alert Management

Be proactive, not reactive


The TCPWave distributed discovery devices report the discovery metrics to the central TCPWave DDI controller. On the DDI controller, a set of predefined alerting conditions are defined. During the discovery process, the DDI controller automatically generates an alert to fault management if anomalies are found. Valuable data lakes are automatically populated with information identifying Cisco IOS, Arista EOS, Juniper Junos, Brocade, Fortinet, and TCPWave versions that have been sunset.

In addition, the discovery feature assists customers in identifying the switch port utilization metrics. A DDI administrator can turn off a switch port automatically when the threat intelligence detects any strain of ransomware or malware from the endpoint. This feature also assists in identifying overlapping address spaces and alerting the central command center in a timely fashion so that misconfigurations can be detected and prevented before they snowball into the widespread outage.



An alert is generated on the discovery events page when the discovery operation encounters conflicting subnets.



Network engineers can take the necessary actions for the tasks at hand.



This integrated view delivers the business benefits of greater agility, reduced risk, and lowered operational costs.

TCPWave IPAM alarm subscriptions notifies you about critical or warning alerts based on the monitoring service category and component (DNS, DHCP, IPAM, Network, etc.) through the following messaging platforms when any of the metrics crosses a threshold.

Featured Resources

TCPWave Messaging: Fast, Reliable, and Secure

Learn more to understand how TCPWave leverages one of the best-in-class messaging systems to handle data transmission.

Read More
TCPWave DDI - Messaging Apps Subscription for Alerts

Learn more about TCPWave IPAM alarm subscription to get real time notifications.

Read More
TCPWave DDI - Distributed Discovery

With TCPWave DDI - Quickly discover and audit the network infrastructure to improve the enterprise security posture.

Read More