Secret Weapon

Edge is the secret weapon for software vendors seeking to broaden the appeal, flexibility and scalability of their existing management tools. By providing a COTS-based solution that transforms the vendor’s proprietary interface into a flexible, user-centric GUI, Edge helps these vendors seamlessly integrate their products into a customer’s environment.

Traditionally, each vendor develops integration capabilities and user interface based on its own specific product. This approach may be ideal for the vendor’s unique, but relatively narrow, responsibilities. The customer, on the other hand, has broad enterprise-wide responsibilities requiring the use of multiple systems, applications, and tools.

The user needs the vendor’s management capabilities but wants to interface with those capabilities on his or her terms, not the vendor’s.

Edge’s vendor-agnostic approach resolves this dilemma for users and vendors alike. By providing simple and seamless integration of all information assets (not to mention an extensive library of pre-built 3rd party integrations), Edge empowers the user to interface with all management tools in a way that makes sense to him or her.

This provides the vendor the capability to provide a solution to customers who might otherwise disqualify the tool from consideration. GUI flexibility is only part of the Edge advantage. Edge’s solution also provides several additional benefits to the vendor including:

A model for large-scale scalability
Rich, user-centric state-of-the-art visualizations with comprehensive drill-down capabilities
Real-time data, real-time interaction

And the enhanced GUI solution is ready to deploy, right now.


Example 32

Energy: Consumption and generation from households, compared to power generation, wholesale electricity costs, and temperature data

Example 31

An example of the many pre-built visualizations available in AppBoard

Example 30

Stacked Widget example with VMware vCOPS, Netcool OMNIbus, and Splunk Integrations

Example 29

Compliance: Security Incidents and Events, Identity, Vulnerability monitoring and management

Example 28

Missions View: Device Details and KPIs for Network Operations

Example 27

Cyber Security: Using Dynamic Topology to visualize attacker relationships

Example 26

Cyber Security: Vector Heat Map of Attack Sources and Alert Timeline

Example 25

SevOne device data integrated into AppBoard along with OpenStreetMap

Example 24

BMC Software dashboard for Service Assurance. Integration with BMC TrueSight Operations Management

Example 23

Dashboard with MapQuest integration, sparklines, and IBM Tivoli Netcool/OMNIbus proxy

Example 22

Geomapping and treemapping provide Cyber Threat Intelligence

Example 21

Five views of three Tivoli Software integrations in a single dashboard

Example 20

Tivoli Netcool using enPortal

Example 19

Dashboard created for a large manufacturing company

Example 17

Rebranded UI for Visual Network Systems OEM

Example 16

Example Cyber Security Dashboard

Example 15

Top Level Summary from a Cyber Security Dashboard (Light Skin)

Example 14

Top Level Summary from a Cyber Security Dashboard (Dark Skin)

Example 12

Alternate Top Level Cyber Security Dashboard

Example 11

Top Level Summary for an MSP customer

Example 10

A Typical Details View

Example 09

Details panel on a Cyber Security Dashboard

Example 07

Sample details screen from a large enterprise customer

Example 06

Sample top level summary view for a large enterprise customer

Example 02

Example of a simple service view

Example 01

Fedtech's top level summary view.