Analytics & Monitoring

Displaying 11 of 11 results

Free uberAgent training is now available on Pluralsight

uberAgent is our User Experience Monitoring (UXM) and Endpoint Security Analytics (ESA) tool that provides in-depth visibility into user experience,…

Improve user experiences and reliability with new expanded uberAgent entitlements

IT organizations face ever-increasing demands from their business and users. Over the past several years, 53 percent of IT leaders…

Maximize Citrix Performance and Security with the Power of uberAgent 7.3

We’re excited to announce the release of uberAgent 7.3! This version is packed with improvements based on what customers like…

Investing in more visibility for Local Host Cache with Citrix Monitor

This blog was co-authored by Isaac Stasevich, Senior Product Manager for Resiliency at Cloud Software Group. Local Host Cache (LHC)…

uberAgent in the helpdesk: Part 4 – the Security Score

The previous posts in this series showed how uberAgent UXM enables help desk engineers to improve the digital experiences of…

uberAgent in the helpdesk: Part 3 – the Score Dashboards

Welcome back to our practical blog post series, where we’re learning more about using the uberAgent products in helpdesk scenarios.…

uberAgent in the helpdesk: Part 2 – the Experience Score Overview

Welcome back to our practical blog post series about using uberAgent products in helpdesk scenarios. In this second article, we…

uberAgent in the helpdesk: Part 1 – the helpdesk app

We’re often asked how uberAgent can be used in helpdesk scenarios. We want to address this question with a series…

Splunk data volume reduction techniques

As a product built from day one with Splunk as the primary backend platform, uberAgent is heavily optimized to generate…

How uberAgent ESA complements EDR products

Should you wear both belt and suspenders? When it comes to IT security, the answer is most likely yes. No…

uAQL: uberAgent’s security threat detection query language

uberAgent ESA, our endpoint security analytics product, comes with a powerful Threat Detection Engine (TDE). TDE makes use of rules…