{"id":427547,"date":"2023-10-16T11:13:44","date_gmt":"2023-10-16T09:13:44","guid":{"rendered":"https:\/\/glpi-project.org\/?p=427547"},"modified":"2025-06-16T13:17:12","modified_gmt":"2025-06-16T12:17:12","slug":"neteye-and-glpi-at-the-it-sa-2023-in-nuremberg-a-holistic-approach-to-it-systems-management","status":"publish","type":"post","link":"https:\/\/www.glpi-project.org\/en\/neteye-and-glpi-at-the-it-sa-2023-in-nuremberg-a-holistic-approach-to-it-systems-management\/","title":{"rendered":"NetEye and GLPI at the it-sa 2023 in Nuremberg: A holistic Approach to IT Systems Management"},"content":{"rendered":"<blockquote class=\"wp-block-quote\"><p>Over the last three days, it-sa Nuremberg brought together the main players of the IT security industry, with approximately 800 exhibitors showcasing their expertise. At the event, GLPI, in collaboration with our partners from <a href=\"https:\/\/www.wuerth-phoenix.com\/en\/\" target=\"_blank\" rel=\"noopener\"><strong>W\u00fcrth Phoenix<\/strong><\/a> and <strong>Gravitate<\/strong>, took the spotlight as they presented their comprehensive monitoring solution, <strong>NetEye<\/strong>. <span style=\"font-size: 14px\">This presentation captivated the attention of visitors, providing them with profound insights into how <strong>NetEye<\/strong> seamlessly integrates monitoring and surveillance across all components, including Asset Management, into a centralized solution.\u00a0 <em>\"At the end of the day, the primary goal for IT professionals remains constant: ensuring uninterrupted application availability for end-users. Downtimes are simply not an option; they underpin the very core of all business processes,\"<\/em> eloquently summarizes Claus Huber, CEO of Gravitate, as he encapsulates the challenges faced by our valued customers.<\/span><\/p><\/blockquote>\n<p class=\"has-medium-font-size\"><span style=\"text-decoration: underline\"><strong>NetEye, SIEM, and SOC \u2013 Seamless Synergy<\/strong><\/span><\/p>\n<p>The visitors showcase featured the application of <strong>NetEye<\/strong> with SIEM technology within Security Operations Centers (SOCs), alongside integrated asset management enhancements enabled by <strong>GLPI<\/strong>.\u00a0 \"We resonated with a multitude of visitors through our presentation of <strong>NetEye<\/strong> and <strong>GLPI<\/strong>,\" notes Georg Kostner, Business Unit Manager and NetEye Mastermind at <strong>W\u00fcrth Phoenix<\/strong>. <em>\"The positive response at our booth and the subsequent follow-up appointments further reinforce our commitment to in-house development, close partnerships, and platform expansion,\"<\/em> Kostner emphasizes.<\/p>\n<p class=\"has-medium-font-size\"><span style=\"text-decoration: underline\"><strong>20 Years of Development with Visions that Became Reality<\/strong><\/span><\/p>\n<p>Two decades ago, <a href=\"https:\/\/www.wuerth-phoenix.com\/en\/\" target=\"_blank\" rel=\"noopener\"><strong>W\u00fcrth Phoenix<\/strong> <\/a>embarked on a journey to develop a holistic solution for IT monitoring, including <strong>GLPI<\/strong>. This endeavor was inspired by the realization, gleaned from numerous Systems Management and Security projects, that existing singular solutions on the market catered to highly specific requirements, leaving a critical gap in comprehensive monitoring. No solution could seamlessly amalgamate all facets of information security and business-critical data into monitoring, thereby creating a real-time depiction of IT impact chains.<\/p>\n<p class=\"has-medium-font-size\"><span style=\"text-decoration: underline\"><strong>Cyberattacks are on the Rise \u2013 Path Attack Management with XM Cyber<\/strong><\/span><\/p>\n<p>Another highlight at our partners booth was the unveiling of XM Cyber's Path Management, harnessing the power of artificial intelligence. As an XM Cyber partner, <strong>Gravitate<\/strong> showed how Attack Management adopts the attacker's perspective, scrutinizing an entire company's IT landscape through the eyes of an intruder. It seeks to identify the quickest and easiest routes to access the 'crown jewels,' the most precious information within the organization. The analysis results inform the most efficient security enhancement measures. The considerable interest in XM Cyber is no coincidence. Data theft and digital espionage inflict an annual cost of \u20ac206 billion on the German economy, with the actual figure likely being much higher due to underreporting. Moreover, the threat of cyberattacks fueled by artificial intelligence has significantly intensified in recent times. XM Cyber addresses this critical gap in cybersecurity.<\/p>\n<hr \/>\n<h4 class=\"wp-block-quote\">Together with our partners from <a href=\"https:\/\/www.wuerth-phoenix.com\/en\/\" target=\"_blank\" rel=\"noopener\"><strong>W\u00fcrth Phoenix<\/strong><\/a> an <strong>GLPI<\/strong> we look forward to your visit on October 22-24, 2024, at Hall 7, Booth 547. See you next year!!<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Over the last three days, it-sa Nuremberg brought together the main players of the IT security industry, with approximately 800 exhibitors showcasing their expertise. At the event, GLPI, in collaboration with our partners from W\u00fcrth Phoenix and Gravitate, took the spotlight as they presented their comprehensive monitoring solution, NetEye. This presentation captivated the attention of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[154],"tags":[7,9,10],"class_list":["post-427547","post","type-post","status-publish","format-standard","hentry","category-evenements","tag-glpi","tag-partners","tag-partnership"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/posts\/427547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/comments?post=427547"}],"version-history":[{"count":1,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/posts\/427547\/revisions"}],"predecessor-version":[{"id":436315,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/posts\/427547\/revisions\/436315"}],"wp:attachment":[{"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/media?parent=427547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/categories?post=427547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glpi-project.org\/en\/wp-json\/wp\/v2\/tags?post=427547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}