WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Technology Internet Security Sunday, April 5, 2026 
Add Press Release News | News Feeds Feeds | Email This News Email


Uila Extends End-to-end Application Dependency Mapping With Insight Behind Load Balancers
Tuesday, September 1, 2020

"True" end-to-end visibility for Multi-tier Applications in an agentless solution

SUNNYVALE, Calif., Sept. 1, 2020 /PRNewswire-PRWeb/ -- Uila Inc., the Application-centric Performance & Cyber Threat Analytics company for the Hybrid Enterprise, today announced its continued innovation in the Application Dependency Mapping solution space, with expanded support for its end-to-end visibility for applications with the ability to visualize the dependency map between the real client IP address running behind a Load Balancer to the connected server. With this visibility for Load Balancers running the X-Forwarded-Proto HTTP Protocol, IT teams have more granular and accurate insight into the dependency chain for the business-critical multi-tier applications.

"In the so-called new normal, with enterprise organizations deploying or further strengthening their business continuity and flexibility measures of their applications, load balancing has become key for efficient and cost-effective scaling up of those applications," said Chia-chee Kuan, Founder and CEO for Uila. "Being able to get true end-to-end visibility with accurate reporting of the end-user client devices behind a Proxy or Load Balancer is critical for IT teams to quickly isolate the performance hotspots. Uila's mission is to make problem diagnosis and troubleshooting faster for the already over-burdened IT and under-staffed organizations, making it key to succeed in today's IT world."

In addition to the enhanced end-to-end Application Dependency Mapping visibility, the new features of the release include:

    --  Tracking end-user experience down to the client: With remote working
        becoming the "new normal", being able to isolate and troubleshoot
        end-user performance challenges becomes very important. In this new
        release, with the end-user experience capability, users can now track
        down the challenges all the way to the client.
    --  New Application and Protocol Supported: This release includes support
        for over 30 new application and protocol classification including
        Rockwell API, Direct Internet Message Encapsulation (DIME), Moxa,
        Microsoft SQL Server Analysis Services (MS-SSAS), Distributed File
        System Replication (DFSR), etc.
    --  Export Identified Threat list: Uila Cyber Threat Monitoring module users
        can now export the list of threats that have been identified in their
        deployment to a CSV file with a single click.
    --  Many more...

This new capability is available as part of Uila's solution today and IT teams can put this capability to the test by signing up for a complimentary trial from https://www.uila.com/uila-free-trial .

About Uila
Uila provides Performance and Cyber Threat Analytics in a single pane of glass for the Hybrid Enterprise. With Uila, IT Operations teams can visualize application workload dependencies across cloud platforms, rightsize resources and investments for their workloads and plan workload migration strategies for Hybrid and Multi-Cloud deployments. Uila allows security teams to combat advanced cyber threats by providing immediate and comprehensive application-centric insight into lateral movement-based threats for the Hybrid Enterprise. Businesses use Uila to align themselves with their IT teams and cut time to resolution from days to minutes, keep their application at peak performance and secure at all times and ensure end-user satisfaction to the fullest across cloud boundaries.

SOURCE Uila Inc.



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav Identiv Completes Thailand Manufacturing Transition, Unlocking Next-Generation Multicomponent Manufacturing for Advanced IoT Solutions | Jan 22, 2026
Nav Global Cyber Alliance Identifies Five Cybersecurity Forces That Defined 2025 - And Will Shape 2026 | Jan 22, 2026
Nav New Report Names States Most Vulnerable to Holiday Scams | Jan 22, 2026
Nav Android Mobile Adware Surges in Second Half of 2025 | Jan 22, 2026
Nav pgEdge Announces pgEdge Agentic AI Toolkit for Postgres | Jan 22, 2026
Nav Guardz 2025 SMB Cybersecurity Report: Nearly 50% of U.S. Small Businesses Have Been Hit by Cyber Attack | Jan 22, 2026
Nav Healthcare Industry Executives are Likely to be Personal Targets of Cybercrime | Jan 22, 2026
Nav Truvista Fiber Acquires SlyTel | Jan 22, 2026
Nav Breakthrough Progress: METiS TechBio Publishes Consecutive Research Findings in Nature Communications and the Journal for ImmunoTherapy of Cancer | Jan 22, 2026
Nav LG ELECTRONICS INTRODUCES 2026 LG GRAM LINEUP ELEVATED BY AEROMINUM | Jan 22, 2026
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News