Ipswitch WhatsUp Gold v14 review: Premium Edition

Ipswitch’s WhatsUp Gold v14 crams yet more network monitoring features into an already well endowed product. It looks good value but is it still easy to use? We review it to find out.

Ipswitch WhatsUpGold v14
Price
£386

WhatsUp Gold has always been Ipswitch's flagship product and this latest version (v14) of its network monitoring software manages to pack in even more new features.

Ipswitch1

The new Welcome Centre greets you and provides quick access to the WhatsUp Gold Assistant.

Ipswitch still offers the standard version as an affordable option for SMBs looking for device discovery, mapping, monitoring, alerting and reporting. The Premium Edition on review adds support for WMI to deliver application as well as device monitoring. This enables you to configure monitors for apps including SQL Server and Exchange and automate actions such as restarting failed services.

Installation is a swift affair, and on loading the main program you'll meet the first new feature in v14. The Welcome Centre provides a tour of the key features, links to the WhatsUp Gold community and, more importantly, access to the new Assistant.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The Assistant makes light work of device discovery and offers a number of methods for scanning your network. After providing the IP address of an SNMP enabled router and a read community name you can use SmartScan, which queries each device's SNMP MIB. Alternatively, you can scan an IP address range and a Windows network or import a hosts file.

Ipswitch2

The improved Discovery routine made a good job of identifying the lab's servers, workstations and network devices.

It made a fairly decent stab at identifying the systems on our network and got very few wrong. We had one Windows Vista system with an APC UPS attached via USB and for some reason the scan identified the system itself as a UPS. We could change the properties of this system but were surprised to find no entry for a Windows Vista workstation.

However, the scan successfully spotted that a large number of our test clients were VMs on two VMware ESX Server 4 systems and it also saw that some of them were running Windows 7 as well as XP, Server 2003 and Server 2008.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/business/business-strategy/354304/ex-apple-cpu-architect-accuses-the-firm-of-invading-privacy
Business strategy

Ex-Apple CPU architect accuses the firm of invading privacy

10 Dec 2019
Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019