Heroix now provides access to IT performance data for managers and executives through new risk management and security capabilities for Heroix Longitude.
This new capability enables rapid management access to information on IT performance, safeguards the software's monitoring and alert settings, and improves IT team productivity.
Because managers need information on IT infrastructure and application health, Longitude's new look, but don't touch feature allows them to quickly see what is happening through their own read-only role in the Heroix monitoring solution. Longitude is an easy-to-use, affordable monitoring solution that companies use to track the health of their physical and virtual IT infrastructure: multiple operating systems, web servers, databases, messaging and networks.
Heroix added the read-only access role to Longitude to improve an organization's ability to share vital IT system and application information with more individuals and groups throughout the company, while reducing operational risks that could arise if the software's settings were inappropriately changed.
"As IT has been recognized as the engine that runs all companies, more people in different roles want to understand and be aware of how IT systems and applications are performing," noted Rick Lane, CEO, Heroix. "However, not everyone in the company needs the ability to change what is being monitored or when alerts should occur."
The look, but don't touch capability provides easy-to-access information to users granted entry into Longitude, while eliminating the risk of them making changes to the monitoring software that could have business-stopping implications.
"If problems occur after a user with inappropriate access turned off monitoring or alerts, the people who could remedy the problem quickly wouldn't even know about it, leading to significant operational and financial consequences," Lane explained. "For example, if a major retailer's web site was experiencing performance problems and no one at the company knew, hundreds of thousands of dollars in sales could be lost in just a few short hours."
Those with a read-only role are able to view critical alerts and dashboards that show performance and availability, as well as create and run their own reports or view reports that have been automatically generated for their consumption. The read-only role helps administrators grant easy access to Longitude's reports for business managers and other executives.
All editions of Heroix Longitude are available on tablets and smartphones, providing on-the-go access to information about critical applications, servers, networks, and virtualized 24x7 environments. Heroix designed its own mobile support capability specifically for Longitude, insuring that it avoids common third-party app problems such as instability or poor coding.
Longitude 9.0 is available now.
The Latest
An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...