Best Network Management Software - Page 40

Compare the Top Network Management Software as of May 2026 - Page 40

  • 1
    OpenText Network Automation
    Pass audit and compliance requirements easily with proactive policy enforcement and audit and compliance reports. Improve network security by recognizing and fixing security vulnerabilities before they impact your network. Reduce costs by automating time-consuming manual compliance and configuration tasks. Hear how Greenlight group enabled one customer with over 4000 retail outlets to automate their network provisioning and facilitate hardware upgrades with Network Automation, resulting in lower costs and increased business support. Increase network stability and uptime by preventing inconsistencies and misconfigurations. Utilize configuration changes to determine if performance issues are related.
  • 2
    TrueSight Automation for Networks
    Network configuration and automation for better agility, security, and efficiency. Includes automated vulnerability management to analyze vulnerabilities, enhance visibility, and respond to threats across network devices. Leverage integration with vendor and NIST National Vulnerability DB security notifications to identify vulnerabilities, remediate device images, and upgrade devices with zero downtime. Drive fast configuration changes across thousands of network devices with automated roll-back and change tracking. Control device access to view or change settings, deploy pre-configured policies for regulatory standards such as CIS and DISA and remediate non-compliance. Deploy new physical or virtual network devices rapidly with gold-standard configurations to respond to business needs. Browse real-time device configurations to troubleshoot, view status of jobs, or complete a compliance audit.
  • 3
    VPS+

    VPS+

    L7TR

    VPS+ is a powerful virtual layered network protocol IDE or integrated development environment that can be used for: 1) Fast prototyping and deployment of protocol stacks in data network solutions including IoT and VoIP 2) Quality Assurance as a tool to validate network and device quality 3) Emulation of impaired network conditions and devices in a controlled fashion 4) Generation of any type of traffic with full control VPS+ supports several state-of-the-art technologies including: 1) Protocol Emulation: L2, L3, L4 and Application layer protocols. 2) RTC and VoIP signaling via SIP and SIPs. 3) RTC and VoIP media via RTP and SRTP. 4) Emulation and support of media players, media recorders, camera, microphone, text-to-speech (TTS) and automatic speech recognition (ASR). 5) Speech codecs 6) Video codecs 7) Tone generation and detection. 8) IoT sensor and actuator emulation. 9) IoT CoAP and HTTP support. 10) Impairment insertion at all layers; loss and late
  • 4
    CSG Assure
    The majority of operators today continue to test their end-to-end quality inefficiently, based on the old approach of passive monitoring and reactive manual testing in response to an issue. While this approach has been acceptable in the past, evolving customer requirements make the user experience more critical for customer satisfaction, loyalty and revenue. Proactively monitor quality, all the way from your network to the end subscriber, with CSG Assure. CSG Assure helps carriers protect and secure margin through guaranteed CLI delivery and other key quality features. CSG Assure also serves SMS aggregators in need of timely and correct delivery of SMS, and mobile operators who need to provide a flawless user experience for their customers traveling abroad. Let our network operations center take care of 24/7, end-to-end service level monitoring.
  • 5
    Ericsson Automated Network Operations
    Digitalization is undoubtedly one of our times most significant forces of change. New technologies, such as the SDN/NFV, artificial intelligence, 5G, and IoT bring a transformative impact across most businesses and industries. Digitalization plays a dual role as it redefines ways of working and core offerings and at the same time accelerates demand for what the industry produces. As you introduce virtualized and software-defined infrastructure, and prepare to expand business in the digital economy, automation is essential to re-scale and re-purpose your operations. Begin your journey to closed-loop, zero-touch operations and orchestration based on real-time data analytics. Ericsson Automated Network Operations is the portfolio of offerings that lifts the world of telecom OSS to a completely new level.
  • 6
    Cilium

    Cilium

    Cilium

    Cilium is open-source software for providing, securing and observing network connectivity between container workloads, cloud native, and fueled by the revolutionary Kernel technology eBPF. Kubernetes doesn't come with an implementation of Load Balancing. This is usually left as an exercise for your cloud provider or in private cloud environments an exercise for your networking team. Cilium can attract this traffic with BGP and accelerate leveraging XDP and eBPF. Together these technologies provide a very robust and secure implementation of load balancing. Cilium and eBPF operate at the kernel layer. With this level of context, we can make intelligent decisions about how to connect different workloads whether on the same node or between clusters. With eBPF and XDP Cilium enables significant improvements in latency and performance and eliminates the need for Kube-proxy entirely.
  • 7
    Olgor WiFi Analyzer
    Introducing a new way to analyze and optimize your WiFi, turn you android device into WiFi Analyzer! WiFi Analyzer Recommends the best channel and place for your network. WiFi Analyzer gives you the most useful optimization information to help decrease interference and increase connection speed and stability.
  • 8
    farproc WiFi Analyzer
    Wifi Analyzer is a handy tool which helps you to select a better channel for your wireless router. A Wi-Fi channel is a range of radio frequencies that an access point or wireless router uses to communicate with your android phone or other Wi-Fi enabled device. Wi-Fi networks operating on the same channel are forced to share bandwidth. Wi-Fi channels are arranged in an overlapping pattern according to IEEE_802.11, and adjacent channels share a certain range of bandwidth interfering with one another. First, don't choose a channel used by other networks. Second, don't share bandwidth with others.
  • 9
    sparrow-wifi

    sparrow-wifi

    sparrow-wifi

    Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux. In its most comprehensive use cases, sparrow-wifi integrates wifi, software-defined radio (hackrf), advanced bluetooth tools (traditional and Ubertooth), traditional GPS (via gpsd), and drone/rover GPS via mavlink in one solution. Wifi source hunt - Switch from normal to hunt mode to get multiple samples per second and use the telemetry windows to track a wifi source. Bluetooth identification - LE advertisement listening with standard bluetooth, full promiscuous mode in LE and classic bluetooth with Ubertooth.
  • 10
    wavemon

    wavemon

    wavemon

    wavemon is a wireless device monitoring application that allows you to watch signal and noise levels, packet statistics, device configuration and network parameters of your wireless network hardware. It should work (though with varying features) with all devices supported by the Linux kernel.
  • 11
    KisMAC

    KisMAC

    KisMAC

    Free and open-source program helps you collect essential information about surrounding WiFi networks. KisMAC WiFi scanner app can detect SSIDs, shows you the logged in clients, allows you to sketch WiFi maps, and more! Detect and analyze the surrounding wireless networks, even those that are hidden or closed. Know who exactly is using your wireless network: clients’ MAC addresses, IP addresses, and signal strength. The software helps you identify any possible security breaches of your network and decide what needs improvement. A WiFi scanner app like KisMac allows you to find all kind of WiFi networks around you including hidden, cloaked, and closed ones. Check the name of WiFi network, MAC address, WiFi encryption, channel, and signal level. A WiFi sniffer software is aimed to help you analyze network problems, detect possible network intrusions. Such an app can monitor and analyze network utilization (including internal and external clients).
  • 12
    WiFi Explorer

    WiFi Explorer

    Intuitibits

    Use WiFi Explorer to help design and validate wireless networks, identify channel conflicts and overlapping channels, low signal quality, and other issues that may affect your home, office, or enterprise wireless network’s connectivity or performance. Designed for Wi-Fi professionals, WiFi Explorer Pro 3 goes beyond to provide you with a set of expert features to help you analyze and assess home, small office, and enterprise networks. Get an expert overview of the Wi-Fi landscape to quickly assess and find common problems that might affect your Wi-Fi network’s performance or connectivity. Filter and organize scan results by name, physical access point, or vendor to better visualize and troubleshoot networks in any environment.Visualize information from wireless and other non-802.11 energy sources using available integrations to understand better the effects of interference and channel utilization.
  • 13
    NetCut

    NetCut

    Arcai.com

    No network knowledge is required to use this tool, just run and you will see all IP and MAC and devices name in your network, then you can control /change MAC/turn on /off by click on buttons. Also simply leaving it run background can protect you from ARP spoof attack. NetCut is a solution that is helping you to admin your network based only on ARP protocol. It can execute several tasks as list the IP-MAC table in seconds, turning off & on the network on any computer on your LAN including any device like router or switcher. Also, NetCut can protect users from ARP SPOOF attacks. NetCut is very easy to use. You need just one click to protect user computer function. No one in the network can cut you off with ARP spoof technology anymore.
  • 14
    CommView

    CommView

    TamoSoft

    CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 100 supported protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware. The newest CommView version 7.0 introduced SSL/TLS traffic decryption on the fly.
  • 15
    Casa Systems

    Casa Systems

    Casa Systems

    5G technology enables network customization like never before, providing a unique opportunity to build and control the network experience end to end. Private networks, locally hosted or via the cloud, offer a path to data ownership, high levels of security, application customization, and differentiated performance using a variety of radio technologies. As 5G expands, all signs point to a new era of private and hybrid public/private networks. The move is already underway among a growing number of organizations eager to improve security, availability, and reliability. Process sensitive data on-site or securely in the cloud. Prioritize levels of security by application or location. Process data locally, and immediately, to reduce lag and minimize latency for near-real-time functions like computer vision and quality control. Flexibly set quality of service (QoS), compliance, and user experience parameters across the network.
  • 16
    Cisco Private 5G
    The Cisco Private 5G service is simple to get started; just give us a call. The operations are intuitive enough to provision, manage, and troubleshoot within minutes—and it is built on a foundation of trust to securely integrate IoT across your wireless network deployments. Start your journey with a complete assessment and site survey. We will guide you through all the details. Provision, manage, and troubleshoot your 5G and IoT environment on a platform that intuitively integrates with your network. Private 5G is integrated into your existing Wi-Fi and wired network environment. Intuitively operate your private 5G network from anywhere in the world. Collaborate reliably and in real-time across factory floors. Provide delightful customer experience on premises. Provide secure and reliable field worker communications.
  • 17
    AT&T MEC
    With AT&T 5G and MEC bring computing power to the edge of your wireless network to process data in near-real-time. AT&T MEC, powered by AT&T cellular connectivity provides a cost-effective way to enhance your existing private network through intelligent allocation of data assets. Serve your customers and employees in new ways. Experience improved operations, worker safety, and employee productivity by processing data on-site. AT&T MEC is a hardware/software-based solution and when paired with a cloud service provider brings the on-site computing benefit of low-latency to your cloud apps. Take the complexity out of digital transformation. AT&T has partnered with the top System Integrators to enable your applications and cloud service providers within your enterprise to leverage the AT&T MEC.
  • 18
    Verizon On Site 5G
    Providing secure connectivity for today’s operational challenges, while laying the foundation for tomorrow’s emerging capabilities. On Site 5G adds 5G Ultra Wideband (UW) small cells and related capabilities to an On Site LTE deployment. So, enterprises can specify a custom-designed, private network that has the range and scale to match today’s needs and adapt quickly to emerging capabilities. Businesses today face exponential digital acceleration. Artificial intelligence (AI) and machine learning (ML). Real-time analytics. Augmented and virtual reality (AR and VR). These and other data-centric emerging technologies will need a next-gen and scalable connectivity network.
  • 19
    Cyolo

    Cyolo

    Cyolo

    Cyolo provides your global workforce with convenient and secure access to applications, resources, workstations, servers and files, regardless of their location or the device used. Cyolo’s Zero Trust platform is built for easy deployment and scales with minimal effort, supporting a wide range of business needs, growth and expansion. The Cyolo platform grants access to the authorized asset and not to the network itself, allowing you to achieve your security objectives without compromising business needs or user experience. Cyolo’s platform enhances visibility and control by applying granular policies and enabling real-time supervised access and session recording. This gives you a full audit trail that can integrate with your existing SIEM solution. Enable granular policies based on user ID, device ID, application, time and action, user & device location. Enable session recordings for risky users.
  • 20
    DANOS-Vyatta

    DANOS-Vyatta

    IP Infusion

    DANOS-Vyatta edition NOS is aligned with Open Compute Project in delivering a cell site gateway router (CSGR) use case. As mobile service providers make the transition from legacy technologies toward 5G RAN technologies, the CSGR is designed to address the changing needs of operator’s backhaul transport requirements. Based on the DANOS open source software, DANOS-Vyatta edition is a production-ready, carrier grade, feature-rich network operating system (NOS) that meets the demand for functionality and reliability required in the carrier environment. Highlights of DANOS-Vyatta edition The NOS architecture is designed for abstractions with clean APIs between the layers for development agility, troubleshooting and ease of supporting multiple white boxes. The application layer encompasses all the routing and supporting processes along with the standard APIs and familiar CLI interface for operators and management, automation, orchestration systems to interact with the NOS.
  • 21
    HomeNetGuard

    HomeNetGuard

    Slimware Utilities

    HomeNetGuard scans your connected devices for weak passwords and notifies you about login attempts using common/weak credentials on open ports. HomeNetGuard also sends you an alert each time an unknown device connects to your home network. HomeNetGuard allows you to easily change your home network in case you set another connection (e.g VPN, Ethernet). Our smart security application remembers all devices previously connected to your home network and notifies about new ones, so you are always made aware of who is connected to your home network devices. Security scan is launched every 24 hours automatically or by clicking the ‘Scan Now’ button from the Home screen or Device details screen. During the security scan HomeNetGuard identifies potentially vulnerable devices which have open ports or weak passwords, notifies the user about them and provides helpful advice on how to resolve security issues.
  • 22
    Corsha

    Corsha

    Corsha

    APIs power all of your applications and services. Secrets are shared. They are rarely rotated, sometimes never at all. API keys and tokens, even PKI, are getting leaked at an alarming rate. You need clear visibility into and simple control over the machines that are accessing your APIs. Organizations lack visibility into the machines that are leveraging API secrets, and as automation shifts risk from human to machine, the identities of these machines and the secrets they use is more important than ever. Corsha stops API attacks that use stolen or compromised API credentials and helps enterprises protect data and applications that leverage machine to machine (or service to service) API communication.
  • 23
    Jolata

    Jolata

    Jolata

    Jolata can monitor every packet at microsecond granularity and correlate at millisecond intervals. Jolata can process every packet and visualize the results within seconds on its beautiful, easy-to-use UI. Jolata can analyze every packet and flow, at any location across a nationwide network. Customers lack precise visibility into their network, making it difficult to pinpoint the exact source of performance degradation. Jolata provides segment-by-segment metrics, in real-time with actual network traffic. Customers need to evaluate vendor equipment to ensure equipment will meet performance claims. Jolata provides ability to compare equipments with actual traffic loads. Customers need to future-proof their network due to traffic mix change. Jolata enables operators to confirm whether current infrastucture will meet future expectations.
  • 24
    CloudVision
    CloudVision is a modern, multi-domain network management plane built on cloud networking principles for telemetry, analytics, and automation. Designed for use in data centers, wired and wireless campuses, multi-cloud, and routing use-cases, CloudVision provides a consistent operational model across domains, helping enterprises to simplify network operations by breaking down traditional network management silos. CloudVision’s abstraction of the physical network to this broader, network-wide perspective allows for a more efficient approach for several operational and network telemetry capabilities. Turn-key automation with CloudVision Studios for initial and ongoing provisioning, ZTP as-a-Service, configuration management, and network-wide change control, including automated upgrades, network rollback, and network snapshots. Real-time state streaming for network telemetry and analytics - a modern approach to replace legacy polling per device.
  • 25
    ProxySocks5

    ProxySocks5

    ProxySocks5

    We have a unique infrastructure which is monitored 24/7 with an uptime of 99%, and if it does happen to fail we will action immediately and resolve the issues. We offer a big range of products, static IP's which you can choose them from what location you want. Our servers are optimized for performance and powered by 1Gb/s network. When you use our services you won't even notice a difference. Sometimes the kind of support you offer means more than your product and we know that. We integrated support in our dashboard. Our Dedicated, Shared, Residential Proxy and SOCKS5 are not bandwidth limited, you can use them how much you want without any concerns. All our proxies and SOCKS5 are carefully set and monitored in order to give you 100% anonymous and without any sort of ip or dns leaks.
  • 26
    Cisco vManage
    Automate your SD-WAN rollout and expedite new SaaS, IaaS, and security services with a centralized management dashboard. See across your entire network with integrated Cisco ThousandEyes technology. Gain deeper insights, resolve issues faster, and let applications shine. Keep applications performing at their best, secure your data and your enterprise, and connect to the cloud with Cisco SD-WAN Cloud OnRamp. Move your operations from reactive to proactive with greater visibility across your network and the cloud. Fast-track to a SASE architecture with Cisco vManage centralized security and network policies. Upgrade to Cisco IOS XE for advanced SD-WAN capabilities and get up to 30% off software subscriptions and selected routers.
  • 27
    WireX Systems

    WireX Systems

    WireX Systems

    Powerful central hub to streamline the entire investigation and response processes and to accelerate knowledge sharing across team members. The framework includes integration points with the various SIEM vendors to import tickets details (as well as export them back at the end of the process) investigation management system, playbook modeling capabilities, as well as enrichment tools like Sandbox technologies, IP and host reputation, geo-location and other threat feeds. Contextual Capture™ provides the world’s largest organizations the technology foundation to collect and automatically analyze network data for security investigations. Using the WireX Systems Contextual Capture ™ technology you can break through the limitations of full packet capture, store payload level information for periods of months and remove the complexities of sifting through the packets in order to “glue” them back together.
  • 28
    ntopng
    ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap/PF_RING and it has been written in a portable way in order to virtually run on every Unix platform, MacOS and on Windows as well. Produce long-term reports for several network metrics including throughput and L7 application protocols. Monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics (retransmissions, out-of-order packets, packet lost), and bytes and packets transmitted. Discover Layer-7 application protocols (Facebook, YouTube, BitTorrent, etc) by leveraging on nDPI, ntop Deep Packet Inspection (DPI) technology. Behavioral traffic analyses such as lateral movements and periodic traffic detection.
  • 29
    Cisco FlexConnect
    FlexConnect is a wireless solution for branch office and remote office deployments. It enables customers to configure and control access points (AP) in a branch or remote office from the corporate office through a wide area network (WAN) link without deploying a controller in each office. The FlexConnect access points can switch client data traffic locally and perform client authentication locally when their connection to the controller is lost. When they are connected to the controller, they can also send traffic back to the controller. In the connected mode, the FlexConnect access point can also perform local authentication. A FlexConnect AP can, on a per-WLAN basis, either tunnel client data in CAPWAP to the controller (called Central Switching), or have client data egress at the AP’s LAN port (called Local Switching). With Locally Switched WLANs, the AP can tag client traffic in separate VLANs, to segregate the traffic from its management interface.
  • 30
    Cardstream

    Cardstream

    Cardstream

    Cardstream provides white-label payment gateway solutions for software companies, acquirers, payment services providers, independent sales organizations and other value-added service providers. The powerful open payment network manages the whole payment process across different countries. Cardstream is a high-performance Level 1 PCI: DSS-compliant white-label payment processing platform, adding value by offering all major credit card schemes and worldwide currencies. At Cardstream, we offer ample partnership opportunities from co-branding to a full white-label payment gateway.
MongoDB Logo MongoDB