Best Network Management Software in the UK - Page 18

Compare the Top Network Management Software in the UK as of February 2026 - Page 18

  • 1
    Lumen Cloud
    Create, run and scale apps at speed with our portfolio of flexible cloud solutions from Lumen Cloud (formerly CenturyLink Cloud). Get powerful, hybrid-ready services with the governance, automation and advanced features needed to accelerate your business. Whether you need elastic infrastructure, cloud-native application services, orchestration or managed solutions, unify it all on our secure platform. High-performance edge apps need instant data response. Lumen® Network Storage delivers storage designed for near-zero latency with cloud-like flexibility, scale and predictable pricing that can easily be spun up wherever your data demands. Give your latency-sensitive, data-intensive applications the performance and speed they need by deploying workloads closer to where they're processed via a grid of edge market nodes designed for ultra-low latency.
  • 2
    HashiCorp Consul
    A multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. Real-time health and location information of all services. Progressive delivery and zero trust security with less overhead. Receive peace of mind that all HCP connections are secured out of the box. Gain insight into service health and performance metrics with built-in visualization directly in the Consul UI or by exporting metrics to a third-party solution. Many modern applications have migrated towards decentralized architectures as opposed to traditional monolithic architectures. This is especially true with microservices. Since applications are composed of many inter-dependent services, there's a need to have a topological view of the services and their dependencies. Furthermore, there is a desire to have insight into health and performance metrics for the different services.
  • 3
    Reblaze

    Reblaze

    Reblaze

    Reblaze is the leading provider of cloud-native web application and API protection, providing a fully managed security platform. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, data center and service mesh), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic. Machine learning provides accurate, adaptive threat detection, while dedicated VPC deployment ensures maximum privacy, performance and protection while minimizing overhead costs. Reblaze customers include Fortune 500 companies and innovative organizations across the globe.
  • 4
    Google Cloud Network Telemetry
    Network Telemetry: VPC flow logs Identify traffic and access patterns that may impose security or operational risks to your organization in near real time. Network Telemetry provides both network and security operations with in-depth, responsive VPC flow logs for Google Cloud networking services. Firewall Logging: VPC Firewall Logs allows users to log firewall access and deny events with the same responsiveness of VPC flow logs. Monitoring at peak performance: VPC flow logs allow you to monitor your deployments with no impact to your system performance. With our unique implementation, enabling VPC flow logs provides you in-depth visibility with no performance overhead. & more
  • 5
    cPacket

    cPacket

    cPacket Networks

    cPacket enables network-aware application performance and security assurance for the distributed hybrid-IT environment. Our single-pane-of-glass analytics power advanced machine learning-based AIOps. With cPacket, you can efficiently manage, secure and future-proof your network enabling digital transformation. The industry’s most complete, yet simple, network visibility stack provides all the components you need to manage your hybrid network across branch, data center and the cloud.
    Starting Price: cVu-V - $21,000/year
  • 6
    ExtremeCloud IQ

    ExtremeCloud IQ

    Extreme Networks

    ExtremeCloud™ IQ - a new breed of cloud management. Streamline wired and wireless network operations and unlock new IT and business insights powered by machine learning. Extreme Networks has invented cloud network management, and has designed the ExtremeCloud™ IQ network management system for cloud, from the ground up. The result is a true next-generation platform for wireless cloud networking, that drastically reduces operational complexity and cost for our customers and partners. ExtremeCloud IQ radically simplifies unified management of wired and Wi-Fi access networks, combining streamlined configuration workflows, real-time client and event monitoring, simplified troubleshooting, versatile RF planner tools, and API integration. The ExtremeCloud IQ platform contains large amounts of valuable data about the devices, clients and applications on the network. While ExtremeCloud IQ uses this information to help you manage your network.
  • 7
    CybrHawk SIEM XDR
    CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks. We also pioneered an integrated approach that provides a wide range of cyber security solutions for organizations of varying size and complexity. Our solutions enable organizations to define their cyber defences to prevent security breaches, detect real-time malicious activity, prioritize and respond quickly to security breaches, and predict emerging threats. CybrHawk XDR provides all the critical tools: IDS, intelligence risk, behavior, machine learning & cloud info. The goal is to provide the entire enterprise with full and total control systems.
  • 8
    Wireshark

    Wireshark

    Wireshark

    Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998. Wireshark® is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It has a rich and powerful feature set and is world’s most popular tool of its kind. It runs on most computing platforms including Windows, macOS, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2.
  • 9
    Panorama9

    Panorama9

    Panorama9

    This is IT monitoring and management done right. Get the full picture and respond quickly to issues. Patch management, remote control, network discovery, all built into one beautiful and easy-to-use solution. Got a minute? That’s how long it takes to deploy and install a powerful and lightweight agent on all of your devices. Within minutes you are provided with detailed information about your IT environment. IT administration is complex but we make your job easier. Automatically discover devices and services in your IT environment. Remote install applications and run scripts. Everything you need in one comprehensive tool. Downtime is unacceptable. Panorama9 foresees problems so you can be proactive instead of reactive. When things do go wrong you are notified instantly and can take action before your users notice anything. Your security is only as strong as the weakest link - we'll tell you where that is.
  • 10
    Cisco Catalyst SD-WAN
    Connect any user to any application, anywhere. Harness integrated multi-cloud capabilities, robust security, and predictive intelligence to let your network handle the heavy lifting. Build your path to a secure access service edge architecture on the solid foundation of Catalyst SD-WAN. Simplify your IT infrastructure and enjoy secure connectivity from anywhere. Built-in automation, multi-cloud capabilities, analytics, predictivity, and security let you focus on your business. Take advantage of multitenancy and multi-region fabric support and flexibility in on-premises or cloud-delivered deployments. Your WAN will handle the growth of your network with ease. Optimize branch and cloud security, communication and collaboration, application performance, and Cloud OnRamp access with this comprehensive suite of services. Enjoy the protection of industry-leading security, and securely connect people everywhere.
  • 11
    BACKUP EAGLE

    BACKUP EAGLE

    Schmitz RZ Consult GmbH

    BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. Different authorizations can be mapped in BACKUP EAGLE® for users defined in AD / LDAP. BACKUP EAGLE® enables the comparison between the application servers in the CMDB and the actually backed up servers.
  • 12
    Barracuda Secure SD-WAN
    Unlike SD-WAN solutions that only provide connectivity—requiring a separate security solution—Barracuda CloudGen Firewall combines a complete set of SD-WAN capabilities with advanced, multi-layered security technologies in a single unit.
  • 13
    LOGalyze

    LOGalyze

    Zuriel

    LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network.
  • 14
    Azure Virtual WAN
    Azure Virtual WAN is a networking service that brings many networking, security, and routing functionalities together to provide a single operational interface. These functionalities include branch connectivity (via connectivity automation from Virtual WAN Partner devices such as SD-WAN or VPN CPE), Site-to-site VPN connectivity, remote user VPN (Point-to-site) connectivity, private (ExpressRoute) connectivity, intra-cloud connectivity (transitive connectivity for virtual networks), VPN ExpressRoute inter-connectivity, routing, Azure Firewall, and encryption for private connectivity.
  • 15
    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets since 2011. Unlike most of other companies, we provide services using our own network of scrubbing centers having sufficient channel and computing capacities to process high volumes of traffic. We do not resell other companies' services claiming them as our own. Today's digital world shows us ever-increasing number of cyber threats. Abreast of the latest trends, the number of DDoS attack types is increasing too. Besides, the attacks themselves become more volumetric, complex and varied. Realizing that, we are constantly modifying traffic scrubbing algorithms, increasing channel capacity, add computational resources to traffic processing centers. It allows us not only provide protection against all known DDoS attack types to our customers, but also detect and block any previously unknown anomalous network activity.
    Starting Price: $30/month
  • 16
    IBM Cloud Internet Services
    Get DDoS protection; global load balancing; and a suite of security, reliability and performance capabilities designed to protect public-facing web content and applications before they reach the cloud. From a high level, a distributed denial-of-service (DDoS) attack is like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. A DDoS attack is a malicious attempt to disrupt the normal traffic of a server, service or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. IBM Cloud Internet Services is a simple set of edge network services for clients looking to secure their internet-facing applications from DDoS attacks, data theft and bot attacks, and for those clients needing to optimize their web applications, or ensure global responsiveness and the ongoing availability of their internet-facing applications.
  • 17
    Trustgrid

    Trustgrid

    Trustgrid

    Trustgrid is the SD-WAN for application providers. The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single platform we allow software providers to manage and support distributed application environments from the cloud to the edge. With the Trustgrid platform you can: • Build cloud to on-premise networks at scale • Manage and support 100s of networks from a single pane of glass • Control on-premise apps and appliances as if they were in the cloud • Run and support Docker containers in any cloud or on-premise • Provide your support teams secure access to edge application environments Simplify connectivity, enhance security, and guarantee network availability with Trustgrid.
  • 18
    Nuage Networks Virtualized Services Platform
    Transform your network and prepare for the era of end to end network automation with the Nuage Networks Virtualized Services Platform (VSP). With VSP you can provide SDN and SD-WAN network automation across networks and clouds of all sizes and architectures from data center private clouds to large enterprise WANs to the largest public clouds in the world. Offered through over 70 Managed Service Provider Partners worldwide, our open, secure and multi-cloud enabled wide area networking solution gives your business all the benefits of SD-WAN, plus the flexibility to choose the approach that best meets your digital transformation needs. The Nuage Networks Virtualized Services Platform (VSP) is the industry leading network automation platform enabling a complete range of SDN, SD-WAN, and cloud solutions. VSP provides advanced network automation across networks and clouds of all sizes and architectures, from datacenter private clouds to large enterprise wide area networks (WANs).
  • 19
    DxOdyssey
    DxOdyssey is lightweight software built on patented technology that enables you to create highly available application-level micro-tunnels across any mix of locations and platforms. And it does so more easily, more securely, and more discreetly than any other solution on the market. Using DxOdyssey puts you on a path to zero trust security and helps networking and security admins secure multi-site & multi-cloud operations. The network perimeter has evolved. And DxOdyssey’s unVPN technology is designed with this in mind. Old VPN and direct link approaches are cumbersome to maintain and open up the entire network to lateral movement. DxOdyssey takes a more secure approach, giving users app-level access rather than network-level access, reducing attack surface. And it does all of this with the most secure and performant approach to create a Software Defined Perimeter (SDP) to grant connectivity to distributed apps and clients running across multiple sites, clouds, and domains.
  • 20
    ONAP

    ONAP

    ONAP

    ONAP is a comprehensive platform for orchestration, management, and automation of network and edge computing services for network operators, cloud providers, and enterprises. Real-time, policy-driven orchestration and automation of physical and virtual network functions enables rapid automation of new services and complete lifecycle management critical for 5G and next-generation networks. The Open Network Automation Platform (ONAP) Project brings together top global carriers and vendors with the goal of allowing end users to automate, design, orchestrate and manage services and virtual functions. ONAP unites two major open networking and orchestration projects, open source ECOMP and the Open Orchestrator Project (OPEN-O), with the mission of creating a unified architecture and implementation and supporting collaboration across the open source community. The ONAP Project is a Linux Foundation project.
  • 21
    BotDetect CAPTCHA
    BotDetect™ CAPTCHA generator is a non-stalking form-security solution that uses a mix of measures, that are easy for humans but hard for bots, to prevent automated form posting. BotDetect also provides an audio Captcha alternative to keep websites accessible to people with impaired vision, enabling you to make WCAG and Section 508 compliant websites. The years of Google’s relentless abuses of their organic and paid search monopolies, and the years of their equally relentless campaign of disinformation and FUD about captchas, took a toll among our former competitors there are only two viable players left. During its first decade, BotDetect was unique among Captcha generators in offering many different Captcha image and sound algos. While each of them was easily comprehensible to humans, the random use of multiple Captcha generation algos made the generated captchas extremely difficult to pass automatically.
  • 22
    Akamai Bot Manager
    Not all bots are created equal ― some are helpful, most are a nuisance, and others harm your business by leading to account takeover and fraud. Because bots are evolving to evade current detection technologies, the risks and costs for organizations are exploding — requiring a new and innovative approach. Bot Manager delivers advanced bot detection to spot and avert the most evasive threats, so you stay ahead of the evolving bot landscape and stop the most sophisticated bots at the edge ― keeping them away from your business. You interact with more than just your customers through your website. Better understand who is coming to your website and what they are trying to do. Then, apply the right policies to control how they can interact with you, what content they can see, and their impacts on your business. Your website has an integral role in your online business strategy.
  • 23
    ForceShield

    ForceShield

    ForceShield

    We are the dynamic application guardian for Web, Mobile, and IoT. ForceShield was established in 2016 by a group of security experts with the goal of changing the game rules in the cybersecurity world. The founders believe that the traditional signature-based security technologies were failing in the face of ever more frequent and sophisticated automated attacks. They developed a proprietary security technology – Dynamic Transformation – that shifted the security approach from reactive to proactive protection while increasing complexity and cost for attackers. ForceShield foresaw that the rapid growth of automated attacks targeting the Internet of Things presented an unprecedented security challenge that their technology and engineering experience could solve. ForceShield creates a complete network defense layer by protecting Web/Mobile applications and IoT devices against bot attacks.
  • 24
    FreeG WiFi

    FreeG WiFi

    FreeG WiFi

    We use cloud technology to manage internet, access, control, guest WiFi and more for businesses so that they can focus on things that matter! We resolve issues across departments like Network security (IT), 100% uptime (Operations) provide Demographics (Marketing) and usage analytics (Strategy) as part of our offering. Providing affordable and reliable internet solutions is our specialty. We provide automated solutions to manage bandwidths and failovers, manage multiple WAN/LAN/VLAN networks. On top of this, we provide our custom firewall to protect locations from outside hacking traffics. We ensure complete security on our network with advanced security tools and encrypted communications. We enable an improved internet experience by providing seamless internet and hassle-free WiFi connectivity. We improve internet efficiency by content filtering, inappropriate websites and torrent blocking, separating a network for guest access, and variable bandwidth control.
  • 25
    Robot Monitor
    Robot Monitor is the most comprehensive, in-depth monitoring solution available for Power Systems environments running IBM i alone or alongside VIOS, AIX, or Linux on Power. Industry-leading technology gives you the highest degree of monitoring for your critical IT infrastructure. By monitoring the performance of your Power servers in real time—including system status, disk, network, availability, application data, and JDBC/ODBC activity—you and your team can proactively respond to issues before they impact user productivity or resources. Highly customizable, modern dashboards provide visibility into all your metrics, elements, and status conditions so you don’t miss a thing. See all your data from a single, central interface to avoid downtime and optimize performance. Not watching the dashboard? Robot Monitor can send out notification when things go wrong.
  • 26
    AMI Data Center Manager
    AMI® Data Center Manager (DCM) is an advanced solution designed to enhance the operational efficiency, reliability, and sustainability of enterprise data centers. By leveraging real-time data collection, predictive analytics, and advanced reporting, DCM allows organizations to make data-driven decisions that optimize energy usage, reduce waste, and improve resource planning. The platform helps manage power, thermal conditions, and system health, providing actionable insights to streamline data center operations, forecast future needs, and monitor the carbon footprint of infrastructure.
  • 27
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 28
    Huawei Cloud Eye

    Huawei Cloud Eye

    Huawei Cloud

    Cloud Eye enables you to visualize metrics of cloud resources and services in real time. Cloud Eye allows you to easily analyze metrics aggregated using different methods; you can view metrics data for up to six months. Cloud Eye sends alarm notifications through emails and text messages or to HTTP/HTTPS endpoints when it detects abnormal metric trends, so you can respond to resource changes in real time. You can derive actionable insights from detailed metrics for your cloud servers. In addition, you can use the Agent, APIs, and SDKs to monitor custom metrics. Displays the monitoring data of the last six months for all cloud services and is enabled by default. Alarm rules can be configured for cloud resources in specific dimensions. Custom and default alarm templates facilitate batch creation of alarm rules.
  • 29
    Nexenta

    Nexenta

    Nexenta

    Eliminate storage silos with Nexenta's open source-driven storage software. Comprehensive storage management in appliance & configurable reference architectures. The features you need and expect from the leader in software-defined storage. Agile storage software allowing you to take advantage of all-flash, hybrid, and all-HDD options. Nexenta storage software is installed in thousands of companies across the world serving a wide variety of workloads and business-critical situations. It powers some of the world’s largest cloud deployments, hosts some of the industry’s best entertainment content, serves vast quantities of government data across multiple continents and ensures that hundreds of thousands of medical records are kept safe and available at the point of service for healthcare companies located worldwide.
  • 30
    Geonode

    Geonode

    Geonode

    Geonode provides Unlimited residential proxies for high-traffic needs, as well as Premium residential proxies with pay-as-you-go option. It offers unlimited proxies, providing access to up to 30 million country-targeting IPs with unlimited data plans available. The platform caters to various proxy needs, including residential, mixed, premium, datacenter, mobile, ISP, and dedicated proxies. Customers rate Geonode as "Excellent" on Trustpilot for its services and reliability. Geonode stands out for its affordable pricing, diverse proxy options, worldwide coverage, flexible session control, and a wide range of proxy speeds. The platform also emphasizes ethical proxy sourcing and serves over 1,000 companies in 120+ countries. Geonode targets a wide set of use cases and helps those interested in web scraping, online anonymity, enhanced gaming experiences, market research, and unthrottled content access. The platform appeals to businesses, investors, Amazon sellers, gamers, m
    Starting Price: $1