Alternatives to FlowCoder
Compare FlowCoder alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FlowCoder in 2025. Compare features, ratings, user reviews, pricing, and more from FlowCoder competitors and alternatives in order to make an informed decision for your business.
-
1
Elecard Boro
Elecard
Video quality control tool. Software solution for UDP, RTP, HTTP and HLS streams quality control and measurement of QoS and QoE parameters in all segments of distributed networks. Probes operating 24/7. You have total control over the network. Less than 30 minutes to begin monitoring your streams. Save on specific equipment, reduction of network maintenance expenses. Friendly data layout and all the advantages of web interface. Stable customer base thank to continuous quality control and quick fixation of detected violations. Available as a cloud service or stand-alone solution for local networks. Elecard Boro software probes monitor packet loss, video freeze, SCTE35 labels for UDP/HLS/DASH/RTP/HTTP. The solution provides fast and cost-effective monitoring of content delivery networks and ensures localization of the most common violations.Starting Price: $175 per month -
2
MyBoardPacket
M29 Technology and Design
Since 2001, thousands of happy customers agree that MyBoardPacket is secure, simple and easy to use. An online board meeting management tool that provides document management, online voting, online discussions, and more. MyBoardPacket.com enables you to deploy a board portal which is so flexible it can also be used as an extranet or intranet solution. MyBoardPacket board portal is so easy to use, your board members can be up and running in minutes without the need for training. And your administrators can easily upload all of the board packet files in just moments for each board meeting. The intuitively easy user interface allows everyone to get up and running in minutes. Contact us today to schedule a quick walk-through with a private live demonstration. MyBoardPacket.com is a practical board portal, that allows businesses of all sizes to securely distribute, organize and share critical board room data. -
3
LiveWire
BlueCat
LiveWire is a high-performance network packet-capture and forensic-analysis platform that captures and stores detailed packet data across physical, virtual, on-premises, and cloud networks. It is designed to give Network-Ops and Security teams deep visibility into network traffic, from data centers to SD-WAN edges, remote sites, and cloud environments, filling in the blind spots left by telemetry-only monitoring. LiveWire delivers real-time packet capture that can be selectively stored and analyzed with advanced workflows, visualizations, and correlation tools; it can automatically detect encrypted traffic and store only what’s needed (headers or metadata), saving disk space while preserving forensics data. It supports “intelligent packet capture,” converting packet-level data into enriched flow-based metadata (called LiveFlow), which can feed into the companion monitoring platform BlueCat LiveNX. -
4
WireEdit
Omnipacket
WireEdit allows WYSIWYG editing of Pcap data in situ for any network stack at any stack layer while preserving the binary integrity of the data. Data editing is done in a break-proof manner with the lengths, checksums, offsets, and other inter and intra-packet dependencies recalculated on-the-fly for all affected packets and protocol layers. One could think of WireEdit as a Microsoft Word™ for captured network data. All other packet editing tools are very limited in their ability to edit binary encoded stack layers above TCP/UDP without breaking packets' integrity. WireEdit is a full-stack packet editor by design. It doesn't break packets' integrity at any layer. WireEdit with IETF protocols support is $95/day (24 hours). Other packages/durations as well as site licenses are available. WireEdit is a proprietary, enterprise level captured network traffic editor. Full support for all 4G/LTE 3GPP Mobile Core protocols and interfaces including SS7, RANAP, DIAMETER, and VoLTE.Starting Price: $95 per day -
5
Flowcode
Flowcode
Flowcode is the offline to online company, building direct connections for brands and consumers. By unifying data-driven design with the latest in QR technology, Flowcode enables contactless connection with speed, security and ease. Privacy compliant, ultra-fast scanning, and designed with intention, Flowcode is the number one trusted QR provider. Our companion product, Flowpage, organizes your digital footprint in one mobile-first landing page, creating a seamless experience to more deeply connect with audiences while tracking real-time analytics. Paired together, our tech allows consumers and creators to connect the real world to the online world instantly and magically. Flowcode is currently used by more than 70% of the Fortune 500. Flowcode offers an API which allows for QR code creation and measurement integrated into any workflow or application.Starting Price: Free -
6
Intel Deep Insight
Intel Corporation
Intel® Deep Insight Network Analytics Software is the first solution to satisfy the four ground truths for every packet in the network and server. Observe every packet from every switch and router in the network and server, in band at line rate. Run on commodity servers and interpret, analyze, and pinpoint—in real time—the many conditions that impede packet flow. See the path and latency for every packet in your network and server. Enable an intelligent, flexible triggering mechanism to detect and report events in real time, with nanosecond accuracy. Identify every packet drop to know when, why, where, and to whom it happened. Today’s sampling and statistics cannot characterize all network and server performance anomalies. Intel® Deep Insight Network Analytics Software is the world’s first monitoring system that provides full visibility into every packet in the network and server. -
7
Snort
Cisco
Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. Snort can be deployed inline to stop these packets, as well. Snort has three primary uses: As a packet sniffer like tcpdump, as a packet logger — which is useful for network traffic debugging, or it can be used as a full-blown network intrusion prevention system. Snort can be downloaded and configured for personal and business use alike. Once downloaded and configured, Snort rules are distributed in two sets: The “Community Ruleset” and the “Snort Subscriber Ruleset.” The Snort Subscriber Ruleset is developed, tested, and approved by Cisco Talos. Subscribers to the Snort Subscriber Ruleset will receive the ruleset in real-time as they are released to Cisco customers. -
8
ntopng
NTOP
ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap/PF_RING and it has been written in a portable way in order to virtually run on every Unix platform, MacOS and on Windows as well. Produce long-term reports for several network metrics including throughput and L7 application protocols. Monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics (retransmissions, out-of-order packets, packet lost), and bytes and packets transmitted. Discover Layer-7 application protocols (Facebook, YouTube, BitTorrent, etc) by leveraging on nDPI, ntop Deep Packet Inspection (DPI) technology. Behavioral traffic analyses such as lateral movements and periodic traffic detection. -
9
Capsa
Colasoft
Capsa, a portable network performance analysis and diagnostics tool, provides tremendously powerful and comprehensive packet capture and analysis solution with an easy to use interface allowing both veteran and novice users the ability to protect and monitor networks in a critical business environment. Capsa aids in keeping you assessed of threats that may cause significant business outage. Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehensive high-level window view of entire network, gives quick insight to network administrators or network engineers allowing them to rapidly pinpoint and resolve application problems. With the most user-friendly interface and the most powerful data packet capture and analysis engine in the industry, Capsa is a necessary tool for network monitoring. -
10
CommView
TamoSoft
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 100 supported protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware. The newest CommView version 7.0 introduced SSL/TLS traffic decryption on the fly. -
11
tcpdump
tcpdump
Tcpdump is a powerful command-line packet analyzer that allows users to display the contents of network packets transmitted or received over a network to which the computer is attached. It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.Starting Price: Free -
12
StreamGroomer
Streamcore
StreamGroomers monitor and regulate the traffic across Wide Area Networks (WAN). StreamGroomers integrate transparently, regardless of network architecture, between the LAN and WAN access router and are administered via an out-of-band management network. Continuous service is ensured using high-availability architectures. StreamGroomers analyze network traffic at wire speed, collecting comprehensive measurements and packet data at distributed points in your network. Indicators are calculated from this data in real-time to show current network performance. This data is aggregated and sent to a central repository with minimal network overhead, enabling fast drill down analysis and troubleshooting as well as providing detailed records for forensics. The StreamGroomer’s Deep Packet Inspection analyzes Layer 2-7 packet data to identify applications and user sessions against a predefined catalog of 400+ services. -
13
Corvil Analytics
Pico
The Intelligence Hub is a real-time trade analytics solution that models and correlates client trading behavior, plant performance and venue counterparty execution to enable proactive business management and operations. Corvil is an open data system providing API access to all analytics, trading and market data messages and the underlying packets. The Streaming Data API supports a growing library of Corvil Connectors enabling streaming Corvil data directly from the network packets into your chosen big data solution. Corvil Center provides a single point of access to all analytics and reporting with a couple of clicks to visualize any of the petabytes of granular packet data captured by Corvil. Corvil Instrumentation offers superior price/performance packet analysis and capture Appliances, software defined packet sniffers (Corvil Sensor) to extend the reach to virtual and cloud environments, and the Corvil AppAgent for internal multi-hop software instrumentation. -
14
PacketStream
PacketStream
PacketStream's multi-hop proxy tunnel enables businesses automation tooling to access more reliable data and unlock geolocation-restricted content. Access the network with your existing data-collection tooling, or use one of PacketStream's marketplace apps. Packeters share their unutilized bandwidth with the PacketStream network and get paid for participating. The PacketStream service measures the amount of bandwidth shared and credits your account accordingly. Anonymously view landing pages from residential IPs without being cloaked to ensure they don't contain malware or improper advertising. PacketStream's exclusive residential IP network helps your business grow faster with less resources. Business automation tooling gives your company greater insights into what competitors are doing, expands your brand's reach, and ensures your brand's safety around the web.Starting Price: $0.10 per GB -
15
Nping
Nmap
Nping is an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing users full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping's novel echo mode lets users see how packets change in transit between the source and destination hosts. That's a great way to understand firewall rules, detect packet corruption, and more. -
16
Airtool 2
Intuitibits
Capture Wi-Fi traffic using your Mac’s adapter or Zigbee and BLE traffic using compatible USB dongles and automatically launch Wireshark for post-processing and analysis. Offers several flexible configuration options to accommodate the capture requirements of any packet analysis and troubleshooting task. Integrates with popular cloud services such as CloudShark and Packets to automatically upload, analyze, or share your captures. Capturing Wi-Fi traffic is an essential task of protocol analysis. Whether you’re trying to resolve Wi-Fi connectivity, roaming or configuration problems, analyzing your Wi-Fi network’s performance, you will certainly need to perform packet captures. Airtool lets you capture Wi-Fi packets in the easiest way possible. With advanced features such as automatic packet slicing and capture file limits and rotation, Airtool is a must-have tool for every wireless LAN professional.Starting Price: $36.61 one-time payment -
17
flannel
Red Hat
flannel is a virtual networking layer designed specifically for containers. OpenShift Container Platform can use it for networking containers instead of the default software-defined networking (SDN) components. This is useful if running OpenShift Container Platform within a cloud provider platform that also relies on SDN, such as OpenStack, and you want to avoid encapsulating packets twice through both platforms. Each flanneld agent provides this infomation to a centralized etcd store so other agents on hosts can route packets to other containers within the flannel network. The following diagram illustrates the architecture and data flow from one container to another using a flannel network. -
18
Jolata
Jolata
Jolata can monitor every packet at microsecond granularity and correlate at millisecond intervals. Jolata can process every packet and visualize the results within seconds on its beautiful, easy-to-use UI. Jolata can analyze every packet and flow, at any location across a nationwide network. Customers lack precise visibility into their network, making it difficult to pinpoint the exact source of performance degradation. Jolata provides segment-by-segment metrics, in real-time with actual network traffic. Customers need to evaluate vendor equipment to ensure equipment will meet performance claims. Jolata provides ability to compare equipments with actual traffic loads. Customers need to future-proof their network due to traffic mix change. Jolata enables operators to confirm whether current infrastucture will meet future expectations. -
19
WireX Systems
WireX Systems
Powerful central hub to streamline the entire investigation and response processes and to accelerate knowledge sharing across team members. The framework includes integration points with the various SIEM vendors to import tickets details (as well as export them back at the end of the process) investigation management system, playbook modeling capabilities, as well as enrichment tools like Sandbox technologies, IP and host reputation, geo-location and other threat feeds. Contextual Capture™ provides the world’s largest organizations the technology foundation to collect and automatically analyze network data for security investigations. Using the WireX Systems Contextual Capture ™ technology you can break through the limitations of full packet capture, store payload level information for periods of months and remove the complexities of sifting through the packets in order to “glue” them back together. -
20
Azure Network Watcher
Microsoft
Monitor and diagnose networking issues without logging in to your virtual machines (VMs) using Network Watcher. Trigger packet capture by setting alerts, and gain access to real-time performance information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. Build a deeper understanding of your network traffic pattern using network security group flow logs and virtual network flow logs. Information provided by flow logs helps you gather data for compliance, auditing and monitoring your network security profile. Network Watcher provides you the ability to diagnose your most common VPN gateway and connections issues. Allowing you, not only, to identify the issue but also to use the detailed logs created to help further investigate.Starting Price: $0.50 per GB -
21
Flowcode
Flowcode
The simplicity of visual programming and the power of traditional coding. Flowcode lets you build fast and handles the infrastructure. So you can focus on solving the hard logic problems. Drag-and-drop functionality meets powerful logic-based nodes. Visually trace your API calls to find bugs faster. Manage versions, rollbacks, and updates effortlessly. Combine and orchestrate multiple AI models to build customized AI APIs. Flowcode is built on Flyde, an open source visual programming language. Flyde runs in VS Code and integrates with existing TypeScript code, browsers, and Node.js. Handle simple tasks quickly with visual flows. Dive deep into complex logic with custom code nodes. You can export your data and APIs and run them on your own servers. Stay flexible and independent. Easily handle database tasks with abstracted PostgreSQL or connect to other databases for more advanced needs.Starting Price: $19 per month -
22
Riverbed AppResponse
Riverbed
As organizations are transforming their environment and growing more distributed, the network becomes even more relevant. Riverbed AppResponse delivers all-in-one packet capture, application analysis, transactional details, and flow export. Specialized application modules provide fine-grained analysis to help you to speed problem identification and resolution. Modular in design, Riverbed AppResponse lets you select the analysis capabilities you need, including network forensics, all TCP and UDP applications and their metrics, web application performance, database analysis, VoIP and video analysis, and Citrix analysis. There’s a saying that packets are the ultimate source of truth. Riverbed AppResponse captures and stores all packets, all the time at one-minute granularity, so the details are always available when you need them. When required, explore the second- and micro-second-level details. -
23
6WINDGate
6WIND
In the 6WINDGate software architecture, the control plane and data plane are separate. Within the data plane, the 6WINDGate fast path runs isolated from the Linux operating system on a dedicated set of processor cores. The fast path protocols process the majority of network packets without incurring any of the Linux overheads that degrade overall performance. The fast path implements a run-to-completion model whereby all cores run the same software and can be allocated as required according to the necessary level of packet processing or Linux application performance. Only those rare packets that require complex processing are forwarded to Linux, which performs the necessary management, signaling and control functions. Packet processing information that is configured or learned (through control plane protocols) in Linux is automatically and continuously synchronized with the fast path so that the presence of the fast path is completely transparent to Linux and its applications. -
24
ARIA SDS Packet Intelligence
ARIA Cybersecurity Solutions
The ARIA Packet Intelligence (PI) application gives OEMs, service providers, and security professionals a better way to use SmartNIC technology to support two important use cases: advanced packet-level network analytics and cyber-threat detection, response, and containment. Network analytics: ARIA PI provides complete visibility into all network traffic and feeds valuable analytics data to packet delivery accounting tools, quality of service systems, and SLA monitoring applications. All of this helps companies provide better service and maximize revenues tied to usage-based billing. Cyber-threat detection, response, and containment: ARIA PI also feeds metadata to threat detection tools for complete visibility into all network traffic, including east-west data flows. This improves the effectiveness of existing security solutions, such as SIEMs and IDS/IPS tools, and gives security teams a better way to detect, respond, contain, and remediate even the most advanced cyber threats. -
25
Cisco Packet Tracer
Cisco
Get real world experience with this powerful network simulation tool built by Cisco. Practice building simple and complex networks across a variety of devices and extend beyond routers and switches. Create interconnected solutions for smart cities, homes, and enterprises. Use Packet Tracer as a learning environment for instructional courses, distance learning, professional training, work planning or just to have some fun. Enroll, download and start learning valuable tips and best practices for using our innovative, virtual simulation tool, Cisco Packet Tracer. Cisco Packet Tracer is a comprehensive networking technology teaching and learning tool that offers a unique combination of realistic simulation and visualization experiences, assessment, activity authoring capabilities, and multiuser collaboration and competition opportunities. Features of Packet Tracer will help students and teachers collaborate, solve problems, and learn concepts in an engaging and dynamic social environment. -
26
CyberMapper
NoviFlow
NoviFlow’s CyberMapper accelerates and dynamically scales cybersecurity services and virtualized network functions into the Terabit scale by implementing a powerful Security Load Balancer, packet filtering and telemetry solution that leverages is a high-performance programmable network fabrics. CyberMapper achieves unprecedented performance, flexibility, and scale by leveraging the power of programmable match-action pipelines, white-box hardware, and open standard interfaces such as OpenFlow, gRPC and P4-runtime. CyberMapper enables NoviWare™ compatible switches (such as NoviFlow’s NoviSwitches and select white-box switches running the powerful Intel/Barefoot Tofino) to deliver load balancing, packet brokering, and telemetry directly in the network fabric in a simple, scalable, compact form factor, and at a fraction of the price of conventional load balancing solutions. -
27
cPacket
cPacket Networks
cPacket enables network-aware application performance and security assurance for the distributed hybrid-IT environment. Our single-pane-of-glass analytics power advanced machine learning-based AIOps. With cPacket, you can efficiently manage, secure and future-proof your network enabling digital transformation. The industry’s most complete, yet simple, network visibility stack provides all the components you need to manage your hybrid network across branch, data center and the cloud.Starting Price: cVu-V - $21,000/year -
28
Capture The Packet (CTP)
Aries Security
Capture The Packet (CTP) is a cybersecurity training simulator and skills assessment suite. This system can be used as a teaching aid, learning system, skills assessment, and vetting tool. Capture The Packet has been proven across commercial, military, and government agencies in multiple countries. Customer feedback shows we are able to bring teams up to speed 40% faster in advanced skills development compared to other tools, as well as teaching totally new concepts. Investing in CTP for your teams pays off quickly by providing a gamified environment that can focus on real-world solutions on a live network. Unlike classroom or certification training, much of Capture The Packet’s value comes from offering true functional learning and skills development. We provide a unique gamified environment where participants are encouraged to use a broad library of available tools and methods to solve challenges. -
29
The Network Convergence System (NCS) 6000 helps enable superior network agility, packet optical convergence, and petabits-per-second system scale. It facilitates the Cisco Evolved Programmable Network to support virtualization and programmability at low total cost of ownership and delivers high-bandwidth mobile, video, and cloud services to end users. Innovations include Cisco nPower X1 NPUs, hardware-enabled true zero-packet, zero-topology loss ISSU, capability to scale beyond 1 petabit in a multi-chassis configuration, enhanced operations support, and packet-optical integration. Use an adaptable power consumption model for both the ASIC and CMOS photonics technology for the lowest carbon footprint in service provider routing today. Easily adapt each line card's power consumption to the number of ports used.
-
30
PacketRanger
Tavve
PacketRanger is a web-based SaaS platform that effortlessly builds and manages telemetry pipelines across the entire IT landscape by inspecting, filtering, replicating, and routing data from any source to an unlimited number of destination consumers. It enables rapid construction of pipelines that eliminate noise, establishes volumetric baselines with customizable threshold notifications, and provides rich visualizations to pinpoint low- and high-value data as well as network issues and misconfigurations. Designed for NetFlow, it moderates congestion, optimizes flow-based licensing, reduces duplicate UDP datagrams, supports all NetFlow/IPFIX versions, offers over 400 predefined and custom filter templates, mitigates packet loss, and overcomes exporter limitations. For Syslog, it ensures balanced event distribution, simple keyword and regular-expression filtering, TCP/TLS support, automatic message parsing without manual grok patterns, and the ability to transform logs into SNMP traps. -
31
Riverbed Packet Analyzer
Riverbed
Riverbed Packet Analyzer accelerates real-time network packet analysis and reporting of large trace files through an intuitive graphical user interface and a broad selection of pre-defined analysis views. It enables users to quickly identify and troubleshoot complex network and application performance issues down to the bit level, with full integration with Wireshark. By simply dragging and dropping preconfigured analysis views onto a group of virtual interfaces or a packet trace file, users can see results immediately, transforming hours of work into seconds. The tool facilitates the capture and merging of multiple trace files, allowing for precise pinpointing of problems across multiple segments. Additionally, it provides the capability to zoom into a 100-microsecond view of the network to identify utilization spikes or microbursts that can saturate a gigabit network and cause significant issues. -
32
Scapy
Scapy
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks, or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tshark, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel), etc. Scapy runs natively on Linux, Windows, OSX, and on most Unixes with libpcap. The same code base now runs natively on both Python 2 and Python 3. Scapy development uses the Git version control system. Scapy reference repository is hosted on GitHub.Starting Price: Free -
33
Riverbed NetProfiler
Riverbed Technology
Cybercriminals are constantly looking for new ways to beat your defenses. You build them; they find the cracks. That’s why you need a network security solution that keeps your network secure and available. Riverbed NetProfiler transforms network data into security intelligence, providing essential visibility and forensics for broad threat detection, investigation, and mitigation. By capturing and storing all network flow and packet data across your enterprise, it delivers the crucial insights to detect and investigate advanced persistent threats that bypass typical preventative measures, as well as those that originate inside the network. DDoS attacks are a leading cause of business disruption. They frequently target critical infrastructures like power plants, healthcare facilities, education institutions and government entities. -
34
Savvius Omnipeek
Savvius
Omnipeek® delivers visual packet intelligence with sophisticated deep packet analysis for faster mean time to resolution of network and security issues. Enterprises and service providers depend on reliable network performance. Configuration errors, network or application faults, and security attacks can jeopardize operations, user experience, and the bottom line. To keep networks performing optimally, engineers need to be able to continuously monitor their networks and quickly troubleshoot problems wherever they occur. They need real-time analysis for every type of network segment—1/10/40/100 Gigabit, 802.11, and voice and video over IP—and for every level of network traffic. Omnipeek, a best-in-class suite of network analytics software, delivers intuitive visualization and effective forensics for faster resolution of network and application performance issues and security investigations. Omnipeek builds on years of LiveAction packet intelligence with customizable workflows. -
35
BlackRidge Transport Access Control
BlackRidge
Security is an arms race. Innovation happens simultaneously on the attack and protects sides of the environment. By authenticating identity and implementing security policy at the earliest possible time, on the first packet of a network session setup, BlackRidge provides deterministic, scalable, and cost-effective cyber defense. BlackRidge Transport Access Control (TAC), using our patented First Packet Authentication™, provides a new level of cyber defense for network and cloud resources. TAC operates pre-session, in real-time, before other security defenses engage. TAC is address and topology independent, supporting NAT and automatically adjusting to changing network topologies. Cyber-attacks are stopped dead in their tracks by preventing unauthorized users and attackers from performing reconnaissance of network and cloud resources, and by denying them the ability to communicate anonymously. -
36
Municode Meetings
Municode
Meeting & agenda management is a solution designed specifically to save local governments time and money by automating the creation of agendas, minutes, and packets, even at the last minute, with a single click. These documents are formatted in an MS Word-based platform, allowing for limitless editing and formatting. Once formatted, users can submit agendas electronically for approval and can quickly be sent forward and backward along the approval process. After the process is completed, the agenda manager can create the agenda with the click of a button. Meeting & agenda management is flexible and can match nearly any agenda format. The system will create your agenda packet by combining all the files for each item and generate a packet that can be reviewed electronically or on paper. Make any final edits, and the agenda can be published on the website with the click of a button. Our prices are based on population, making it the most affordable meetings solution available.Starting Price: $200/month -
37
Packet Sender
Packet Sender
Packet Sender can send and receive UDP, TCP, and SSL on the ports of your choosing. It also has a built-in HTTP client for GET/POST requests and Panel Generation for the creation of complex control systems. by sending customers a portable Packet Sender with pre-defined settings and packets. Create single-button panels that trigger a series of commands for control systems.Starting Price: Free -
38
FlowBreeze
BreezeTree Software
FlowBreeze flowchart software is a Microsoft® Excel® add-in that automates the process of making flowcharts by generating flowchart shapes from your text. FlowBreeze lets you create flowcharts by just typing. You simply type in each flowchart step, and press Enter. The text is replaced by a flow chart symbol. Formatting is applied, symbols are aligned, and a connector arrow is added automatically. Wouldn't it be great if there were a way you could create flow charts that was as effortless as typing? A flow chart tool that picks the flowchart symbol for you based on the words you type? A flow chart tool that adds connectors between the flowchart symbols for you? A flow chart tool that integrates seamlessly into Microsoft Office, so anyone can edit and maintain flowcharts?Starting Price: $59.95 per license -
39
Junos Traffic Vision
Juniper Networks
Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance. -
40
cClear Analytics Engine
cPacket Networks
Be empowered with actionable intelligence about your entire network across hybrid environments. Customizable dashboards provide interactive drilldown into unbiased traffic details and KPIs from real-time and historical data from our packet brokers and recorders. It also includes a unified management console for all cPacket appliances - all in a single pane of glass. Multipurpose appliance that collects, analyzes, and visualizes network data; it also provides a unified administration console. VM-based data collection and analytics aggregated from physical/virtual devices across data centers and branch offices. Cloud-hosted single-pane-of-glass data collection and analytics aggregated from physical/virtual/cloud devices. The cClear Analytics Engine empowers you to do more by giving you clear visibility into your entire network. -
41
InterceptSuite
InterceptSuite
InterceptSuite is a comprehensive MITM proxy and TLS interception tool designed for security professionals, developers, system administrators, and network engineers. It features advanced SOCKS5 proxy capabilities with Python extension support, allowing users to write custom protocol dissectors and analysers for any TLS-encrypted protocol. The platform offers cross-platform compatibility across Windows, macOS, and Linux, with both free open-source and professional editions available. Key features include TLS packet interception, Universal TLS Upgrade Detection for protocols like SMTPS, IMAP, PostgreSQL TLS, and STARTTLS, plus PCAP file export for analysis with external tools like Wireshark.Starting Price: $10/month -
42
Cyberoam
Sophos
Cyberoam offers a complete virtual security solution to organizations with its virtual network security appliances (Next-Generation Firewalls/UTMs), virtual Cyberoam Central Console for centralized management, and Cyberoam iView software for centralized logging and reporting. The Xstream architecture makes traffic handling more efficient with a high-performance single streaming DPI engine and greatly improved TLS Inspection throughput. The dedicated Xstream Flow Processor in every XGS Series appliance offloads SaaS, SD-WAN, and cloud traffic at the hardware level, reducing the burden on the main CPU. This accelerates performance by adding headroom for TLS 1.3 decryption, deep packet inspection, and more. -
43
nChronos
Colasoft
nChronos is an application centric, deep-dive network performance analysis system. It combines the nChronos Console with the nChronos Server to deliver the capability of 24x7 continuous packet capturing, unlimited data storage, efficient data mining and in depth traffic analysis solution. nChronos captures 100% of all data captured for real-time analysis as well as historical playback. nChronos is designed for monitoring the network traffic in medium and large corporates. It connects to company's core router or switch and monitors all network traffic, emails and chat sessions inbound and outbound. Also, it provides the ability to monitor abnormal traffic and alert upon detection of "Suspicious Conversations". Only when network engineers monitor network activities of the entire network at the packet level are they able to identify abnormal network activities and protect their companies from cyber-crime and cyber-attacks. -
44
Juniper CTP Series Routers
Juniper Networks
These platforms (designed for USA and Australian markets) give time-division multiplexing (TDM) and serial and analog circuit-based applications reliable and efficient access to next-generation IP networks with cost, redundancy, and efficiency advantages. The CTP2056 Circuit to Packet Platform bridges legacy and IP worlds for circuit-switched applications. Designed for U.S. and Australian markets, this 4 U rack-mountable chassis offers maximum flexibility with up to 56 circuit emulation interfaces. The CTP2024 Circuit to Packet Platform bridges legacy and IP worlds for circuit-switched applications. Designed for the U.S. and Australian markets, this 2 U rack-mountable chassis supports up to 24 circuit emulation interfaces and optional redundant power. The CTP2008 Circuit to Packet Platform bridges legacy and IP worlds for circuit-switched applications. This 1 U rack-mountable chassis supports up to eight software-configurable circuit emulation interfaces. -
45
NETSCOUT vSTREAM
NETSCOUT
Visibility for performance management, user experience, and cybersecurity in virtualized environments. NETSCOUT's vSTREAM virtual appliance complements existing Adaptive Session Intelligence (ASI)-based instrumentation to provide the same smart data visibility within virtualized and cloud infrastructures that are already possible in physical environments. The vSTREAM is ideal for monitoring service-critical traffic running within virtualized and/or cloud infrastructures. With deep packet inspection at scale, organizations have the end-through-end visibility needed to assure network and application performance and high-quality user experiences in virtual environments. Leverage end-through-end visibility across data centers, multi-cloud, and remote offices to assure high-quality user experiences anywhere. Scalable and simplified packet-data visibility and analysis is easy to deploy, manage, and fit into your organization’s budget. -
46
wavemon
wavemon
wavemon is a wireless device monitoring application that allows you to watch signal and noise levels, packet statistics, device configuration and network parameters of your wireless network hardware. It should work (though with varying features) with all devices supported by the Linux kernel. -
47
Active Wall
Active Network CO
Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. It is recommended that the users should use the Gateway mode or the Bridge mode. When using the Passby mode, Active Wall can only block TCP data packets for the limit of the network topology. However, the Gateway mode or the Bridge mode enables the Active Wall to block all kinds of data packets.Starting Price: $10 per user -
48
Elastiflow
Elastiflow
The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.Starting Price: Free -
49
GateSpeed
GateSpeed
Dramatic increases in demand for bi-directional content, robust data, and efficient processing, have significantly hampered network throughput performance, worsening traffic at critical choke points across data networks. GateSpeed’s unique network optimization platform drives data throughput and hardware efficiency improvements at these choke points, with performance benefits and cost savings that hit the bottom line. Whether deployed at the network edge, on network links and load balancers, or directly at the data center, GateSpeed technology offers single-point or end-to-end optimization for integration into your long-term network infrastructure and development strategy. With our innovative packet-forwarding engine, and customized Data Plane Development Kit (DPDK), GateSpeed achieves 5X and greater packet throughput over standard Linux deployments, and substantially greater throughput than standard DPDK solutions on the market today. -
50
Telesoft CERNE
Telesoft
With the rise in the global datasphere only set to accelerate with the advances in IoT and 5G technology, the cyber threat landscape will also continue to grow. Our intrusion detection system, the CERNE, helps protect, secure and guard our customers from attack. The CERNE provides real-time monitoring and historical intrusion detection capabilities helping security analysts detect intrusions, identify suspicious activity and monitor network security by storing IDS alert traffic while reducing unnecessary storage. The Telesoft CERNE combines a high rate 100Gbps IDS engine with an automated record of relevant network traffic for real-time and historical threat investigation and digital forensics. CERNE continuously scans and captures network packets and only stores traffic associated with an IDS alert, discarding all other traffic, giving an analyst rapid access to critical packets up to 2.4 seconds before an event.