Alternatives to LANGuardian

Compare LANGuardian alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LANGuardian in 2024. Compare features, ratings, user reviews, pricing, and more from LANGuardian competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auvik

    Auvik

    Auvik Networks

    Auvik's cloud-based network management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. And deep network traffic insights is a game changer.
    Compare vs. LANGuardian View Software
    Visit Website
  • 2
    ManageEngine OpManager
    OpManager is a network management tool geared to monitor your entire network. Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network with: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Compare vs. LANGuardian View Software
    Visit Website
  • 3
    Pulseway

    Pulseway

    MMSOFT Design

    Pulseway is a real-time remote monitoring and management (RMM) software for MSPs and IT departments that allows you to take full control over your entire IT environment. Easy to use and quick to deploy, Pulseway ensures that any IT issues are detected, monitored, and addressed at the earliest time possible. The platform offers complete visibility through the Pulseway Dashboard, advanced automation, remote control, OS & 3rd party patch management, network monitoring, IT automation, custom reports, complete command traceability, email notifications, and so much more. We also offer add-ons for endpoint protection, business management (PSA) and backup & disaster recovery software and integration with leading AV providers to give you the power of a full IT stack. Over 6,000 customers worldwide use Pulseway every day to pro-actively manage their own and customers IT infrastructure. Test it free today with our 14-day no commitment trial.
    Compare vs. LANGuardian View Software
    Visit Website
  • 4
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
    Leader badge
    Partner badge
    Compare vs. LANGuardian View Software
    Visit Website
  • 5
    Sematext Cloud

    Sematext Cloud

    Sematext Group

    Sematext Cloud is an innovative, unified platform with all-in-one solution for infrastructure monitoring, application performance monitoring, log management, real user monitoring, and synthetic monitoring to provide unified, real-time observability of your entire technology stack. It's used by organizations of all sizes and across a wide range of industries, with the goal of driving collaboration between engineering and business teams, reducing the time of root-cause analysis, understanding user behaviour and tracking key business metrics. The main capabilities range from log monitoring to APM, server monitoring, database monitoring, network monitoring, uptime monitoring, website monitoring or container monitoring Find complete details on our website. Or better: start a free demo, no email address required.
  • 6
    Noction Flow Analyzer (NFA)
    Noction Flow Analyzer (NFA) is a network analytics, monitoring, and alerting tool capable of ingesting NetFlow, IPFIX, sFlow, NetStream, and BGP data. The NetFlow analyzer enables engineers to optimize their networks and applications performance, control bandwidth utilization, do the proper network capacity planning, perform detailed BGP peering analysis, improve security, and minimize network incidents response time.
    Starting Price: $299/month
  • 7
    Netreo

    Netreo

    Netreo

    Netreo is the most comprehensive full stack IT infrastructure management and observability platform. We provide a single source of truth for proactive performance and availability monitoring for large enterprise networks, infrastructure, applications and business services. Our solution is used by: - IT Executives to have full visibility from the business service right down into the infrastructure and network that supports it. - IT Engineering departments as a decision support system for capacity planning, and architecting modern solutions. - IT Operations teams for real time visibility into what is failing in their environment, what bottlenecks exist and who it is affecting. We provide all of these insights for systems and vendor mixes in large heterogeneous and constantly evolving environments. We have an extensive and growing list of supported vendors (over 350 integrations) including network vendors, servers, storage, virtualization, cloud platforms and others.
    Starting Price: $5/resource/mo
  • 8
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
    Leader badge
    Starting Price: $15.00/host/month
  • 9
    Intrusion

    Intrusion

    Intrusion

    In cybersecurity, speed is critical, and Intrusion helps you understand your environment’s biggest threats, fast. See the real-time list of all blocked connections, drill down on an individual connection to see more details like why it was blocked, risk level, etc. An interactive map shows you what countries your business is communicating with the most. Quickly see which devices have the most malicious connection attempts to prioritize remediation efforts. If an IP is trying to connect, you’ll see it. Intrusion monitors traffic bidirectionally in real time, giving you full visibility of every connection being made on your network. Stop guessing which connections are actual threats. Informed by decades of historical IP records and reputation in the global threat engine, it instantly identifies malicious or unknown connections in your network. Reduce cyber security team burnout and alert fatigue with autonomous real-time network monitoring and 24/7 protection.
  • 10
    CySight

    CySight

    IdeaData

    CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.
    Starting Price: $299/month
  • 11
    ManageEngine OpUtils

    ManageEngine OpUtils

    ManageEngine

    OpUtils is IP address and switch port management software that is geared towards helping engineers efficiently monitor, diagnose, and troubleshoot IT resources. OpUtils complements existing management tools by providing trouble shooting and real-time monitoring capabilities. It helps network engineers manage their switches and IP address space with ease. With a comprehensive set of over 20 tools, this switch port management tool helps with network monitoring tasks like detecting a rogue device intrusion, keeping an eye on bandwidth usage, monitoring availability of critical devices, backing up Cisco configuration files, and more. Enable advanced IP scanning of IPv4 and IPv6 subnets in your network to identify the available and used IP addresses. Scan all the switches in your network, map switch ports, run port scans and view details such as physical location, user, and more. Identify rogue device intrusions and block access to these devices.
    Starting Price: $138.00
  • 12
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 13
    Alluvio Network Performance Management
    Alluvio Network Performance Management makes it easy to monitor, troubleshoot, and analyze what’s happening across your hybrid network environment. With end-to-end visibility and actionable insights, you can quickly and proactively resolve any network-based performance issues. Alluvio unified NPM collects all packets, all flows, all device metrics, all the time, across all environments -cloud, virtual, and on-prem, providing enterprise-wide, business-centric monitoring of critical business initiatives.
  • 14
    AT&T Secure Web Gateway

    AT&T Secure Web Gateway

    AT&T Cybersecurity

    Web and cloud security for today's mobile workforce. Unified protection against web-based threats for office and roaming users. Protect users against web-based threats, including zero-day, and restricts what content can be accessed. Enable rapid adoption of SD-WAN and cloud-based applications as well as the ability to provide security for mobile users. Reduce upfront capital expenditure in favor of a more predictable operational expense model. Perform deep packet inspection of encrypted web traffic with minimal effect on network performance. Provide centralized visibility and reporting across all locations. Allow administrators to grant access to specific cloud-based applications without providing access to the entire network. Safeguard against data loss and provides the ability to control the use of cloud-based applications. Empower organizations to quickly scale security to support new locations or acquisitions.
  • 15
    Flowmon

    Flowmon

    Progress Software

    Make informed decisions and deal with network anomalies in real time. Cloud, hybrid or on-premise, with Flowmon’s actionable intelligence you are in control. Flowmon’s network intelligence integrates NetOps and SecOps into one versatile solution. Capable of automated traffic monitoring and threat detection, it creates a strong foundation for informed decision-making without having to sift through volumes of information noise. Its intuitive interface allows IT professionals to quickly learn about incidents and anomalies, understand their context, impact, magnitude, and most importantly, their root cause.
  • 16
    MixMode

    MixMode

    MixMode

    Unparalleled network visibility, automated threat detection, and comprehensive network investigation powered by Unsupervised Third-wave AI. MixMode's Network Security Monitoring platform provides comprehensive visibility allowing users to easily identify threats in real time with Full Packet Capture and Metadata for longer term storage. Intuitive UI and easy to use query language help any security analyst perform deep investigations and understand the full lifecycle of threats and network anomalies. Using our best-in-class Third-Wave AI, MixMode intelligently identifies Zero-Day Attacks in real time by understanding normal network behavior and intelligently surfacing any anomalous activity outside of the norm. Developed for projects at DARPA and the DoD, MixMode's Third-Wave AI needs no human training and can baseline your network in only 7 days, enabling 95% alert precision and reduction and identification of zero-day attacks.
  • 17
    discrimiNAT Firewall

    discrimiNAT Firewall

    Chaser Systems

    The discrimiNAT is a solution to being unable to specify hostnames/FQDNs in Google Cloud Firewall Rules and AWS Security Groups for scalable egress filtering. It works by monitoring and blocking traffic without decryption, with our Deep Packet Inspection engine, inline as a high-availability NAT Instance on the egress of your VPC network. We have made the configuration of this firewall as simple as possible. Just specify the allowed destination FQDNs in the applications' outbound rules itself and the firewall will take care of the rest. See the brief video demos for how straightforward this is. From complete multi-zone network configurations that work with a single click and have sane defaults, to DIY instance deployments so you can configure the networking around it, we have all templates ready to go in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud.
  • 18
    EndaceProbe

    EndaceProbe

    Endace

    EndaceProbes record 100% accurate Network History to solve Cybersecurity, Network and Application issues. Bring clarity to every incident, alert or issue with an open packet capture platform that integrates with all your commercial, open source or custom-built tools. See exactly what’s happening on the network so you can investigate and defend against even the toughest Security Threats. Capture vital network evidence, so you can quickly resolve Network and Application Performance issues or outages. The open EndaceProbe Platform brings tools, teams and workflows together into an integrated Ecosystem. Network History available at your fingertips from all your tools. Built into existing workflows so teams don’t have to learn more tools. A powerful open platform to deploy your favorite security or monitoring tools on. Record weeks or months of rapidly searchable, accurate network history across your entire network.
  • 19
    Fidelis Network

    Fidelis Network

    Fidelis Cybersecurity

    Detecting advanced threats requires deep inspection, extraction, and analysis of all forms of content going across the wire in real-time. Fidelis network detection and response bi-directionally scans all ports and protocols to collect rich metadata used as the basis for powerful machine-learning analytics. With direct, internal, email, web and cloud sensors, you gain full network coverage and visibility. Identified attacker TTPs are mapped against the MITRE ATT&CK™ framework to help security teams get ahead of the curve. Threats can run, but they can’t hide. Automatically profile and classify IT assets and services including enterprise IoT, legacy systems and shadow IT to map your cyber terrain. When integrated with Fidelis’ endpoint detection and response solution, you gain a software asset inventory correlated with known vulnerabilities including CVE and KB links, as well as security hygiene for patches and endpoint status.
  • 20
    Arista NDR

    Arista NDR

    Arista

    Today, a zero trust networking approach to security is paramount for organizations looking to build a robust cybersecurity program. Irrespective of which device, application, or user is accessing an enterprise resource, zero trust focuses on complete visibility and control over all activity on the network. Arista’s zero trust networking principles, based on NIST 800-207, help customers address this challenge with three cornerstones: visibility, continuous diagnostics, and enforcement. The Arista NDR platform delivers continuous diagnostics for the entire enterprise threat landscape, processes countless points of data, senses abnormalities or threats, and reacts if necessary—all in a matter of seconds. The Arista solution stands out from traditional security because it is designed to mimic the human brain. It recognizes malicious intent and learns over time, giving defenders greater visibility and insight into what threats exist and how to respond to them.
  • 21
    FortiAnalyzer

    FortiAnalyzer

    Fortinet

    The digital attack surface is expanding at a rapid rate, making it increasingly difficult to protect against advanced threats. According to a recent Ponemon study, nearly 80% of organizations are introducing digital innovation faster than their ability to secure it against cyberattacks. In addition, the challenges of complex and fragmented infrastructures continue to enable a rise in cyber events and data breaches. Assorted point security products in use at some enterprises typically operate in silos, obscuring network and security operations teams from having clear and consistent insight into what is happening across the organization. An integrated security architecture with analytics and automation capabilities can address and dramatically improve visibility and automation. As part of the Fortinet Security Fabric, FortiAnalyzer provides security fabric analytics and automation to provide better detection and response against cyber risks.
  • 22
    FlowProbe

    FlowProbe

    Telesoft

    Network traffic monitoring is essential for ensuring your organization has all the information required to make evidence-based decisions to prevent and respond to cyber-attacks on your digital estate. Our FlowProbe security solution is a network monitoring tool capable of providing vital intrusion detection information for high-rate and high-volume network traffic without impacting network performance. Coupled with a security solution such as the Telesoft Data Analytics Capability (TDAC), the Flowprobe provides your NetSecOps teams with sophisticated intrusion detection and threat behavioural analysis capabilities. The FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large-scale networks up to 4 x 100GbE per high-performance 1U appliance. The flow records created from the raw data can be passed in real-time to the Telesoft TDAC or any other compatible customer data platform.
  • 23
    GigaSECURE

    GigaSECURE

    Gigamon

    The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed.
  • 24
    Alluvio NetProfiler

    Alluvio NetProfiler

    Riverbed Technology

    Cybercriminals are constantly looking for new ways to beat your defenses. You build them; they find the cracks. That’s why you need a network security solution that keeps your network secure and available. Alluvio NetProfiler Advanced Security Module transforms network data into security intelligence, providing essential visibility and forensics for broad threat detection, investigation, and mitigation. By capturing and storing all network flow and packet data across your enterprise, it delivers the crucial insights to detect and investigate advanced persistent threats that bypass typical preventative measures, as well as those that originate inside the network. DDoS attacks are a leading cause of business disruption. They frequently target critical infrastructures like power plants, healthcare facilities, education institutions and government entities.
  • 25
    GREYCORTEX Mendel

    GREYCORTEX Mendel

    GREYCORTEX

    Current network security tools leave networks vulnerable because of a lack of detection for advanced threats, lack of visibility, and a lack of integration. This means threats hide in the network, infected devices and misconfigurations go unnoticed, and analysts must switch between different platforms to stop attacks when they are finally detected. GREYCORTEX Mendel is an NDR (Network Detection and Response) solution for network security monitoring in IT and industrial (OT) networks. It combines advanced detection methods to analyze network traffic and alert you on any malicious activities, common and unknown advanced threats and network operational issues. It perfectly visualizes network communications at the user, device and application levels, enabling systems analysts and network administrators to quickly and efficiently resolve security and operational incidents.
  • 26
    Azure Network Watcher
    Monitor and diagnose networking issues without logging in to your virtual machines (VMs) using Network Watcher. Trigger packet capture by setting alerts, and gain access to real-time performance information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. Build a deeper understanding of your network traffic pattern using network security group flow logs and virtual network flow logs. Information provided by flow logs helps you gather data for compliance, auditing and monitoring your network security profile. Network Watcher provides you the ability to diagnose your most common VPN gateway and connections issues. Allowing you, not only, to identify the issue but also to use the detailed logs created to help further investigate.
    Starting Price: $0.50 per GB
  • 27
    Corelight

    Corelight

    Corelight

    Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.
  • 28
    Alluvio AppResponse
    As organizations are transforming their environment and growing more distributed, the network becomes even more relevant. Alluvio AppResponse delivers all-in-one packet capture, application analysis, transactional details, and flow export. Specialized application modules provide fine-grained analysis to help you to speed problem identification and resolution. Modular in design, AppResponse lets you select the analysis capabilities you need, including network forensics, all TCP and UDP applications and their metrics, web application performance, database analysis, VoIP and video analysis, and Citrix analysis. There’s a saying that packets are the ultimate source of truth. AppResponse captures and stores all packets, all the time at one-minute granularity, so the details are always available when you need them. When required, explore the second- and micro-second-level details.
  • 29
    Bricata

    Bricata

    Bricata

    Cloud adoption, BYOD and shadow IT and increased dependence on SaaS apps have made the task of securing the modern enterprise extremely difficult and complex for the most dedicated security teams. Ensuring network visibility and effectively managing risk while maintaining availability and seamless collaboration has become an impossible balancing act using traditional tools. Bricata unifies and simplifies securing hybrid, multi-cloud and IoT environments in real-time so security teams can effectively defend and secure their networks without limiting or slowing down the rest of the enterprise. See everything that happens on your network in an instant, with all the high-fidelity metadata at your fingertips so you can know in real-time how users, devices, systems and applications are behaving on the network.
  • 30
    SolarWinds NetFlow Traffic Analyzer
    NetFlow analyzer and bandwidth monitoring software. NetFlow analysis and bandwidth monitoring shouldn’t be hard. Add NetFlow Traffic Analyzer to Network Performance Monitor to boost your NetFlow monitoring capabilities. Monitor your network, discover traffic patterns, and avoid bandwidth hogs with NetFlow Traffic Analyzer (NTA) and User Device Tracker NetFlow solutions. Faster troubleshooting, increased efficiency, and greater visibility into malicious or malformed traffic flows with NetFlow analyzer insights. Work seamlessly with Orion Platform products, including Network Performance Monitor and Network Configuration Manager. Combine NTA with Network Configuration Manager (NCM) to show traffic conversations by policy in the context of the NCM Policy Details page. View both IPv4 and IPv6 flow records. Monitor Cisco NetFlow, Juniper J-Flow, sFlow, Huawei NetStream, and IPFIX flow data identifying the applications and protocols consuming the most bandwidth.
  • 31
    WhatsUp Gold

    WhatsUp Gold

    Progress

    Avoid downtime with a network monitoring solution that covers you from the network edge to the cloud. See developing issues before users report them. Troubleshoot faster from an interactive topology map that shows connectivity and dependencies. See what's up and what's down instantly whether in the cloud or on-premises. Get complete visibility to the status of network devices, systems and applications. Leverage topology-aware monitoring that understands network dependencies so you receive fewer, more intelligent alerts. Receive notifications through SMS, email, web or Slack so you know about developing issues before users report them. Integrate your other systems with a powerful REST API to automate your workload. See network devices, servers, virtual machines, cloud and wireless environments in context. Click on any device to get immediate access to a wealth of related network monitoring settings and reports. See how everything is connected and get answers faster.
    Starting Price: $1755.00/one-time
  • 32
    NetScanTools Pro

    NetScanTools Pro

    NetScanTools

    NetScanTools Pro is an integrated collection of internet information gathering and network troubleshooting utilities for Network Professionals. Research IPv4 addresses, IPv6 addresses, hostnames, domain names, email addresses and URLs automatically or with manual tools. It is designed for the Windows operating system GUI. Automated tools are started interactively by the user. Join the thousands of network professionals who rely on NetScanTools® Pro to solve their daily network problems. We give you a powerful set of network tools - put them to use wherever you need them the most. Saves time when gathering information about Internet or local LAN network devices, IP addresses, domains, device ports, and many other network specifics. Simplifies and speeds up the information gathering process by Automating the use of many network tools for you. You enter an IP and press one button to use many tools.
  • 33
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
    Starting Price: $1,795 per year
  • 34
    LiveAction

    LiveAction

    LiveAction

    End-to-end visibility of network and application performance from a single pane of glass. LiveNX – Enterprise Network Monitoring Software Platform: Gain comprehensive visibility that spans the entire network – campus, branch, data center, public Cloud, WAN, and SD-WAN. Get confidence that your network is meeting business objectives and reduce the cost to operate your network. Optimize IT network management with fully scalable and customizable network monitoring solutions. Deliver a superior user experience with insights into the underlying network infrastructure, policies, and protocols that ensure the successful delivery of critical applications. Get a true picture of application performance across multiple network segments, domains, and fabrics. See the real-time impact of network issues on application performance and delivery. Reduce MTTR by effectively diagnosing and resolving application performance problems.
  • 35
    Acrylic WiFi Professional

    Acrylic WiFi Professional

    Tarlogic Security

    Acrylic Wi-Fi Professional is the best Wi-Fi analyzer to identify access points and Wi-Fi channels, and identify and resolve incidences in 802.11a/b/g/n/ac Wi-Fi networks in real time. It is a must-have program for advanced users, professionals in Wi-Fi networks and network administrators to get the most out of your wireless network, analyze your home or office Wi-Fi network performance, see who is connected, identify transmission speed, and optimize Wi-Fi network channels in order to obtain the best performance. Obtain Wi-Fi network detailed information, including hidden Wi-Fi networks, and take advantage of unique functionalities such as monitor mode to capture and analyze all Wi-Fi network traffic, visualize devices, keep an inventory on Wi-Fi devices at reach, and perform Wi-Fi speed analysis. With the Acrylic WiFi analyzer you will have automatic recommendations to improve and optimize your Wi-Fi network.
  • 36
    Essential NetTools
    Essential NetTools is a set of network scanning, security, and administrator tools useful in diagnosing networks and monitoring your computer's network connections. It's a Swiss Army knife for everyone interested in a powerful network tool kit for everyday use. Displays a list of your computer's inbound and outbound network connections, including the information on open TCP and UDP ports, IP address, and connection states. What makes it different from other NetStat utilities is the ability to map open ports to the owning application. Configurable alerts for incoming and outgoing connections are also available. An advanced TCP port scanner that allows you to scan your network for active ports. This tool features both conventional (full connect) and stealth (half-open) scanning modes.
  • 37
    WildMetrix

    WildMetrix

    WildMetrix

    New WildMetrix™ edition for Microsoft® Server solutions and applications. Real-time performance metrics and troubleshooting. Transform how you detect and isolate issues in your networked applications and significantly reduce downtime by as much as 70%. Deploy solution packs developed for specific products, roles, and features. Extensibility features to build solutions for custom applications and legacy systems. Leverage unified monitoring of applications, server, storage, network, and visualization within a highly optimized single pane of glass user experience. Enhance key visibility across the entire stack with "At-A-Glance" dashboards for larger screens. Advanced IT monitoring, analytical, and troubleshooting software for today's changing and complex requirements. WildMetrix enables professionals with real-time decision support to quickly isolate and remediation of impacting issues. With a live streaming architecture, contextual drill down dashboard framework, etc.
  • 38
    Autonomous Digital Experience Management (ADEM)
    Benefit from the simplicity and ease of a digital experience management solution that natively integrates with Prisma SASE, including GlobalProtect, Prisma Access and Prisma SD-WAN, to optimize experiences for every user, without the complexity of installing additional software and hardware. Whether it’s supporting employees working from the office, their home, or any combination of the two, IT Teams need to quickly surface insights and proactively resolve issues across the entire service delivery path before business is impacted. With ADEM, encompassed with SASE, you’re only clicks from an answer to any performance question, for any user. Narrow down critical incidents and root causes using the greatest depth of experience insights available. With correlated performance metrics across all endpoints, networks and applications - you have all the visibility needed to manage experience.
  • 39
    NetVizura NetFlow Analyzer
    NetFlow Analyzer is an easy solution for net admins to better understand bandwidth consumption, traffic trends, applications, hosts and traffic anomalies, by visualising the traffic by network devices, interfaces and subnets, traffic segments and end users. NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX, NSEL, sFlow and compatible netflow-like protocols to help net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. This way, companies can optimise networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.
  • 40
    Corvil Analytics
    The Intelligence Hub is a real-time trade analytics solution that models and correlates client trading behavior, plant performance and venue counterparty execution to enable proactive business management and operations. Corvil is an open data system providing API access to all analytics, trading and market data messages and the underlying packets. The Streaming Data API supports a growing library of Corvil Connectors enabling streaming Corvil data directly from the network packets into your chosen big data solution. Corvil Center provides a single point of access to all analytics and reporting with a couple of clicks to visualize any of the petabytes of granular packet data captured by Corvil. Corvil Instrumentation offers superior price/performance packet analysis and capture Appliances, software defined packet sniffers (Corvil Sensor) to extend the reach to virtual and cloud environments, and the Corvil AppAgent for internal multi-hop software instrumentation.
  • 41
    Plixer One

    Plixer One

    Plixer

    Unlock the power of NetFlow/IPFIX and leverage your existing IT infrastructure to enhance network performance and security with the Plixer One Platform. Powered by Scrutinizer, our integrated solutions for Network Performance Monitoring (NPMD) and Network Detection and Response (NDR) offer cost-effective options that provide comprehensive intelligence, empowering you to optimize network performance and security with speed and scale. Optimize your network performance with Scrutinizer, Plixer’s dynamic monitoring solution. Tap into the proven power of Scrutinizer for comprehensive network visibility and performance analytics across on-premises, multi-cloud, and hybrid environments.
  • 42
    Kentik

    Kentik

    Kentik

    Kentik delivers the insight and network analytics you need to run all of your networks. Old and new. The ones you own and the ones you don't. Monitor your traffic from your network to the cloud to the internet on one screen. We provide: - Network Performance Analytics - Hybrid and Multi-Cloud Analytics (GCP, AWS, Azure) - Internet and Edge Performance Monitoring - Infrastructure Visibility - DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance Monitoring - Capacity Planning - Container Networking - Service Provider Intelligence - Real Time Network Forensics - Network Costs Analytics All on One Platform for Visibility, Performance, and Security. Trusted by Pandora, Box, Cogent, Tata, Yelp, University of Washington, GTT and more! Free trial or demo!
  • 43
    Savvius Omnipeek
    Omnipeek® delivers visual packet intelligence with sophisticated deep packet analysis for faster mean time to resolution of network and security issues. Enterprises and service providers depend on reliable network performance. Configuration errors, network or application faults, and security attacks can jeopardize operations, user experience, and the bottom line. To keep networks performing optimally, engineers need to be able to continuously monitor their networks and quickly troubleshoot problems wherever they occur. They need real-time analysis for every type of network segment—1/10/40/100 Gigabit, 802.11, and voice and video over IP—and for every level of network traffic. Omnipeek, a best-in-class suite of network analytics software, delivers intuitive visualization and effective forensics for faster resolution of network and application performance issues and security investigations. Omnipeek builds on years of LiveAction packet intelligence with customizable workflows.
  • 44
    Verizon Network Detection and Response
    At a time when you are challenged more than ever to secure the digital infrastructure at the core of your operations, you need a technology foundation for security that unifies network threat detection, forensics and integrated response. Network Detection and Response is the evolution of effective, efficient and accessible network security. You need no specialized hardware to rapidly deploy Network Detection and Response in any segment of the modern network — enterprise, cloud, industrial, IoT and 5G — to see all activities and record everything for comprehensive analysis, discovery and action. Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. This service dramatically accelerates the ability for organizations to respond to and identify future attacks before they become serious events. This threat detection and response service captures, optimizes and stores network traffic from multiple infrastructures.
    Starting Price: $20 per month
  • 45
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
    Starting Price: $245
  • 46
    Actix Analyzer
    Enables per-session and per-OTT service type analysis for finding the cause of service performance problems affecting OTT services such as Facebook, Youtube and Whatsapp; and understanding when and where network features were available and used. Provides full IP layer decode and session analysis for building tailored KPIs. Enables validation of the indoor network and its interaction with the macro network. Geo-references RF measurements and events and visualizes venue layout. Generates KPI reports to evaluate the readiness of the in-building network ahead of launch. The world’s leading chipset and handset manufacturers use Actix Analyzer to validate the performance of new devices against a reference device. Also to automate the creation of complex KPI reports and investigate performance issues in detail.
  • 47
    Barac

    Barac

    Venari Security

    Our unique solution works with your existing infrastructure to deliver instant analysis, detection and response to cyber threats carried within your encrypted data. Read our advisory paper, get insight into the encrypted traffic problem and understand why the use of TLS protocols and your existing infrastructure are raising the security risks for your critical data. Then read how our unique solution utilises the latest technology to ensure your business is cyber secure, crypto compliant and delivering ROI. Metadata is extracted from all incoming/outgoing encrypted data packets in real time, and forwarded to the Barac platform for analysis. Unique AI utilising machine learning and behavioural analytics (involving 200+ metrics) detects known threat vectors and abnormal traffic to discover potential threats. Alerts are sent to your specified security team SOC, SIEM or alternative, for immediate response.
  • 48
    IronDefense

    IronDefense

    IronNet Cybersecurity

    IronDefense: Your gateway to network detection and response. IronDefense is the industry’s most advanced network detection and response (NDR) platform built to stop the most sophisticated cyber threats. Gain unparalleled visibility. Empower your entire team. Make faster, smarter decisions. As an advanced NDR tool, IronDefense improves visibility across the threat landscape while amplifying detection efficacy within your network environment. As a result, your SOC team can be more efficient and effective with existing cyber defense tools, resources, and analyst capacity. Real-time insights across industry threatscapes, human insights to detect threats, and higher-order analysis of anomalies correlated across groups of peers via IronDome Collective Defense integration. Advanced automation to apply response playbooks built by the nation's top defenders to prioritize detected alerts by risk and supplement limited cyber staff.
  • 49
    Trellix Endpoint Forensics
    Apply state of the art, signatureless detection and protection against the most advanced threats, including zero-days. Combine heuristics, code analysis, statistical analysis, emulation, and machine learning in one advanced sandboxing solution. Enhance detection efficacy with frontline intelligence derived on the frontlines of the world’s biggest breaches. Gain high-fidelity alerts that trigger for when it matters most, saving time and resources. Enhance threat awareness with context created by Trellix's leading security practitioners. Improve analyst efficiency by reducing alert volume and fatigue. Choose from a complete set of deployment scenarios, including in-line and out of band, on-premise, hybrid, public and private cloud, and virtual offerings. Consolidate network security technology stack with a built-in Intrusion Prevention System (IPS) and Dynamic Threat Intelligence.
  • 50
    Core Network Insight

    Core Network Insight

    Core Security (Fortra)

    Instead of monitoring specific assets or the network itself, these security solutions constantly watch network traffic, creating a picture of what normal traffic patterns look like. With a baseline developed, NTA tools can then flag traffic abnormalities as possible security threats. Though there are multiple approaches to this, NTA tools should have some degree of analysis of anomalies to determine whether it’s a harmless abnormality, or a true threat. With network traffic monitoring, Network Insight observes device behavior in real time. It is continually capturing and correlating evidence using multiple detection engines to arrive at a verdict of "suspected" or "infected." The Case Analyzer, a context aware network traffic analysis and threat intelligence engine, confirms the infection, and a series of risk profilers assess and prioritize the infection based on the determined risk level.