10 Integrations with Plixer One
View a list of Plixer One integrations and software that integrates with Plixer One below. Compare the best Plixer One integrations as well as features, ratings, user reviews, and pricing of software that integrates with Plixer One. Here are the current Plixer One integrations in 2026:
-
1
Statseeker
Techniche
Statseeker is a fully-featured network performance monitoring solution. It's highly scalable and delivers fast real-time performance data from a minimal server footprint. Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability. Statseeker monitors networks of any size, polling up to one million interfaces every 60 seconds, collecting network data such as SNMP, ping, NetFlow (sFlow and J-Flow), syslog and trap messages and API data, as well as SDN configuration and health metrics. Your network performance data is never averaged or rolled up. This removes the guesswork in identifying over- and underutilized infrastructure, conducting root cause analysis, or capacity planning. Statseeker's out-of-the-box dashboards and reports give you the contextual data needed to proactively monitor your network and fix problems before users are aware.Starting Price: $5000 for 200 devices -
2
Lansweeper
Lansweeper
Discover your IT with Lansweeper, build your centralized IT Asset System of Record. With the Lansweeper Deepscan IP Scanner engine, you can audit all assets in your company network without installing software on them. Build an accurate network inventory of all your hardware, software and users. Scan Windows, Linux, and Mac devices. Keep track of your licenses, serial numbers and warranties of major brands like Dell, IBM, HP, Toshiba and many more. Detect Unauthorized Local Admins, unify Office 365 and AD User Data, get the netbios domain name, check for Windows updates and more. Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.Starting Price: $495.00/year -
3
MIMIC NetFlow Simulator
Gambit Communications
Download a free trial & discover how MIMIC NetFlow Simulator creates a lab full of devices based on Cisco® NetFlow, Juniper® J-Flow, IPFIX, NBAR, NBAR2 and Cisco Flexible NetFlow data to completely evaluate and test your Flow monitoring, management and analysis applications. MIMIC NetFlow Simulator generates a variety of flows and enables you to fully test your applications. Since you have a complete control over generated flowsets you can easily verify that your graphing application is correctly displaying the values and your collector correctly collects precisely generated flowsets.Starting Price: $500 per year -
4
Elastiflow
Elastiflow
The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.Starting Price: Free -
5
GigaSECURE
Gigamon
The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed. -
6
ThreatSync
WatchGuard
From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor. -
7
ThirdEye
LogicVein
ThirdEye by LogicVein includes advanced network configuration and change management (NCCM) capabilities and network monitoring system (NMS) for large enterprise data centers. ThirdEye is an integrated and cloud ready solution. Including the tools, reporting, automation and integration capabilities you need in a low cost and easy to use package. With ThirdEye, you will reduce cost, save time, manage your configurations and changes, in addition, be alerted if there are any issues with your devices. ThirdEye has all the features and functions of Net LineDancer, with enhanced additional features that allow you to monitor, alert and generate traps on devices. All the features you have in Net LineDancer, you still have in Thirdeye, but with the additional enhanced features of performance monitoring and alarming. By creating a dashboard for each site or system, you can check the monitoring status for each site at a glance. -
8
EndaceProbe
Endace
EndaceProbes record 100% accurate Network History to solve Cybersecurity, Network and Application issues. Bring clarity to every incident, alert or issue with an open packet capture platform that integrates with all your commercial, open source or custom-built tools. See exactly what’s happening on the network so you can investigate and defend against even the toughest Security Threats. Capture vital network evidence, so you can quickly resolve Network and Application Performance issues or outages. The open EndaceProbe Platform brings tools, teams and workflows together into an integrated Ecosystem. Network History available at your fingertips from all your tools. Built into existing workflows so teams don’t have to learn more tools. A powerful open platform to deploy your favorite security or monitoring tools on. Record weeks or months of rapidly searchable, accurate network history across your entire network. -
9
DNSWatch
WatchGuard
WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page. -
10
Plixer Replicator
Plixer
Plixer Replicator is a networking appliance that collects, replicates, and forwards UDP data streams from exporting devices to multiple collection systems, enhancing the performance of security and management tools. By eliminating the need for intricate switch or router configurations, it protects infrastructure performance and reduces overhead. The appliance supports both hardware and virtual deployments, including ESX, Hyper-V, and KVM environments. Its dynamic data forwarding capabilities allow a single UDP traffic stream to be routed to multiple endpoints, ensuring optimal utilization of analysis tools. Additionally, Plixer Replicator enhances system resilience by distributing logs and data across varied repositories, thwarting attempts by hackers to erase their presence. The platform offers a user-friendly web interface and a robust command-line interface for configuration and management.
- Previous
- You're on page 1
- Next