Alternatives to Sniffnet
Compare Sniffnet alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Sniffnet in 2026. Compare features, ratings, user reviews, pricing, and more from Sniffnet competitors and alternatives in order to make an informed decision for your business.
-
1
IBM NS1 Connect
IBM
IBM NS1 Connect offers premium, authoritative DNS and advanced traffic steering to deliver the high-performance, reliable, secure network connectivity that businesses need to meet increasingly sophisticated customer expectations. NS1 Connect’s global anycast network provides the massive capacity and scale needed to keep users reliably connected across the world. An API-first architecture empowers teams to embrace automation and streamline DNS management. Enterprises with complex network infrastructures can take performance to the next level with sophisticated traffic steering capabilities and real-time reporting on DNS observability data.Starting Price: $250/month -
2
Paessler PRTG
Paessler GmbH
Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many moreStarting Price: $2149 for PRTG 500 -
3
Bigleaf
Bigleaf Networks
In our digital-first world, reliable internet is essential for business success. Bigleaf Networks, with advanced SD-WAN architecture and intelligent technology, overcomes traditional network constraints, ensuring seamless connectivity. Bigleaf Networks is more than just a backup; it's a game-changer. Our Cloud Access Network and user-friendly router work together to maximize uptime and optimize cloud application performance. Bigleaf adapts to changing network conditions and traffic needs in real-time, preempting issues before impacting users enabling more productivity. Bigleaf offers control with comprehensive insights, actionable data, and timely alerts, helping you manage your network effectively. Sign up for a free demo to see how we elevate your internet experience, enhance business operations, and give you a competitive edge. With Bigleaf, you don't just stay online; you stay ahead. It's internet connectivity without complexity. -
4
Xplico
Xplico
Xplico is installed in the major distributions of digital forensics and penetration testing: Kali Linix, BackTrack, DEFT, Security Onion, Matriux, BackBox, CERT Forensics Tools, Pentoo and CERT-Toolkit. Xplico allows concurrent access by multiple users. Any user can manage one or more Cases. The UI is a Web User Interface and its backend DB can be SQLite, MySQL or PostgreSQL. Xplico can be used as a Cloud Network Forensic Analysis Tool. The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). At each data reassembled by Xplico is associated a XML file that uniquely identifies the flows and the pcap containing the data reassembled. -
5
NetworkMiner
Netresec
NetworkMiner is a network forensics tool that extracts artifacts such as files, images, emails, and passwords from captured network traffic in PCAP files. It can also capture live network traffic by sniffing a network interface. Detailed information about each IP address in the analyzed network traffic is aggregated into a network host inventory, which can be used for passive asset discovery and to get an overview of communicating devices. NetworkMiner is primarily designed to run on Windows but can also be used on Linux. Since its first release in 2007, it has become a popular tool among incident response teams and law enforcement and is used by companies and organizations worldwide.Starting Price: $1,300 one-time payment -
6
WinDump
WinPcap
WinDump is the Windows version of tcpdump, the command line network analyzer for UNIX. WinDump is fully compatible with tcpdump and can be used to watch, diagnose and save to disk network traffic according to various complex rules. It can run under Windows 95, 98, ME, NT, 2000, XP, 2003 and Vista. WinDump captures using the WinPcap library and drivers, which are freely downloadable from the WinPcap website. WinDump supports 802.11b/g wireless capture and troubleshooting through the Riverbed AirPcap adapter. WinDump is free and is released under a BSD-style license. WinDump is able to use the interfaces exported by WinPcap. WinDump can run on all the operating systems supported by WinPcap. WinDump is the porting of tcpdump. It is possible to launch more than one session (on the same network adapter or on different adapters). Except for the increased CPU load, there are no drawbacks in using multiple applications at the same time.Starting Price: Free -
7
Arkime
Arkime
Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and indexing network traffic in standard PCAP format. It offers full network visibility, facilitating the swift identification and resolution of security and network issues. Security teams gain access to the necessary network visibility data essential for responding to and investigating incidents to expose the full attack scope. Designed to be deployed across multiple clustered systems, Arkime provides the ability to scale to hundreds of gigabits per second. It allows security analysts to respond, reconstruct, investigate, and confirm information about the threats within your network, enabling appropriate responses quickly and precisely. As an open-source platform, Arkime provides users with the benefits of transparency, cost-effectiveness, flexibility, and community support.Starting Price: Free -
8
Fiddler
Progress Software
Capture all HTTP(S) traffic between your computer and the Internet with Telerik Fiddler HTTP(S) proxy. Inspect traffic, set breakpoints, and fiddle with requests & responses. Fiddler Everywhere is a web debugging proxy for macOS, Windows, and Linux. Capture, inspect, monitor all HTTP(S) traffic between your computer and the Internet, mock requests, and diagnose network issues. Fiddler Everywhere can be used for any browser, application, process. Debug traffic from macOS, Windows, or Linux systems and iOS or Android mobile devices. Ensure the proper cookies, headers, and cache directives are transferred between the client and server. Supports any framework, including .NET, Java, Ruby, etc. Mock or modify requests and responses on any website. It’s a quick and easy way to change the request and responses to test websites without changing code. Use Fiddler Everywhere to log all HTTP/S traffic between your computer and the Internet.Starting Price: $12 per user per month -
9
EtherApe
EtherApe
EtherApe is a graphical network monitor for Unix systems, modeled after Etherman, that displays network activity graphically, with hosts and links changing in size based on traffic volume and color-coded protocols. It supports various devices, including FDDI, ISDN, PPP, SLIP, and WLAN, as well as several encapsulation formats. Users can filter displayed traffic and capture data live from the network or read from a file. Node statistics can be exported for further analysis. The tool offers link layer, IP, and TCP modes, allowing users to focus on specific protocol stack levels. It provides detailed information on each node and link, including protocol breakdown and traffic statistics. EtherApe is open source software released under the GNU General Public License. A single node can be centered on the display and several user-chosen nodes can be arranged in an inner circle with other nodes around. An alternative display mode arranges nodes in "columns".Starting Price: Free -
10
CommView
TamoSoft
CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 100 supported protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware. The newest CommView version 7.0 introduced SSL/TLS traffic decryption on the fly. -
11
Capsa
Colasoft
Capsa, a portable network performance analysis and diagnostics tool, provides tremendously powerful and comprehensive packet capture and analysis solution with an easy to use interface allowing both veteran and novice users the ability to protect and monitor networks in a critical business environment. Capsa aids in keeping you assessed of threats that may cause significant business outage. Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehensive high-level window view of entire network, gives quick insight to network administrators or network engineers allowing them to rapidly pinpoint and resolve application problems. With the most user-friendly interface and the most powerful data packet capture and analysis engine in the industry, Capsa is a necessary tool for network monitoring. -
12
tcpdump
tcpdump
Tcpdump is a powerful command-line packet analyzer that allows users to display the contents of network packets transmitted or received over a network to which the computer is attached. It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.Starting Price: Free -
13
Wireshark
Wireshark
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998. Wireshark® is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It has a rich and powerful feature set and is world’s most popular tool of its kind. It runs on most computing platforms including Windows, macOS, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2. -
14
Snort
Cisco
Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users. Snort can be deployed inline to stop these packets, as well. Snort has three primary uses: As a packet sniffer like tcpdump, as a packet logger — which is useful for network traffic debugging, or it can be used as a full-blown network intrusion prevention system. Snort can be downloaded and configured for personal and business use alike. Once downloaded and configured, Snort rules are distributed in two sets: The “Community Ruleset” and the “Snort Subscriber Ruleset.” The Snort Subscriber Ruleset is developed, tested, and approved by Cisco Talos. Subscribers to the Snort Subscriber Ruleset will receive the ruleset in real-time as they are released to Cisco customers. -
15
Azure Network Watcher
Microsoft
Monitor and diagnose networking issues without logging in to your virtual machines (VMs) using Network Watcher. Trigger packet capture by setting alerts, and gain access to real-time performance information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. Build a deeper understanding of your network traffic pattern using network security group flow logs and virtual network flow logs. Information provided by flow logs helps you gather data for compliance, auditing and monitoring your network security profile. Network Watcher provides you the ability to diagnose your most common VPN gateway and connections issues. Allowing you, not only, to identify the issue but also to use the detailed logs created to help further investigate.Starting Price: $0.50 per GB -
16
Riverbed Packet Analyzer
Riverbed
Riverbed Packet Analyzer accelerates real-time network packet analysis and reporting of large trace files through an intuitive graphical user interface and a broad selection of pre-defined analysis views. It enables users to quickly identify and troubleshoot complex network and application performance issues down to the bit level, with full integration with Wireshark. By simply dragging and dropping preconfigured analysis views onto a group of virtual interfaces or a packet trace file, users can see results immediately, transforming hours of work into seconds. The tool facilitates the capture and merging of multiple trace files, allowing for precise pinpointing of problems across multiple segments. Additionally, it provides the capability to zoom into a 100-microsecond view of the network to identify utilization spikes or microbursts that can saturate a gigabit network and cause significant issues. -
17
VIAVI Observer Platform
VIAVI Solutions
The Observer Platform is a comprehensive network performance monitoring and diagnostics (NPMD) solution ideal for maintaining peak performance of all IT services. Designed as an integrated offering, the Observer Platform provides visibility into critical KPIs through pre-defined workflows from high-level dashboards to service anomaly root cause. Ideally suited to satisfying business goals and overcoming challenges across the entire IT enterprise life cycle whether deploying new technologies, managing current resources, solving service anomalies, or optimizing IT asset usage. The Observer Management Server (OMS) UI is a cyber security tool that features simple navigation to easily authenticate security threats, control user access and password data, administer web application upgrades, and streamline management tools from a single, centralized location. -
18
SolarWinds Network Performance Monitor (NPM)
SolarWinds
Network Performance Monitor (NPM) by SolarWinds delivers advanced network troubleshooting for on-premises, hybrid, and cloud services using critical path hop-by-hop analysis. Powerful and affordable, this modern network monitoring software enables IT organizations to quickly detect, diagnose, and resolve network issues and outages, thereby improving network performance. SolarWinds’ Network Performance Monitor offers a host of features such as Performance analysis dashboard, NetPath critical path visualization, Intelligent alerts, Multi-vendor network monitoring, Network Insight for Cisco ASA and F5 BIG-IP.Starting Price: $2895.00/one-time -
19
Omnipeek
LiveAction
Omnipeek is a network protocol analyzer from LiveAction designed to deliver deep packet analysis and rapid troubleshooting on Windows systems. It captures and analyzes packet data in real time to help identify network, application, and security issues. Omnipeek provides intuitive visualizations that make complex network data easy to understand and act on. The platform records exactly what happened on the network, enabling detailed forensic analysis after incidents occur. Built-in expert analysis automatically detects hundreds of common network problems and triggers alerts when policies are violated. Omnipeek supports voice, video, wireless, and high-speed networks, including multi-gigabit environments. It is designed to significantly reduce mean time to resolution for even the most complex network issues. -
20
Ekahau
Ekahau
Precise Wi-Fi diagnostics paired with mobile-optimized apps deliver significantly faster site surveys, faster spectrum analysis, and more accurate and reliable data. Robust, professional gear that anyone can use, developed by Wi-Fi enthusiasts who consistently innovate and redefine what it means to be industry-standard. Well-designed and optimized networks reduce business-stopping downtime, giving you the assurance that your Wi-Fi is always high-performing. Ditch the dongles and upgrade to the most precise Wi-Fi diagnostics and measurement device for faster, more accurate Wi-Fi site surveys and spectrum analysis. Everything you need to design, validate, optimize, troubleshoot, and collaborate on your wireless network is included with Connect. -
21
Corvil Analytics
Pico
The Intelligence Hub is a real-time trade analytics solution that models and correlates client trading behavior, plant performance and venue counterparty execution to enable proactive business management and operations. Corvil is an open data system providing API access to all analytics, trading and market data messages and the underlying packets. The Streaming Data API supports a growing library of Corvil Connectors enabling streaming Corvil data directly from the network packets into your chosen big data solution. Corvil Center provides a single point of access to all analytics and reporting with a couple of clicks to visualize any of the petabytes of granular packet data captured by Corvil. Corvil Instrumentation offers superior price/performance packet analysis and capture Appliances, software defined packet sniffers (Corvil Sensor) to extend the reach to virtual and cloud environments, and the Corvil AppAgent for internal multi-hop software instrumentation. -
22
ntopng
NTOP
ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap/PF_RING and it has been written in a portable way in order to virtually run on every Unix platform, MacOS and on Windows as well. Produce long-term reports for several network metrics including throughput and L7 application protocols. Monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics (retransmissions, out-of-order packets, packet lost), and bytes and packets transmitted. Discover Layer-7 application protocols (Facebook, YouTube, BitTorrent, etc) by leveraging on nDPI, ntop Deep Packet Inspection (DPI) technology. Behavioral traffic analyses such as lateral movements and periodic traffic detection. -
23
Elastiflow
Elastiflow
The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.Starting Price: Free -
24
Nagios Network Analzyer
Nagios Enterprises
Network Analyzer provides an in-depth look at all network traffic sources and potential security threats allowing system admins to quickly gather high-level information regarding the health of the network as well as highly granular data for complete and thorough network analysis. Network Analyzer provides a central view of your network traffic and bandwidth data as well as potential network compromises. The powerful home dashboard provides an at-a-glance view of critical netflow or sflow data sources, server system metrics, and abnormal network behavior for quick assessment of network health. Users can easily drill down to see specific information on individual IPs, source port, destination port, or any combination thereof. Network Analyzer’s advanced alerting and reporting capabilities provide IT staff with superior awareness of their network. Highly granular, down-to-the-packet data can be accessed and archived for further tracking and analysis.Starting Price: $1995.00 -
25
Barracuda CloudGen Firewall
Barracuda
Get comprehensive protection for on-premises and multi-cloud deployment using the firewall built in and for the cloud. Frictionless, cloud-hosted Advanced Threat Protection detects and blocks advanced threats, including zero-day and ransomware attacks. Gain rapid protection against the newest threats with the help of a global threat intelligence network fed by millions of data collection points. Modern cyber threats such as ransomware and advanced persistent threats, targeted attacks, and zero-day threats, require progressively sophisticated defense techniques that balance accurate threat detection with fast response times. Barracuda CloudGen Firewall offers a comprehensive set of next-generation firewall technologies to ensure real-time network protection against a broad range of network threats, vulnerabilities, and exploits, including SQL injections, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many more. -
26
StreamGroomer
Streamcore
StreamGroomers monitor and regulate the traffic across Wide Area Networks (WAN). StreamGroomers integrate transparently, regardless of network architecture, between the LAN and WAN access router and are administered via an out-of-band management network. Continuous service is ensured using high-availability architectures. StreamGroomers analyze network traffic at wire speed, collecting comprehensive measurements and packet data at distributed points in your network. Indicators are calculated from this data in real-time to show current network performance. This data is aggregated and sent to a central repository with minimal network overhead, enabling fast drill down analysis and troubleshooting as well as providing detailed records for forensics. The StreamGroomer’s Deep Packet Inspection analyzes Layer 2-7 packet data to identify applications and user sessions against a predefined catalog of 400+ services. -
27
Linkerd
Buoyant
Linkerd adds critical security, observability, and reliability features to your Kubernetes stack—no code change required. Linkerd is 100% Apache-licensed, with an incredibly fast-growing, active, and friendly community. Built in Rust, Linkerd's data plane proxies are incredibly small (<10 mb) and blazing fast (p99 < 1ms). No complex APIs or configuration. For most applications, Linkerd will “just work” out of the box. Linkerd's control plane installs into a single namespace, and services can be safely added to the mesh, one at a time. Get a comprehensive suite of diagnostic tools, including automatic service dependency maps and live traffic samples. Best-in-class observability allows you to monitor golden metrics—success rate, request volume, and latency—for every service. -
28
Venusense IPS
Venusense
It contains Venustech’s accumulation and research results in intrusion attack identification, making it reach the international leading level in precise blocking. It can actively block a variety of in-depth attack behaviors such as network worms, spyware, Trojan horse software, overflow attacks, database attacks, advanced threat attacks, and brute force, which makes up for the lack of in-depth defense effects of other security products. Venusense IPS constantly updates detection capability through features, behaviors, sandboxes, and algorithms, while maintaining the advantages of traditional IPS, it defends against advanced persistent attacks (such as unknown malicious files, unknown Trojan horse channels), 0 day attacks, sensitive information leakage behaviors, precision attacks, enhanced anti-WEB scanning, etc. -
29
MIVU
Splitpoint Solutions
MIVU’s network monitoring services provide real-time statistical data for performance issues that result in comprehensive and continuous functioning and reliability of your network. On that basis, by offering extended insight into Bandwidth consumption rate, traffic and device status, MIVU enables IT teams to quickly diagnose sources of potential concern that may cause significant disruptions while at the same time facilitating fast remedial action. It also helps to increase the reliability of the system, because most problems are solved in advance, as are issues with the distribution of resources, and increases the level of protection of the network. The effective monitoring tools of MIVU help organizations control potential performance bottlenecks for maintaining the continuous and efficient business processes. -
30
Kerio Control
GFI Software
Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.Starting Price: $270 per year -
31
NeSSi2
NeSSi2
In contemporary communication infrastructures, IP-based computer networks play a prominent role. The deployment of these networks is progressing at an exponential rate as different kinds of participants such as corporations, public authorities and individuals rely on sophisticated and complex services and communication systems. With regard to information security, this leads to new challenges as large amounts of data, which may hold malicious content such as worms, viruses, or Trojans, are transferred over open networks. Network security measures dealing with these threats can be implemented in the network itself as well as at hosts connected to access routers of the network. The host-based approach has its merits, especially with respect to the scalability of a resulting security framework; for example, placing security capabilities such as firewalls or virus scanners on individual hosts does not inhibit the traffic travelling through the network. -
32
Suricata
Suricata
The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency. The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project. -
33
Jolata
Jolata
Jolata can monitor every packet at microsecond granularity and correlate at millisecond intervals. Jolata can process every packet and visualize the results within seconds on its beautiful, easy-to-use UI. Jolata can analyze every packet and flow, at any location across a nationwide network. Customers lack precise visibility into their network, making it difficult to pinpoint the exact source of performance degradation. Jolata provides segment-by-segment metrics, in real-time with actual network traffic. Customers need to evaluate vendor equipment to ensure equipment will meet performance claims. Jolata provides ability to compare equipments with actual traffic loads. Customers need to future-proof their network due to traffic mix change. Jolata enables operators to confirm whether current infrastucture will meet future expectations. -
34
Network Telemetry: VPC flow logs Identify traffic and access patterns that may impose security or operational risks to your organization in near real time. Network Telemetry provides both network and security operations with in-depth, responsive VPC flow logs for Google Cloud networking services. Firewall Logging: VPC Firewall Logs allows users to log firewall access and deny events with the same responsiveness of VPC flow logs. Monitoring at peak performance: VPC flow logs allow you to monitor your deployments with no impact to your system performance. With our unique implementation, enabling VPC flow logs provides you in-depth visibility with no performance overhead. & more
-
35
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.
-
36
Get DDoS protection; global load balancing; and a suite of security, reliability and performance capabilities designed to protect public-facing web content and applications before they reach the cloud. From a high level, a distributed denial-of-service (DDoS) attack is like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. A DDoS attack is a malicious attempt to disrupt the normal traffic of a server, service or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. IBM Cloud Internet Services is a simple set of edge network services for clients looking to secure their internet-facing applications from DDoS attacks, data theft and bot attacks, and for those clients needing to optimize their web applications, or ensure global responsiveness and the ongoing availability of their internet-facing applications.
-
37
LOGalyze
Zuriel
LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network. -
38
Spiceworks Network Mapping
Spiceworks
Network mapping is defined as the process of discovering all the entities linked to a network. Network mapping solutions visualize physical and virtual networks and provide in-depth visibility into enterprise IT infrastructure. This article explains the definition, process, importance, and best practices of network mapping. Network mapping is the process of discovering all entities linked to a network. Network mapping solutions visualize physical and virtual networks and provide in-depth visibility into enterprise IT infrastructure. Organizations use network mapping to simplify network monitoring and swiftly pinpoint network faults with network mapping tools. Network mapping helps IT teams discover and visualize network connectivity by generating a network map. This map contains network diagrams, flowcharts, device inventories, and topology detection. These visual aids and materials are helpful for numerous purposes, including network security and maintenance. -
39
Speed Test WiFi Analyzer
analiti
Expert network testing and analysis tools, for WiFi, Ethernet, 4G/LTE and 5G/NR. Internet and iPerf3 speedtests. Wireless coverage 360 analysis. WiFi scanner and channel maps (inc. beacon signal IE decodes). LAN connected device scanner, who’s using the network. Internet or iPerf3 (server & client included). Concurrent ping, DNS, and HTTP latency results, in multiple servers with the configurable load. Remote uptime monitoring 24/7 of outages or slowdowns. Analyze wireless network coverage, in a home, a business or a venue. Using the Internet or iPerf3 speed testing (alongside WiFi analysis and concurrent ping/DNS/HTTP loads). Detailed network performance statistics, overall and for every specific location. Immediate results, no need to prepare, upload or manage floor plans. With detailed stats for RSSI, Phy speed, local and Internet pings, and much more. Quick and easy to use (no need for floor plans).Starting Price: $23 one-time payment -
40
Network Speed
Evozi
Network Speed a small, fast and free network tool. You can monitor your network speed in real-time and show accurate info instantly in the background. Ever wonder why your webpage is loading slowly or looking for an internet speed meter for monitoring? Now you can check your network speed with ongoing notification or floating widget for real-time statistics at a glance. Real-time internet speed. App usage statistics. Network connections monitor (netstat). App usage statistics, lots of customization options. Track and monitor daily data and WiFi usage from notification. Battery and memory-efficient. Detailed daily data usage statistics. Download & upload speed graph. Daily traffic usage in notification. Monitors your traffic data for the last 30 days. Show ping result on floating widget. Hide when not connected to any network. Accurate data usage monitoring. Data usage alert (Bandwidth monitoring). Unobtrusive notification to let you focus on what's important. -
41
nChronos
Colasoft
nChronos is an application centric, deep-dive network performance analysis system. It combines the nChronos Console with the nChronos Server to deliver the capability of 24x7 continuous packet capturing, unlimited data storage, efficient data mining and in depth traffic analysis solution. nChronos captures 100% of all data captured for real-time analysis as well as historical playback. nChronos is designed for monitoring the network traffic in medium and large corporates. It connects to company's core router or switch and monitors all network traffic, emails and chat sessions inbound and outbound. Also, it provides the ability to monitor abnormal traffic and alert upon detection of "Suspicious Conversations". Only when network engineers monitor network activities of the entire network at the packet level are they able to identify abnormal network activities and protect their companies from cyber-crime and cyber-attacks. -
42
Cryptomage
Cryptomage
Threat detection provides deep inspection of every single network packet including transported data with: Network protocol discovery and validation – easily check unknown and hidden protocols. Machine Learning algorithms – proactive traffic risk-scoring. Network steganography detection of hidden network traffic, including data leaks, espionage channels, and botnets. Proprietary steganography detection algorithms – effective way of uncovering methods of hiding information. Proprietary steganography signature database – comprehensive collection of known network steganography methods. Forensics to better measure the ratio of security events against source of traffic. Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels. Storage of processed traffic metadata in extended format – faster trend analysis. -
43
ZoneRanger
Tavve
ZoneRanger enables network operations teams to fully extend their management applications to networks that are traditionally hampered by security restrictions. Now, 100% of management traffic of any protocol type can be captured safely, offering network operations complete visibility to the networks they manage. Deep packet inspection (DPI) offers enhanced security, secure remote airgap network monitoring, and narrower attack surface through minimized open firewall ports in your network, reducing the need for rule change management and the likelihood of human error. Confidently deploy management applications into traditional DMZ, hybrid-trust, and zero trust networks, providing transparency to management applications and end-devices, statistical analysis of UDP traffic, and accelerated network onboarding – especially useful for managed services providers or large company mergers/divestures. -
44
CacheGuard
CacheGuard Technologies
CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes. CacheGuard-OS integrates Open Source software such as but not limited to OpenSSL, NetFilter, IProute2, StrongSwan, ClamAV, Apache, ModSecurity, Squid and Open Source developments made by CacheGuard-OS developers.Starting Price: $0 -
45
NetFlow Analyzer
ManageEngine
NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.Starting Price: $245 -
46
DUPI
D10 Networks
Explore advanced real-time network monitoring with unparalleled deep visibility into live NETFLOW, DNS, HTTP & SSL network traffic. Monitor AWS logs or any protocol at your sites universally from the cloud. A lightweight capture application on-site exports all relevant protocol info over a fast connection to your dedicated cloud server. Observe aggregate protocol statistics across multiple sites to view all network traffic in your business as a 'whole'. Alternatively based on your use case simply choose to observe only the network traffic at an individual site. Analyze your network traffic in real time for deep visibility into actual traffic patterns. Define detailed alerting rules per specific protocol field on various metrics such as request rates, randomization, lengths, counts, and geo-location info. Explore network traffic at your sites easily and interactively from the comfort of your browser. Quickly switch protocols, fields, and intervals and apply specific filter conditions.Starting Price: $0.25 per hour -
47
Flowcious
Flowcious
A highly scalable, NetFlow/IPFIX based big-data platform designed to supercharge NetOps & SecOps taking complex decisions. Get DPI-like network intelligence with NetFlow. Get deep visibility without the costs and scalability issues of DPI. From anomalies to compromised hosts, detect and mitigate threats in real time using machine learning. Built for massive scale, deployed on networks at Terabit-Per-Second, working with trillions of flow records in the cloud globally. A NetFlow, IPFIX engine that leverages our proprietary Machine Learning algorithms that turn plain meta-information into DPI-like intelligence. Having the right information at the right time is critical to make informed decisions. We've thoughtfully designed it to work for you. Track bandwidth usage per application. Spot congestion easily & gain understanding of how traffic is flowing through your network. Storage of raw traffic for in-depth incident analysis and forensics. -
48
FirstWave Secure Traffic Manager
FirstWave
Secure Traffic Manager is an intelligence-driven platform that provides real-time management of network traffic and application performance to ensure optimal quality of service. STM offers comprehensive real-time visibility into your network traffic, allowing you to proactively manage your customers based on the health of their connections. Utilize the proprietary “distress score” to identify users with poor quality of service and address issues before they escalate. Gain actionable insights into bandwidth consumption by application and easily identify distressed applications and the reasons behind their poor performance. STM offers advanced real-time control over your network traffic at multiple levels, including applications, users, and network segments. Correlate data to determine if issues are specific to a customer, an application, or a network segment, and access real-time and historical information on each customer to stay ahead of potential issues. -
49
Kentik
Kentik
Kentik delivers the insight and network analytics you need to run all of your networks. Old and new. The ones you own and the ones you don't. Monitor your traffic from your network to the cloud to the internet on one screen. We provide: - Network Performance Analytics - Hybrid and Multi-Cloud Analytics (GCP, AWS, Azure) - Internet and Edge Performance Monitoring - Infrastructure Visibility - DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance Monitoring - Capacity Planning - Container Networking - Service Provider Intelligence - Real Time Network Forensics - Network Costs Analytics All on One Platform for Visibility, Performance, and Security. Trusted by Pandora, Box, Cogent, Tata, Yelp, University of Washington, GTT and more! Free trial or demo! -
50
NetVizura NetFlow Analyzer
Soneco
NetFlow Analyzer is an easy solution for net admins to better understand bandwidth consumption, traffic trends, applications, hosts and traffic anomalies, by visualising the traffic by network devices, interfaces and subnets, traffic segments and end users. NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX, NSEL, sFlow and compatible netflow-like protocols to help net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. This way, companies can optimise networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.