Alternatives to Zeek

Compare Zeek alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Zeek in 2026. Compare features, ratings, user reviews, pricing, and more from Zeek competitors and alternatives in order to make an informed decision for your business.

  • 1
    ManageEngine OpManager
    OpManager is a network management tool geared to monitor your entire network. Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Leader badge
    Partner badge
    Compare vs. Zeek View Software
    Visit Website
  • 2
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure.
    Compare vs. Zeek View Software
    Visit Website
  • 3
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
    Leader badge
    Partner badge
    Compare vs. Zeek View Software
    Visit Website
  • 4
    NMIS

    NMIS

    FirstWave

    FirstWave’s NMIS is a complete network management system that provides fault, performance, and configuration management, performance graphs, and threshold alerts. Business rules allow for highly granular notification policies with many types of notification methods. NMIS consolidates multiple tools into one system, ready for Network Engineers to use. Scalable, flexible, open, and simple to implement and maintain, NMIS is the Network Management System that underpins the operations of over one hundred thousand organizations worldwide – making it one of the most widely used open-source Network Management Systems in the world today. FirstWave enables partners, including some of the world’s largest telcos and managed service providers (MSPs), to protect their customers from cyber-attacks, while rapidly growing cybersecurity services revenues at scale. FirstWave provides a comprehensive end-to-end solution for network discovery, management, and cybersecurity for its partners globally.
  • 5
    N‑able N-sight RMM
    N‑able N-sight RMM® is a cloud-based IT solution that makes it easy for MSPs to deliver valuable technology services within hours, not weeks or months. Clear graphical dashboards place alerts front and center so you can focus on what needs you most. Built-in remote access and security features help you support and protect from day one. And when you’re ready, grow your business with additional security layers and add-ons services to expand your offering. N‑able N-sight RMM features include remote access, network path visualization, automated monitoring and maintenance, prescriptive data analytics, data-breach risk intelligence, and more. N‑able N-sight RMM is also available for download as Android and iOS mobile apps to allow users to manage issues anywhere.
  • 6
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 7
    Noction Flow Analyzer (NFA)
    Noction Flow Analyzer (NFA) is a network analytics, monitoring, and alerting tool capable of ingesting NetFlow, IPFIX, sFlow, NetStream, and BGP data. The NetFlow analyzer enables engineers to optimize their networks and applications performance, control bandwidth utilization, do the proper network capacity planning, perform detailed BGP peering analysis, improve security, and minimize network incidents response time.
    Starting Price: $299/month
  • 8
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 9
    LogicMonitor

    LogicMonitor

    LogicMonitor

    LogicMonitor’s SaaS-based observability and IT operations data collaboration platform helps ITOps, developers, MSPs and business leaders gain visibility into and predictability across the technologies that modern organizations depend on to deliver extraordinary employee and customer experiences. LogicMonitor seamlessly monitors everything from networks to applications to the cloud, empowering companies to focus less on troubleshooting and more on innovation. Bridge the gap between tech, teams, and IT with powerful real-time dashboards, network device configurations, full data center visibility, network scanning, and flexible alerting and reporting.
  • 10
    Splunk Enterprise
    Splunk Enterprise is a powerful platform that turns data into actionable insights across security, IT, and business operations. It enables organizations to search, analyze, and visualize data from virtually any source, providing a unified view across edge, cloud, and hybrid environments. With real-time monitoring, alerts, and dashboards, teams can detect issues quickly and act decisively. Splunk AI and machine learning features predict problems before they happen, improving resilience and decision-making. The platform scales to handle terabytes of data and integrates with thousands of apps, making it a flexible solution for enterprises of all sizes. Trusted by leading organizations worldwide, Splunk helps teams move from visibility to action.
  • 11
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
    Leader badge
    Starting Price: $15.00/host/month
  • 12
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 13
    Suricata

    Suricata

    Suricata

    The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency. The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
  • 14
    Sentinel IPS

    Sentinel IPS

    Sentinel IPS

    An affordable suite of network security services, including a Managed Network Detection and Response team, our unique Network Cloaking™ methodology, and CINS Active Threat Intelligence. Comprehensive managed security. Designed to support lean IT teams, and get them back to their other projects. Working with you to deflect outside intrusions, detect malicious threats, and respond quickly to critical events. Autonomous Threat Defense and Active Threat Intelligence beyond the firewall. Another set of eyes on traffic inside the network. Sentinel Outpost provides advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall.
  • 15
    RedSeal

    RedSeal

    RedSeal Networks

    Secure all your network environments—public clouds, private clouds, and on premises— in one comprehensive, dynamic visualization. Trusted by all four branches of the military, the world’s most trusted financial institutions, power grid companies, and mission-critical government agencies. A digital transformation is accelerating migration to the cloud, especially as so many people work remotely. Security teams are scrambling to manage security for resources in one, two or more public clouds as well as for resources remaining on premises. Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • 16
    Nagios Network Analzyer

    Nagios Network Analzyer

    Nagios Enterprises

    Network Analyzer provides an in-depth look at all network traffic sources and potential security threats allowing system admins to quickly gather high-level information regarding the health of the network as well as highly granular data for complete and thorough network analysis. Network Analyzer provides a central view of your network traffic and bandwidth data as well as potential network compromises. The powerful home dashboard provides an at-a-glance view of critical netflow or sflow data sources, server system metrics, and abnormal network behavior for quick assessment of network health. Users can easily drill down to see specific information on individual IPs, source port, destination port, or any combination thereof. Network Analyzer’s advanced alerting and reporting capabilities provide IT staff with superior awareness of their network. Highly granular, down-to-the-packet data can be accessed and archived for further tracking and analysis.
    Starting Price: $1995.00
  • 17
    Blesk

    Blesk

    Prival

    blësk is the only all in one solution available on the market that performs all aspects of network monitoring from a single machine. The solution provides fast, scalable deployments and a high ROI. It’s the industry’s first monitoring application to integrate major Open Source monitoring technologies that are used throughout the world in a single and very easy-to-use application. blësk layers are added on top bringing enhanced features and a uniform graphical interface. Identify and resolve issues that cause applications to be down for your users. Quick detection of network failures, protocol failures, service failures, process and batch tasks, and alerts on SNMP traps. Trace serial data such as CPU load or bandwidth usage. Collect, analyze, and measure performance data for SNMP compliant devices in near real-time. Prediction of saturation, classification of the interface ports by use and calculation of the losses and latencies of different equipment.
    Starting Price: $1300.00/year
  • 18
    Network Critical

    Network Critical

    Network Critical

    Network Critical’s scalable and persistent visibility layer optimizes network infrastructure without compromising operations or security. Our solutions and systems are used globally across sectors. Network Critical's visibility layer feeds tools and systems data that are required to monitor and control your network. Network Critical’s scalable and persistent visibility layer feeds tools and systems the crucial network data needed to optimize, monitor, and control changing network infrastructure without compromising operations or security. Network TAPs are the base layer of smart network access and are able to monitor events on a local network. This means complete network visibility is maintained across all network security and monitoring platforms. Provides excellent performance and flexibility, needed to manage tools that are protecting network infrastructure, securing information, and keep up with the ever-changing attack environment.
  • 19
    BreakingPoint

    BreakingPoint

    Keysight Technologies

    Enter BreakingPoint. By simulating real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing, BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%. And with our new TrafficREWIND solution, you'll get even more realistic and high-fidelity validation by adding production network insight into BreakingPoint test traffic configurations. BreakingPoint addresses that by simulating both good and bad traffic to validate and optimize networks under the most realistic conditions. Security infrastructures can also be verified at high-scale, ensuring ease of use, greater agility, and speedy network testing. BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%.
  • 20
    AbuseHQ

    AbuseHQ

    Abusix

    AbuseHQ is the first network abuse desk SaaS application for ISPs, Telcos, and Hosting & Cloud Providers which identifies and neutralizes abuse. With AbuseHQ, it is easy to keep control, knowledge, and oversight to prevent abuse within your network. AbuseHQ enables network security and abuse teams to identify, respond, mitigate, and address compromised accounts automatically. We believe that we can fight network abuse and other cyber threats on a global scale, and AbuseHQ plays one major part in it. AbuseHQ fully automates security and abuse workflows, increases productivity, subscriber alert speed, and dramatically improves network security while lowering support costs, thus making your network unattractive for bad actors and their bots. AbuseHQ is designed to easily integrate with other types of subscriber security alerts through email or our well-documented API, honeypots, MTA logs, user login failure alerts, and different kinds of edge security system logs.
  • 21
    SolarWinds Engineer's Toolset
    Network software that includes over 60 must-have tools. Automated network discovery. Real time monitoring and alerting. Powerful diagnostic capabilities. Enhanced network security. Configuration & log management. IP address and DHCP scope monitoring. The right network toolset designed to easily manage and troubleshoot your network. Discover your entire network, including equipment, MAC to IP address relationships, Switch Port mapping, and more. Monitor and receive alerts in real time on network availability and health. Perform robust network diagnostics for faster troubleshooting and quick resolution of complex network issues. Simulate attacks on your network to identify security vulnerabilities. Configure devices on your network and troubleshoot any config issues with specialized network engineer tools. Deploy an array of network discovery tools, including Port Scanner, Switch Port Mapper, SNMP sweep, IP Network Browser, MAC Address Discovery, Ping Sweep, and more.
  • 22
    CySight

    CySight

    IdeaData

    CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.
    Starting Price: $299/month
  • 23
    GFI LanGuard

    GFI LanGuard

    GFI Software

    GFI LanGuard enables you to manage and maintain endpoint protection across your network. It provides visibility into all the elements in your network, helps you assess where there may be potential vulnerabilities, and enables you to patch them. The patch management and network auditing solution are easy-to-use and easy to deploy. Automatically discover all the elements in your network, including computers, laptops, mobile phones, tablets, printers, servers, virtual machines, routers and switches. Group your devices for better management. Distribute management to different teams and see everything from a central management dashboard. Identify non-patch vulnerabilities by using an updated list of 60,000+ known issues as well as items such as open ports and system information about users, shared directories and services. Find gaps in common operating systems. Identify missing patches in web browsers and third-party software.
    Starting Price: $32 per year
  • 24
    Pwn Pulse Sensor
    Pwn Pulse Sensor provides total device visibility by building baseline security profile and enforcing critical network controls across physical locations. Easy to deploy without the need to install and manage agents. Real time discovery of all IT and IoT devices — wired, wireless, and Bluetooth — on the network and in the surrounding airspace. Automatically create comprehensive fingerprints of devices consisting of manufacturer, OS, ports, running services, and IP/MAC address. Correlate interfaces, analyze snapshots, and evaluate device relationships to create individual device identities and track their behavior and changes.
  • 25
    Smokescreen

    Smokescreen

    Smokescreen

    Smokescreen is a deception technology & active defense company that provides a solution that blankets your network with decoys to trap hackers. With a demo of our product, IllusionBLACK, you'll understand how adversaries operate and see how decoys planted all over your network provide high-fidelity detections every step of the way. It's easy to understand, easy to use, and we've got you covered on the Perimeter, Cloud, internal network, endpoints, and Active Directory. Launch your first deception campaign using ready-made decoys. Focus on detecting threats instead of wasting countless man-days configuring a new solution. Any interaction with an IllusionBLACK decoy is a high-confidence indicator of a breach. When you get an alert, you know it’s the real deal. Automated forensics and root-cause analysis in two clicks. Accomplish more in a fraction of the time with half the team. Out-of-the-box integrations with SIEMs, Firewalls, EDRs, Proxy, threat intel feeds, SOAR, and more.
    Starting Price: $7,750 per year
  • 26
    StreamScan MDR

    StreamScan MDR

    StreamScan

    Network security is every bit as important to medium-sized companies as it is for multinationals. The fact is 1 out of 4 Canadian companies of all sizes will have their networks compromised each year. But until StreamScan, there were no effective cybersecurity solutions designed and priced specifically for small to medium-sized organizations. StreamScan’s Managed Detection & Response (MDR) service leverages our AI-powered network monitoring Cyberthreat Detection System (CDS) technology to provide enterprise-level protection at a price that will make sense to you. From the theft of IP to facility shutdowns, the risks to manufacturers’ IT and OT infrastructure are simply unacceptable. StreamScan is the first company to offer a Managed Detection & Response service that offers manufacturers enterprise-level protection at a price that makes sense. Healthcare and Pharma are prime targets for cybercriminals because of the value of their data.
  • 27
    Cisco Secure Cloud Analytics
    Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​
  • 28
    Enginsight

    Enginsight

    Enginsight

    Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities. The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface. Scan your systems automatically and immediately recognize the security status of your IT infrastructure. 100% self-developed (security by design) and has no dependencies on third-party tools. Permanently scan your IT environment for existing devices and create a live image of your IT infrastructure. Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux . Start your 15 day free trial now.
    Starting Price: $12.99 per month
  • 29
    indeni

    indeni

    indeni

    Indeni’s security infrastructure automation platform monitors firewall health and auto-detects issues like misconfigurations or expired licenses before they affect network operations. It automatically prioritizes issues so you only receive the most important alerts. Indeni protects your cloud environment by taking a snapshot of it before it’s built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they’re easier to fix. Constant detection of HA unreadiness from cross-device inconsistencies in security policies, forwarding tables, and other configurations and state. Consistent measurement of device configuration skew against locally-defined organizational standards. Collect relevant performance and configuration data from leading firewalls, load balancers, and other security infrastructure.
  • 30
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus core and data center networks. IMC converts meaningless network data to actionable information to keep your network, and your business, moving. HPE network and service management solutions support telco networks from the core to the edge allowing operators to seize the profits of 5G. Simplify the management of data center and the Fibre Channel (FC) storage area network (SAN) fabrics. HPE IMC Branch Intelligent Management System. Enable remote network management of Customer Premises Equipment (CPE).
    Starting Price: $2000.00/one-time
  • 31
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
  • 32
    GlassWire

    GlassWire

    GlassWire

    Instantly see who or what your PC is talking to on GlassWire's network monitoring graph, plus see what your PC may have connected to in the past. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections. Monitor other PCs on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network related changes to your PC, or unusual changes to your apps that could indicate malware. GlassWire offer a Consumer Solution and a Business solution, to suit the needs of both personal users and IT professionals. Among the features: Real-Time Monitoring to keep an eye on active and past network activity Threat. Threat Detection. GlassWire's built-in firewall detects and blocks potential threats. Application Tracking to Identify which applications are using your network and track their usage patterns. Bandwidth Usage, to stay informed about data consumption, And many more!
    Starting Price: $35.88/year/user
  • 33
    Aviz Networks

    Aviz Networks

    Aviz Networks

    Aviz offers a data-centric stack that is vendor agnostic supports multiple ASICs, switches, NOS, clouds, and LLMs, and integrates seamlessly with AI and security applications. It is designed for open source networking and works effectively with existing network infrastructures, ensuring a seamless transition. Aviz empowers customers to choose their solutions without vendor lock-in, offering an enterprise-grade experience across a multi-vendor ecosystem. Unlock powerful insights and enable Gen AI across your network with our conversational tool that answers questions on everything from compliance to capacity planning instantly. Experience seamless integration and a guaranteed 40% ROI with non-intrusive, predefined AI use cases tailored specifically for you. Achieve substantial savings with our software-defined packet broker on your choice of switches, leveraging open source technology.
  • 34
    Flowcious

    Flowcious

    Flowcious

    A highly scalable, NetFlow/IPFIX based big-data platform designed to supercharge NetOps & SecOps taking complex decisions. Get DPI-like network intelligence with NetFlow. Get deep visibility without the costs and scalability issues of DPI. From anomalies to compromised hosts, detect and mitigate threats in real time using machine learning. Built for massive scale, deployed on networks at Terabit-Per-Second, working with trillions of flow records in the cloud globally. A NetFlow, IPFIX engine that leverages our proprietary Machine Learning algorithms that turn plain meta-information into DPI-like intelligence. Having the right information at the right time is critical to make informed decisions. We've thoughtfully designed it to work for you. Track bandwidth usage per application. Spot congestion easily & gain understanding of how traffic is flowing through your network. Storage of raw traffic for in-depth incident analysis and forensics.
  • 35
    Flowmon

    Flowmon

    Progress Software

    Make informed decisions and deal with network anomalies in real time. Cloud, hybrid or on-premise, with Flowmon’s actionable intelligence you are in control. Flowmon’s network intelligence integrates NetOps and SecOps into one versatile solution. Capable of automated traffic monitoring and threat detection, it creates a strong foundation for informed decision-making without having to sift through volumes of information noise. Its intuitive interface allows IT professionals to quickly learn about incidents and anomalies, understand their context, impact, magnitude, and most importantly, their root cause.
  • 36
    TunnelBear

    TunnelBear

    TunnelBear

    A more secure way to browse the web. TunnelBear encrypts your internet connection to keep your online activity private on any network. Just open the TunnelBear app, select a country, and flip the switch. Once you're connected, TunnelBear will work quietly in the background to keep your data secure. Hackers can steal passwords and data over insecure public WiFi. TunnelBear blocks them to keep you secure. Network owners and internet providers can see everything you do online. With TunnelBear on, they can't see a thing. Some content is only available in certain regions. TunnelBear changes your virtual location so you can see it anywhere. Ad services use your IP address to track your behavior across sites. TunnelBear stops them by assigning you a new IP. Some governments block popular websites and apps. TunnelBear unblocks them by changing your virtual location.
    Starting Price: $59.88/year/user
  • 37
    Axence nVision
    Axence nVision is a professional solution designed to manage IT infrastructure regardless of size. A feature-packed system, Axence nVision provides all the functions required for seamless and efficient IT infrastruction management. It offers a set of six modules, which includes Network Monitoring for full IT infrastructure monitoring, Inventory for fast hardware and software audit, Users activity monitoring, Helpdesk for providing interactive IT technical support, Dataguard for data leak protection and Smarttime for time management and employee activity measurement.
  • 38
    RG System

    RG System

    RG System

    Designed for MSPs and IT Professionals, RG System provides a SaaS IT Management platform that combines RMM, Data Backup & Restore and Endpoint Security on a centric portal. With RG System, you protect your whole IT infrastructure - servers, workstations and devices - and you benefit from unique Bitdefender GravityZone Business Security and Dell EMC Avamar integration. Remote access, patch management, ticketing, reporting, VMs backup, replication, firewall... you manage and secure your IT environments from the same web based interface. The portal is affordable, easy-to-use and on a pay as you go model. Make IT Easy, that's what we do!
    Starting Price: $1.50
  • 39
    Nessus

    Nessus

    Tenable

    Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment.
  • 40
    alphaMountain Threat Intelligence APIs and Feeds
    alphaMountain’s domain and IP threat intelligence powers many of the world’s leading cybersecurity solutions. High-fidelity threat feeds are updated hourly with fresh URL classification, threat ratings and actionable intelligence on over 2 billion hosts including domains and IP addresses. KEY BENEFITS: Get high-fidelity URL classification and threat ratings for any URL from 1.00 to 10.0. Receive fresh categorization and threat ratings updated every hour, syndicated via API or threat feed. See threat factors and other intelligence contributing to threat verdicts. USE CASES: Use threat feeds in your network security products such as secure web gateway, secure email gateway or next-generation firewall. Call the alphaMountain API from your SIEM to investigate threats or from your SOAR to automate responses such as blocking and policy updates. Detect if a URL is suspicious, contains malware, is a phishing site and which of 89 content categories the site belongs to.
    Starting Price: $300/month
  • 41
    Netsweeper

    Netsweeper

    Netsweeper

    Netsweeper enables organizations to protect internet users from harmful online content and provides web filtering, digital monitoring, and online activity reporting solutions to ensure digital safety on-premise and in remote environments. The leading web filtering platform with the lowest total cost of ownership, Netsweeper delivers advanced intelligence and management solutions for service provider networks, governments, and enterprises. Capable of being onboarded in cloud and on-premise deployments, Netsweeper works across multiple devices and systems to ensure a high level of protection from any location. The most advanced content filtering platform to manage internet access and activity to protect users from illicit content and web threats. Netsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a database of categorized sites maintained on the Netsweeper Category Name Server (CNS).
    Starting Price: $1 per month
  • 42
    XM Cyber

    XM Cyber

    XM Cyber

    Networks change constantly and that creates problems for IT and security operations. Gaps open exposing pathways that attackers can exploit. While enterprise security controls like firewalls, intrusion prevention, vulnerability management and endpoint tools attempt to secure your network, breaches are still possible. The last line of defense must include constant analysis of daily exposures caused by exploitable vulnerabilities, common configuration mistakes, mismanaged credentials and legitimate user activity that exposes systems to risk of attack. Why are hackers still successful despite significant investments in security controls? Several factors make securing your network difficult, mostly because of overwhelming alerts, never-ending software updates and patches, and numerous vulnerability notifications. Those responsible for security must research and evaluate piles of data without context. Risk reduction is almost impossible.
  • 43
    Spiceworks Network Monitor
    Simple, easy-to-use website monitoring software. Real-time up/down status and alerts for your critical web applications and services. Thousands of businesses use Spiceworks to be alerted on the up/down status of the web applications and services that their end-users need to do their job everyday. Spiceworks Connectivity Dashboard is simple to set up. Install the monitoring agent on any workstation/server, configure the application URLs and start monitoring. Get real-time insights and spot sluggish network connections, or overwhelmed applications – either hosted in your data center or in the cloud – before they crash or users start calling. Coming Soon! Get email alerts when a business critical web application is unreachable by your users: CRM, HR, engineering. Real-time status on critical devices and apps. Get the latest monitoring info without the clutter. Keep an eye on everything within your realm with a single, easy-to-use dashboard.
    Starting Price: $0.01/one-time/user
  • 44
    Cybereason

    Cybereason

    Cybereason

    Together we can end cyber attacks at the endpoint, across the enterprise, to everywhere the battle moves. Cybereason delivers over-the-horizon visibility and high fidelity convictions of both known and unknown threats so defenders can leverage the power of true prevention. Cybereason provides the deep context and correlations from across the whole of the network to uncover stealthy operations and enable defenders to be expert threat hunters. Cybereason significantly reduces the time required for defenders to investigate and resolve attacks through both automated and guided remediation with just a click of the mouse. Cybereason analyzes 80 million events per second - that’s 100x the volume of other solutions on the market. Reduce investigation time by as much as 93% to eliminate emerging threats in a matter of minutes rather than days.
  • 45
    ITarian

    ITarian

    ITarian

    Enable your staff to monitor and manage the security, performance, and administration of your entire IT infrastructure from a single platform—all at no cost to you. The comprehensive and powerful ITarian platform helps you simplify operations, boost productivity, and better utilize IT resources. Provide IT staff with more monitoring and management capabilities. Boost IT productivity with integration between roles, functions, and toolsets. Maximize uptime with proactive detection and resolution capabilities. Automate day-to-day tasks with custom scripts.
  • 46
    Trellix Network Security
    Gain unparalleled visibility and apply state-of-the-art, signatureless detection and protection against the most advanced and evasive threats, including zero-day attacks. Improve analyst efficiency with high-fidelity alerts that trigger when it matters most, saving time and resources and reducing alert volume and fatigue. Generate concrete real-time evidence and Layer 7 metadata to provide further security context to pivot to investigation and alert validation, endpoint containment, and incident response. Detect multi-flow, multi-stage, zero-day, polymorphic, ransomware, and other advanced attacks with signature-less threat detection. Detect known and unknown threats in real-time while also enabling back-in-time detection of threats. Track and block lateral threats propagating within your enterprise network to reduce post-breach dwell time. Separate critical and non-critical malware (such as adware and spyware) to prioritize alert response.
  • 47
    CyBlock

    CyBlock

    Wavecrest Computing

    Easy-to-launch cloud-based service applied regardless of employee location. Provides perimeter-less filtering and reporting coverage for all users - remote, roaming, flexible, and transitioning. Making this a popular choice for today’s distributed workforce environment. Secure Web filtering appliances for those that prefer, or are required to have, onsite hardware. The choice of IT rack mount or tabletop design makes this deployment suitable for SMBs to large organizations. Application and Website report with a rollup of time spent. See time online by friendly Website name, not by ambiguous Domain Name. Accurately identify actual user clicks, providing managers with clear, useful data. Easy-to-use solutions for efficient and proactive monitoring of Web usage. Solutions built to address government agency challenges in Internet usage.
  • 48
    Stamus Networks

    Stamus Networks

    Stamus Networks

    Network-based threat detection and response solutions from Stamus Networks. Expose serious threats and unauthorized activity lurking in your network. We tap into the inherent power of network traffic to uncover critical threats to your organization. We offer the best possible asset-oriented visibility and automated detection to help practitioners cut through the clutter and focus on serious and imminent threats. Stamus Security Platform (SSP) is an open network detection and response solution built on a Suricata foundation that delivers actionable network visibility and powerful threat detection. Stamus Security Platform is trusted by some of the world’s most targeted organizations, including government CERTs, central banks, insurance providers, managed security service providers, financial service providers, multinational government institutions, broadcasters, travel and hospitality companies, and even a market-leading cybersecurity SaaS vendor.
  • 49
    Isovalent

    Isovalent

    Isovalent

    Isovalent Cilium Enterprise enables cloud-native networking, security, and observability. Your cloud-native infrastructure, powered by eBPF. Connect, secure, and observe cloud-native applications in multi-cluster, multi-cloud environments. A highly scalable CNI and a multi-cluster networking solution that offers high-performance load balancing, advanced network policy management, etc. Shifting security to a process behavior instead of packet header enabling. Open source is at the core of Isovalent. We think, innovate, and breathe open source and are fully committed to the principles and values of open source communities. Request a personalized live demo with an Isovalent Cilium Enterprise expert. Engage with the Isovalent sales team to assess an enterprise-grade deployment of Cilium. Step through our interactive labs in a sandbox environment. Advanced application monitoring. Runtime security, transparent encryption, compliance monitoring, and CI/CD & GitOps integration.
  • 50
    LogPoint

    LogPoint

    LogPoint

    Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.